“TradeFortress says that this was a social engineering attack, meaning that the attacker masqueraded as someone he wasn’t in order to get access to the site’s systems on cloud-hosting provider Linode. ‘The attack was done through compromising a chain of email accounts which eventually allowed the attacker to reset the password for the the Linode server,’ he said. The hacker’s first step was recovering an email address for an account that TradeFortress set up six years ago. The ‘attacker rented an Australian server to proxy as close to my geographical location so it won’t raise alarms with email recoveries,’ TradeFortress said in a forum post.”
http://www.wired.com/wiredenterprise/2013/11/inputs/
Related posts:
Bubble, Bubble, Housing in Trouble
Afghan probe into civilian killings stymied by US refusal to cooperate
Central Bank of Jordan Blocks Financial Companies from Bitcoin
WikiLeaks founder Julian Assange: NSA leaker is a hero
Teen arrested for iPhone 'terrorism' at school faces 20 years in prison
Bill Kristol's Empire of Death
TSA Will Stop Accepting Driver's Licenses From Nine States On Jan. 10
A Sure-Fire Way to Control the Price of Bitcoin?
Anthony Wile: We're Back!
Worst. Retirement. Option. Ever.
U.S. government tried to aggressively punish ‘leaker’ journalist in World War II
Confidential Wikileaks Cable (US Embassy in Nicosia) on Russian Money in Cyprus
Senate Committee Votes in Favor of NSA Phone-Records Snooping
Georgia Must Block This Flawed Computer Crime Bill
Feds May Cut Off Water For Legal Marijuana Crops