
“TradeFortress says that this was a social engineering attack, meaning that the attacker masqueraded as someone he wasn’t in order to get access to the site’s systems on cloud-hosting provider Linode. ‘The attack was done through compromising a chain of email accounts which eventually allowed the attacker to reset the password for the the Linode server,’ he said. The hacker’s first step was recovering an email address for an account that TradeFortress set up six years ago. The ‘attacker rented an Australian server to proxy as close to my geographical location so it won’t raise alarms with email recoveries,’ TradeFortress said in a forum post.”
http://www.wired.com/wiredenterprise/2013/11/inputs/
Related posts:
Justin Raimondo: The EU – A CIA Covert Operation
Chase Bank Limits Cash Withdrawals, Bans International Wire Transfers
May 2014 High Alert Trends & Sector Report
Mapping the Bitcoin Economy Could Reveal Users’ Identities
Feds investigating discrimination accused of discrimination
Russian Foreign Minister: Russia will never involve itself in 'another Afghanistan'
Karl Rove: ‘God bless President Obama’ for killing U.S. citizen al-Awlaki
The Office Of Propaganda And Censorship
WeChat introduces gold-backed mobile micropayments in China
Olaf Carlson-Wee Talks About Coinbase at Money2020
Gun-maker airlifts 20,000 extended magazines into Colorado ahead of ban
China's Largest Conglomerate Is On The Verge Of Bankruptcy
Police Seize Smart Phone From Bystander
Another Major Police Lie About the Boston Bomber Search
A Pleasant Day in the Park in the Only 'Democracy' in the Middle East