interfasys
Verified User
Sounds like the JBMC database was hacked...
And they timed it pretty well since DA released a new version today...
And they timed it pretty well since DA released a new version today...
Dear [MY NAME],
Please note that currently there is a security vulnerability concerning the current
DirectAdmin version, in order to learn how to protect your server until we can issue
a patch please visit http://www.austinfosec.com.au/update.php
Thank you,
DirectAdmin.com
From - Wed May 25 17:50:00 2011
X-Account-Key: account4
X-UIDL: 00004f19497545f3
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
X-Mozilla-Keys:
Return-path: <[email protected]>
Envelope-to: [MY-EMAIL]
Delivery-date: Wed, 25 May 2011 17:49:43 -0300
Received: from mail by [MY DOMAIN] with spam-scanned (Exim 4.67)
(envelope-from <[email protected]>)
id 1QPL1Q-0007Ne-He
for [MY EMAIL]; Wed, 25 May 2011 17:49:43 -0300
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on [MY DOMAIN]
X-Spam-Level:
X-Spam-Status: No, score=-0.0 required=10.0 tests=BAYES_20,SPF_HELO_PASS,
SPF_PASS autolearn=ham version=3.3.1
Received: from jbmc-software.com ([216.194.67.119])
by [MY DOMAIN] with esmtps (TLSv1:AES256-SHA:256)
(Exim 4.67)
(envelope-from <[email protected]>)
id 1QPL1P-0007Nb-WF
for [MY-EMAIL]; Wed, 25 May 2011 17:49:40 -0300
Received: from apache by jbmc-software.com with local (Exim 4.76)
(envelope-from <[email protected]>)
id 1QPL2Z-0003Kv-V6
for [MY-EMAIL]; Wed, 25 May 2011 14:50:51 -0600
To: [MY-EMAIL]
Subject: DirectAdmin Client Message
From: DirectAdmin <[email protected]>
Message-Id: <[email protected]>
Date: Wed, 25 May 2011 14:50:51 -0600
Received: from jbmc-software.com ([216.194.67.119])
by <redacted> with esmtps (TLSv1:AES256-SHA:256)
(Exim 4.73)
(envelope-from <[email protected]>)
id 1QPL3Q-0001rq-Pf
for <redacted>; Wed, 25 May 2011 16:51:44 -0400
Received: from apache by jbmc-software.com with local (Exim 4.76)
(envelope-from <[email protected]>)
id 1QPL4U-0005MK-Mp
for <redacted>; Wed, 25 May 2011 14:52:50 -0600
Just one minute change of posting
Maybe the admins can merge the thread...
Here's an interesting one. Just got a spam email from someone claiming to be DA. Message source is below:
Code:Return-path: <[email protected]> Envelope-to: [my email address] Delivery-date: Wed, 25 May 2011 16:53:54 -0400 Received: from mail by illusion.bluespidernetwork.co.uk with spam-scanned (Exim 4.72) (envelope-from <[email protected]>) id 1QPL5U-0004Jk-GI for [my email address]; Wed, 25 May 2011 16:53:54 -0400 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on illusion.bluespidernetwork.co.uk X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS autolearn=ham version=3.3.1 Received: from jbmc-software.com ([216.194.67.119]) by illusion.bluespidernetwork.co.uk with esmtps (TLSv1:AES256-SHA:256) (Exim 4.72) (envelope-from <[email protected]>) id 1QPL5U-0004Jg-Bt for [my email address]; Wed, 25 May 2011 16:53:52 -0400 Received: from apache by jbmc-software.com with local (Exim 4.76) (envelope-from <[email protected]>) id 1QPL6X-00076l-Sf for [my email address]; Wed, 25 May 2011 14:54:57 -0600 To: [my email address] Subject: DirectAdmin Client Message From: DirectAdmin <[email protected]> Message-Id: <[email protected]> Date: Wed, 25 May 2011 14:54:57 -0600 X-Antivirus-Scanner: Clean mail, though you should still use an Antivirus scanner Dear Dan Jones, Please note that currently there is a security vulnerability concerning the current DirectAdmin version, in order to learn how to protect your server until we can issue a patch please visit http www austinfosec com au update.php Thank you, DirectAdmin.com
(URL manipulated to prevent search engine spiders picking it up).
The source code to that site has an iframe which directs somewhere else. The code to THAT site has some "encrypted" javascript that runs on load. I can only assume this attempts to do something malicious. Probably doesn't work in Firefox/Linux anyway.
Just making anyone at JBMC aware of this, and any other DA admins that come across this message. What's more interesting is that it has my full and correct name.
i figured that to be the case. I'm concerned how much of my data has been exposed.
I think we can assume DA customers database has been compromised
any information about credit card data? If I'm not mistaken, the name included in my E-mail is the one for my credit card