“TradeFortress says that this was a social engineering attack, meaning that the attacker masqueraded as someone he wasn’t in order to get access to the site’s systems on cloud-hosting provider Linode. ‘The attack was done through compromising a chain of email accounts which eventually allowed the attacker to reset the password for the the Linode server,’ he said. The hacker’s first step was recovering an email address for an account that TradeFortress set up six years ago. The ‘attacker rented an Australian server to proxy as close to my geographical location so it won’t raise alarms with email recoveries,’ TradeFortress said in a forum post.”
http://www.wired.com/wiredenterprise/2013/11/inputs/
Related posts:
Slave Dollars: State Guarantee Private Prisons 96% Occupancy
Indiana education commissioner made sure GOP donor’s charter school got top marks
As Chinese Stocks Sink, Bankers Begging Friends For Deposits On WeChat
Homeland Security Purchases 2,700 Light-Armored Tanks to Go With Their 1.6 Billion Bullet Stockpile
Lew Rockwell: The First 30 Years of the Mises Institute, and the Future
How CBP Illegally Tried to Unmask a Rogue Twitter Account
“3% Down” Mortgages: They’re Back!
The FED’s $500 Billion/Year Mortgage Subsidy Has Backfired
Indiana: Court Overturns Stop For Hole In Tail Light
State-Run Single-Payer Health Care: Prohibitively Expensive—and Illegal?
Jason King of Sean's Outpost on Bitcoin and Charity
Tom Woods: They Have Rigged The System To Ensure Fraud
MIT creates the first perfect mirror
IRS Declares War on Bitcoin Privacy, Sues Coinbase
Jeffrey Tucker on arrest of Bitinstant's Charlie Shrem