More Scare tactics? This doesn’t work for me, I already know about this from blog The Technology blog and podcast
This is for the technology blog and podcast Commentary, articles, and podcasts
More Scare tactics? This doesn’t work for me, I already know about this
Take a look at this web form. I already checked my site and it was not hacked, and the site is another way to go to the Magnatune and independent artist channel web page. There are no databases on the site, just simple web pages. Get a load of this.
Below is the result of your feedback form. It was submitted by () on Friday, September 30, 2022 at 13:54:45
Name: Lila
phone: 30-18-18-79
contact_method: E-mail
bug: yes
additional_bug_info: Your Site Has Been Hacked
PLEASE FORWARD THIS EMAIL TO SOMEONE IN YOUR COMPANY WHO IS ALLOWED TO MAKE IMPORTANT DECISIONS!
We have hacked your website http://www.magnatune.jaredrimer.net and extracted your databases.
How did this happen?
Our team has found a vulnerability within your site that we were able to exploit. After finding the vulnerability we were able to get your database credentials and extract your entire database and move the information to an offshore server.
What does this mean?
We will systematically go through a series of steps of totally damaging your reputation. First your database will be leaked or sold to the highest bidder which they will use with whatever their intentions are. Next if there are e-mails found they will be e-mailed that their information has been sold or leaked and your http://www.magnatune.jaredrimer.net was at fault thusly damaging your reputation and having angry customers/associates with whatever angry customers/associates do. Lastly any links that you have indexed in the search engines will be de-indexed based off of blackhat techniques that we used in the past to de-index our targets.
How do I stop this?
We are willing to refrain from destroying your site? s reputation for a small fee. The current fee is $2500 in bitcoins (BTC).
Please send the bitcoin to the following Bitcoin address (Copy and paste as it is case sensitive):
bc1qmghwkrrxlh62k4r530lgfxucum65087ya00wvz
Once you have paid we will automatically get informed that it was your payment. Please note that you have to make payment within 7 days after receiving this e-mail or the database leak, e-mails dispatched, and de-index of your site WILL start!
How do I get Bitcoins?
You can easily buy bitcoins via several websites or even offline from a Bitcoin-ATM.
What if I don? t pay?
If you decide not to pay, we will start the attack at the indicated date and uphold it until you do, there? s no counter measure to this, you will only end up wasting more money trying to find a solution. We will completely destroy your reputation amongst google and your customers.
This is not a hoax, do not reply to this email, don? t try to reason or negotiate, we will not read any replies. Once you have paid we will stop what we were doing and you will never hear from us again!
Please note that Bitcoin is anonymous and no one will find out that you have complied.
comment_or_question: Your Site Has Been Hacked
PLEASE FORWARD THIS EMAIL TO SOMEONE IN YOUR COMPANY WHO IS ALLOWED TO MAKE IMPORTANT DECISIONS!
We have hacked your website http://www.magnatune.jaredrimer.net and extracted your databases.
How did this happen?
Our team has found a vulnerability within your site that we were able to exploit. After finding the vulnerability we were able to get your database credentials and extract your entire database and move the information to an offshore server.
What does this mean?
We will systematically go through a series of steps of totally damaging your reputation. First your database will be leaked or sold to the highest bidder which they will use with whatever their intentions are. Next if there are e-mails found they will be e-mailed that their information has been sold or leaked and your http://www.magnatune.jaredrimer.net was at fault thusly damaging your reputation and having angry customers/associates with whatever angry customers/associates do. Lastly any links that you have indexed in the search engines will be de-indexed based off of blackhat techniques that we used in the past to de-index our targets.
How do I stop this?
We are willing to refrain from destroying your site? s reputation for a small fee. The current fee is $2500 in bitcoins (BTC).
Please send the bitcoin to the following Bitcoin address (Copy and paste as it is case sensitive):
bc1qmghwkrrxlh62k4r530lgfxucum65087ya00wvz
Once you have paid we will automatically get informed that it was your payment. Please note that you have to make payment within 7 days after receiving this e-mail or the database leak, e-mails dispatched, and de-index of your site WILL start!
How do I get Bitcoins?
You can easily buy bitcoins via several websites or even offline from a Bitcoin-ATM.
What if I don? t pay?
If you decide not to pay, we will start the attack at the indicated date and uphold it until you do, there? s no counter measure to this, you will only end up wasting more money trying to find a solution. We will completely destroy your reputation amongst google and your customers.
This is not a hoax, do not reply to this email, don? t try to reason or negotiate, we will not read any replies. Once you have paid we will stop what we were doing and you will never hear from us again!
Please note that Bitcoin is anonymous and no one will find out that you have complied.
