
“TradeFortress says that this was a social engineering attack, meaning that the attacker masqueraded as someone he wasn’t in order to get access to the site’s systems on cloud-hosting provider Linode. ‘The attack was done through compromising a chain of email accounts which eventually allowed the attacker to reset the password for the the Linode server,’ he said. The hacker’s first step was recovering an email address for an account that TradeFortress set up six years ago. The ‘attacker rented an Australian server to proxy as close to my geographical location so it won’t raise alarms with email recoveries,’ TradeFortress said in a forum post.”
http://www.wired.com/wiredenterprise/2013/11/inputs/
Related posts:
Mission KS Police Take Down, Cavity Search Mom In Front Of Children
Bankster Gets Away with Stabbing Cabby
Bit of Headache for Paris, Bitcoin Regulation Added to EU Agenda
Chrome Plug-In for Bitcoin Wallet Attracts Big-Name Talent
NSA conducts mass surveillance of the US internet to find cyberattacks
Robo-bulldozers guided by drones are helping ease Japan's labor shortage
US Expropriates, Imprisons Bitcoin Trader For Carrying Cash in a Trader Joe's Sack
Fed Committee Member Warns Off ‘Feral Hogs’ in Markets
Keiser Report: Bitcoin is Beautiful
Facebook Billionaire Sean Parker Fined $2.5 Million For His $10 Million Wedding
ACLU to Obama: No, You Can't Just Murder an American Overseas
Switzerland Will Continue to Thrive and Outperform
Groklaw Shuts Down Over U.S. Internet Surveillance
MP3tunes and its founder liable for $63 million in EMI copyright suit
Luke Rudkowski Questions Larry Silverstein On WTC 7 [2011]