
“TradeFortress says that this was a social engineering attack, meaning that the attacker masqueraded as someone he wasn’t in order to get access to the site’s systems on cloud-hosting provider Linode. ‘The attack was done through compromising a chain of email accounts which eventually allowed the attacker to reset the password for the the Linode server,’ he said. The hacker’s first step was recovering an email address for an account that TradeFortress set up six years ago. The ‘attacker rented an Australian server to proxy as close to my geographical location so it won’t raise alarms with email recoveries,’ TradeFortress said in a forum post.”
http://www.wired.com/wiredenterprise/2013/11/inputs/
Related posts:
The Tunnel People That Live Under The Streets Of America
Greece’s New Finance Minister: Bitcoin ‘Highly Problematic Currency’
Washington Hypocrisy Skyrockets, Credibility Plummets
How to Steal an Airplane: From 9/11 to MH370 [2014]
The War on Drugs, 40 years later
Libertarian open carry protester vs 6 police officers
Arizona Makes “Revenge Porn” A Felony
Conference Board Fears Front Running Ahead of Its Economic Data; 250 Millisecond Edge
Top Ten Cities With the Most Multi-Millionaires
Fed Still on Red Alert
John Hussman: The Most Broadly Overvalued Moment in Market History
Jim Rogers goes Short US Treasuries, talks JP Morgan Silver and a Boom in North Korea!
The FBI Ran a Child Porn Site for Two Whole Weeks
NYC Mayor Bloomberg spending millions on political ads as ‘counterweight’ to NRA
Janet Yellen, Most Powerful Sacrifice in the World?