HTTP_USER_AGENT: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:102.0) Gecko/20100101 Firefox/102.0
REMOTE_ADDR: 156.146.62.218
Anyone see what is wrong with this? The phone number isn’t even looking right. The domain may be one that was baught by a company to prevent typosquatting, and it leads to a legit company providing wheelchair lift services for stairs.
The company on the home page lists a toll-free U.K. phone number for people to call, and even a web form for people to fill out which asks for name, address, phone number and the like.
The IP that I captured was a transit provider in Switzerland and I’ve decided to blacklist the whole range to protect my network. I’m sure hat this is trying to extort me out of money I just don’t have. And, they filled out both portions of my web form.
If there is a true vulnerability, please report it to me and I’ll look in to it. Reports like this one do not do the network any good. I love receiving bug reports, but this is a waste of my time. Whoever did this, I hope you had fun trying to extort the network, it can not pay the extortion fee and will not engage in this behavior. The blog post will be posted instead, nd if you trash the network blaming us for something we did not do, go for it. Customers will be in contact with me if they get something suspicious anyway, so go for it. Thanks for making my day!
Informazioni sull'articolo
More Scare tactics? This doesn’t work for me, I already know about this was released on September 30, 2022 at 1:13 pm by tech in article commentary.
Last modified: September 30, 2022.
Comments (2)
-
Comment by tech date 30 September 2022 alle 18:44 (),
Hello Shaun,
I don’t get a whole lot of forms, but yes, I find these amusing because they say I’m hacked and give me my page but they really don’t know what is going on.
I have always given the web site out through the shortener jaredtech.help which I baught for this purpose, but I guess people want to read.
I’m not sure what to do with the form, because I tried to implement captcha and never got it to work. Followed google’s instructions, maybe it needs php.
I know there’s hcaptcha, which relies on a cookie if you’re disabled, but wouldn’t know the first thing on how to implement it.
Problem too, we have removed forms on the mix, and we’ve not seen any spam. I have an encoder program, I suppose I can just encode my email address and get rid of the forms altogether, but I like the bug reporting form as it is a way for people to give me info without me giving out my email address.
I’ve seen the typical spam, but these I just find very funny. There’s no legitamacy on it.
I understand the spelling mistakes, I think it is when my nails are too long, and I need to be more caucious of that and I’ve tried. We’ll push on.
I’ve been touting my list too, the Security Box list which I’ve put in the list of links. So people have options and I like that.
-
Comment by crashmaster date 30 September 2022 alle 15:36 (),
Oh man I like this.
I get this shit all the time.
Really stupid to.
If anything stupid happens on this site jetpack will probably detect it.
Pluss to register you need to be verified via mail.
On top of that at least for the moment unless you are a regular contributer you either have to jump on at least once a week or contact the admin for a perminant assignment to the do not nuke database.
Noone has contacted either of us or at least me to be included.
We get 1 or 2 fake accounts a year with the system we have.
Out of the 4 accounts we have that are actually active only 2 of them actually post and you post more than me though I look from time to time.
Bar the spelling mistakes in the post thhere are no breaches, I mean even the timezone bug has gone on the health page.
This system goes through at least 2 antispam systems, ipstack I think and I think another, I forgot I have keys for all the antispam thats registered I could get free access to.
Though saying that, do your feedback forms get much traffic?
If not, maybe its time to kill them or secure them.
Sadly captchas seem the only solution though cloudflare is using turnstyle which is supposed to challenge silently.
I have not at yet tried this but eventually when wordpress puts it in I plan to temperairilly nuke the security system or certain elements on it to see what happens.
Email verification is fine but I’d really like to kill the auto user killer but yeah see if it works it may even be another extra on what we have.
However I have seriously been thinking of stopping registration because no one is getting on.
I am against it because I want to always be on the lookout for new users but we are not attracting any new users right now and steadilly rumble on.
Bar me sometimes commenting well no one seems to be doing that either.
Leave a comment
You must be logged in to post a comment.
navigation menu
- Archives
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- Categories of this blog
- Subscribe to Blog via Email
Join 8 other subscribers
- The tech blog’s pages
- Blogroll
- Crashmasters blog
- Cyberscoop
- Documentation
- Improve Internet Accessibility for Individuals with Impaired Vision
- International friends network stream
- Kim Komando
- Krebs On Security
- Plugins
- Register to this site
- Suggest Ideas
- Support Forum
- supporters and partners
- the blind perspective
- The Jared Rimer Network donations page
- The Phishlabs Blog
- The Security Box discussion list
- The Technology blog and podcast and TSB on amazon music podcasts
- Themes
- toptechtidbits
- WordPress Blog
- WordPress Planet
- “Blind VMS and the Tech podcast join forces”