Take a look at this web form. I already checked my site and it was not hacked, and the site is another way to go to the Magnatune and independent artist channel web page. There are no databases on the site, just simple web pages. Get a load of this.
Below is the result of your feedback form. It was submitted by () on Friday, September 30, 2022 at 13:54:45
Name: Lila
phone: 30-18-18-79
contact_method: E-mail
bug: yes
additional_bug_info: Your Site Has Been Hacked
PLEASE FORWARD THIS EMAIL TO SOMEONE IN YOUR COMPANY WHO IS ALLOWED TO MAKE IMPORTANT DECISIONS!
We have hacked your website http://www.magnatune.jaredrimer.net and extracted your databases.
How did this happen?
Our team has found a vulnerability within your site that we were able to exploit. After finding the vulnerability we were able to get your database credentials and extract your entire database and move the information to an offshore server.
What does this mean?
We will systematically go through a series of steps of totally damaging your reputation. First your database will be leaked or sold to the highest bidder which they will use with whatever their intentions are. Next if there are e-mails found they will be e-mailed that their information has been sold or leaked and your http://www.magnatune.jaredrimer.net was at fault thusly damaging your reputation and having angry customers/associates with whatever angry customers/associates do. Lastly any links that you have indexed in the search engines will be de-indexed based off of blackhat techniques that we used in the past to de-index our targets.
How do I stop this?
We are willing to refrain from destroying your site? s reputation for a small fee. The current fee is $2500 in bitcoins (BTC).
Please send the bitcoin to the following Bitcoin address (Copy and paste as it is case sensitive):
bc1qmghwkrrxlh62k4r530lgfxucum65087ya00wvz
Once you have paid we will automatically get informed that it was your payment. Please note that you have to make payment within 7 days after receiving this e-mail or the database leak, e-mails dispatched, and de-index of your site WILL start!
How do I get Bitcoins?
You can easily buy bitcoins via several websites or even offline from a Bitcoin-ATM.
What if I don? t pay?
If you decide not to pay, we will start the attack at the indicated date and uphold it until you do, there? s no counter measure to this, you will only end up wasting more money trying to find a solution. We will completely destroy your reputation amongst google and your customers.
This is not a hoax, do not reply to this email, don? t try to reason or negotiate, we will not read any replies. Once you have paid we will stop what we were doing and you will never hear from us again!
Please note that Bitcoin is anonymous and no one will find out that you have complied.
comment_or_question: Your Site Has Been Hacked
PLEASE FORWARD THIS EMAIL TO SOMEONE IN YOUR COMPANY WHO IS ALLOWED TO MAKE IMPORTANT DECISIONS!
We have hacked your website http://www.magnatune.jaredrimer.net and extracted your databases.
How did this happen?
Our team has found a vulnerability within your site that we were able to exploit. After finding the vulnerability we were able to get your database credentials and extract your entire database and move the information to an offshore server.
What does this mean?
We will systematically go through a series of steps of totally damaging your reputation. First your database will be leaked or sold to the highest bidder which they will use with whatever their intentions are. Next if there are e-mails found they will be e-mailed that their information has been sold or leaked and your http://www.magnatune.jaredrimer.net was at fault thusly damaging your reputation and having angry customers/associates with whatever angry customers/associates do. Lastly any links that you have indexed in the search engines will be de-indexed based off of blackhat techniques that we used in the past to de-index our targets.
How do I stop this?
We are willing to refrain from destroying your site? s reputation for a small fee. The current fee is $2500 in bitcoins (BTC).
Please send the bitcoin to the following Bitcoin address (Copy and paste as it is case sensitive):
bc1qmghwkrrxlh62k4r530lgfxucum65087ya00wvz
Once you have paid we will automatically get informed that it was your payment. Please note that you have to make payment within 7 days after receiving this e-mail or the database leak, e-mails dispatched, and de-index of your site WILL start!
How do I get Bitcoins?
You can easily buy bitcoins via several websites or even offline from a Bitcoin-ATM.
What if I don? t pay?
