
“TradeFortress says that this was a social engineering attack, meaning that the attacker masqueraded as someone he wasn’t in order to get access to the site’s systems on cloud-hosting provider Linode. ‘The attack was done through compromising a chain of email accounts which eventually allowed the attacker to reset the password for the the Linode server,’ he said. The hacker’s first step was recovering an email address for an account that TradeFortress set up six years ago. The ‘attacker rented an Australian server to proxy as close to my geographical location so it won’t raise alarms with email recoveries,’ TradeFortress said in a forum post.”
http://www.wired.com/wiredenterprise/2013/11/inputs/
Related posts:
Stewardess first to book $250k Virgin Galactic 'space trip' with BITCOINS
Jeffrey Albert Tucker exclusive RT TV interview
7 Years of Work on Food Forest Destroyed Over Permit
Why Is The US Building A Secret $100 Million Underground Facility Outside Tel Aviv?
Obama’s Auto Industry Bailouts in 2009: Taxpayers Lose, Big Time
Top 20 Hollywood Donors Have Already Shelled Out $1.45 Million To Parties in 2013
Treasury Exempts Foreign Exchange Swaps from Definition of “Swap”
Hackers compromise official PHP website, infect visitors with malware
eBay Now Allows Virtual Currency Sales
Busted California Cities: Pension Liabilities
How Do You Turn a Leftist into a Warmonger?
Glenn Greenwald slams Rep. Peter King: He supported terrorism for decades
FBI's Dread Pirate Roberts Evidence is All Circumstantial
Obamacare Navigators Won't Have To Pass Background Checks
With Gun and Medical Marijuana Registries, Hawaii Starts Disarming Patients