
“TradeFortress says that this was a social engineering attack, meaning that the attacker masqueraded as someone he wasn’t in order to get access to the site’s systems on cloud-hosting provider Linode. ‘The attack was done through compromising a chain of email accounts which eventually allowed the attacker to reset the password for the the Linode server,’ he said. The hacker’s first step was recovering an email address for an account that TradeFortress set up six years ago. The ‘attacker rented an Australian server to proxy as close to my geographical location so it won’t raise alarms with email recoveries,’ TradeFortress said in a forum post.”
http://www.wired.com/wiredenterprise/2013/11/inputs/
Related posts:
‘Drug free’ advocate: I smoked pot in college, of course
Write A House Is Giving Writers Free Homes In Detroit
ACLU: Email reveals feds misled judges to abuse wiretapping powers
Texas man raised over $4.5M in 2012 Bitcoin Ponzi scheme, feds allege
The Pervasive Evil of Communism and the Moral Bankruptcy of Apologists
Software Engineers Make The Most Money At These 25 Companies
Interest-Rate Market Going Berserk
Florida cops went door to door with fake cell device to find one man
Venezuela Arrests Bitcoin Miners; Leading Bitcoin Exchange Shut Down
Uncle Sam’s Marijuana Patch
Trump doesn’t want ISIS “using our Internet”
War Hawk McCain Plays Game on His iPhone During Syria Testimony
The Bull Within the Bear
Florida Upholds Town's Ban on Eating Front-Yard Vegetables
Marc Faber Buying Gold, But Won't Keep It In America