If you decide not to pay, we will start the attack at the indicated date and uphold it until you do, there? s no counter measure to this, you will only end up wasting more money trying to find a solution. We will completely destroy your reputation amongst google and your customers.
This is not a hoax, do not reply to this email, don? t try to reason or negotiate, we will not read any replies. Once you have paid we will stop what we were doing and you will never hear from us again!
Please note that Bitcoin is anonymous and no one will find out that you have complied.
HTTP_USER_AGENT: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:102.0) Gecko/20100101 Firefox/102.0
REMOTE_ADDR: 156.146.62.218
Anyone see what is wrong with this? The phone number isn’t even looking right. The domain may be one that was baught by a company to prevent typosquatting, and it leads to a legit company providing wheelchair lift services for stairs.
The company on the home page lists a toll-free U.K. phone number for people to call, and even a web form for people to fill out which asks for name, address, phone number and the like.
The IP that I captured was a transit provider in Switzerland and I’ve decided to blacklist the whole range to protect my network. I’m sure hat this is trying to extort me out of money I just don’t have. And, they filled out both portions of my web form.
If there is a true vulnerability, please report it to me and I’ll look in to it. Reports like this one do not do the network any good. I love receiving bug reports, but this is a waste of my time. Whoever did this, I hope you had fun trying to extort the network, it can not pay the extortion fee and will not engage in this behavior. The blog post will be posted instead, nd if you trash the network blaming us for something we did not do, go for it. Customers will be in contact with me if they get something suspicious anyway, so go for it. Thanks for making my day!
Hello Shaun,
I don’t get a whole lot of forms, but yes, I find these amusing because they say I’m hacked and give me my page but they really don’t know what is going on.
I have always given the web site out through the shortener jaredtech.help which I baught for this purpose, but I guess people want to read.
I’m not sure what to do with the form, because I tried to implement captcha and never got it to work. Followed google’s instructions, maybe it needs php.
I know there’s hcaptcha, which relies on a cookie if you’re disabled, but wouldn’t know the first thing on how to implement it.
Problem too, we have removed forms on the mix, and we’ve not seen any spam. I have an encoder program, I suppose I can just encode my email address and get rid of the forms altogether, but I like the bug reporting form as it is a way for people to give me info without me giving out my email address.
I’ve seen the typical spam, but these I just find very funny. There’s no legitamacy on it.
I understand the spelling mistakes, I think it is when my nails are too long, and I need to be more caucious of that and I’ve tried. We’ll push on.
I’ve been touting my list too, the Security Box list which I’ve put in the list of links. So people have options and I like that.
Oh man I like this.
I get this shit all the time.
Really stupid to.
If anything stupid happens on this site jetpack will probably detect it.
Pluss to register you need to be verified via mail.
On top of that at least for the moment unless you are a regular contributer you either have to jump on at least once a week or contact the admin for a perminant assignment to the do not nuke database.
Noone has contacted either of us or at least me to be included.
We get 1 or 2 fake accounts a year with the system we have.
Out of the 4 accounts we have that are actually active only 2 of them actually post and you post more than me though I look from time to time.
Bar the spelling mistakes in the post thhere are no breaches, I mean even the timezone bug has gone on the health page.
This system goes through at least 2 antispam systems, ipstack I think and I think another, I forgot I have keys for all the antispam thats registered I could get free access to.
Though saying that, do your feedback forms get much traffic?
If not, maybe its time to kill them or secure them.
Sadly captchas seem the only solution though cloudflare is using turnstyle which is supposed to challenge silently.
I have not at yet tried this but eventually when wordpress puts it in I plan to temperairilly nuke the security system or certain elements on it to see what happens.
Email verification is fine but I’d really like to kill the auto user killer but yeah see if it works it may even be another extra on what we have.
However I have seriously been thinking of stopping registration because no one is getting on.
I am against it because I want to always be on the lookout for new users but we are not attracting any new users right now and steadilly rumble on.
Bar me sometimes commenting well no one seems to be doing that either.