Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

Thousands of Adult Website Accounts Compromised 167

Keith writes "Tens of thousands — or maybe more — accounts to adult websites were recently declared compromised and apparently have been that way since some time in October 2007. The break occurred when the NATS software used to track and manage sales and affiliate revenues was accessed by an intruder. The miscreant apparently discovered a list of admin passwords residing on an unsecured office server at Too Much Media, which makes and maintains NATS installations for adult companies. It would appear that Too Much Media knew of the breach back in October, and rather than fixing the issue tried to bury it by threatening to sue anyone in the adult industry who talked about it." The article gives suggestions for anyone who opened an account at any adult website in the last several months.
This discussion has been archived. No new comments can be posted.

Thousands of Adult Website Accounts Compromised

Comments Filter:
  • by mochan_s ( 536939 ) on Tuesday December 25, 2007 @05:41AM (#21813430)

    In addition, it's porn. Individual end users cannot protest very much without either A: Admitting they pay for porn online or B: being the subject of askance glances and the occasional, "Methinks he doth protest too much."

    You do realize that prepaid credit cards exist, right? You can set any name to it and use it. Since you don't have to have anything physical delivered and it's all online, then you can create fake names and leave out addresses.

  • Gift Cards (Score:5, Informative)

    by harlows_monkeys ( 106428 ) on Tuesday December 25, 2007 @06:00AM (#21813484) Homepage
    This is what gift cards are for, available from numerous outlets (Safeway, Office Depot, Wal-Mart, and similar places). You can get prepaid VISA and Mastercard giftcards, which work great for purchasing porn, or other questionable things of an online nature, where you can't trust the vendor. A $50 card will typically cost about $55.

    After you buy it, you go to a web site from the card vendor, enter the card number and security code, and then set the user name and billing zip code. Then go wild (well, to the extent that you can go wild with $50...). Here's one such card [allaccessgift.com] that is available at a lot of places.

    There are also cards that you can refill from your "real" credit card, but then you are easier to trace. Might as well use a non-refillable card, purchased with cash. That way, if "all models 18 or over, proof on file" turns out to not quite be true, no credit card that can be tied to you will be in the site's records. :-)

    If that's not a concern, though, and you are just trying to limit exposure of your real credit card, then go ahead with the refillable cards. In fact, there are even some that are purely online. They don't provide a physical card. You just go to their site, sign up with your credit card, and they give you a credit card number to use online, with a limit of whatever you want to transfer from your credit card. Here is one such virtual card [www-card.com].

    NOTE: some gift cards cannot be used for porn or gambling, so choose appropriately. And some can be so used, but add a surcharge for porn.

  • RE: The Truth (Score:5, Informative)

    by Archon-X ( 264195 ) on Tuesday December 25, 2007 @06:26AM (#21813570)
    Let me be the first to actually point out the key factors in the situation.
    I work in adult, and have worked with this CMS very closely for the last 2 years.
    I'm not on anyone's side, but unfortunately this problem has been surrounded by a lot of misinformation.

    • No credit card information was stolen. Website owners seldom [read: never] have access to this data, it's kept by the credit card processors
    • The information that WAS compromised was member information, primarily email addresses, for use in spamming. It 'makes sense' - a list of verified buyers is like the 'holy grail' for spammers.
    • The hackers used a list of admin accounts to poll everyone's CMS systems on the hour, and pull out this data. They have either covered their tracks well, or not at all, because they left reams of IP data, and you can see in the logs of the system itself, what information they've pulled.


    It is interesting and rather important to note: The poster of the blog article is an absolute douchebag. I'm not happy with the situation obviously, I had my own system compromised, but this guy is an idiot on a warpath - 95% of what's written on his blog is off in the fairyland.
    He fails to mention that he's hated by the industry, mainly for the reason that he posted 300 username / password combinations of webmasters publically, which resulted in a lot of them having money stolen from online accounts, etc.
    More intelligent ramblings from this guy: My Guide To Tax Evasion [gofuckyourself.com] - Why The Unibomber was right [keithkimmel.com]

    Summary: The breach was real. Scope seems to be limited ONLY to member data. Signed up? Expect some spam. Signed up with a password that you use on all your accounts? check your head, change the passwords.

    Read more about our friend "minusonbit" - here - on an industry forum [gofuckyourself.com] and judge for yourself.
  • by Anonymous Coward on Tuesday December 25, 2007 @06:27AM (#21813572)
    The real kicker is that every one of our customers that use NATS have been complaining that their affiliates (people that send traffic to them) are being spammed on one-time-use addresses they only typed into NATS. TMM told them that it was our systems that had been hacked, even after we submitted detailed information to them.

    Our customers are not happy.
  • Re:Gift Cards (Score:5, Informative)

    by Archon-X ( 264195 ) on Tuesday December 25, 2007 @06:33AM (#21813598)
    No credit card information was stolen. It's impossible.
    CC information does not, repeat, does not [read: is illegal to keep] on the servers of sites.
    It is maintained by the billers and processors, who thankfully, have better security.

    The threat of stolen CC info is FUD by the poster.
  • by minusonebit ( 1207734 ) on Tuesday December 25, 2007 @07:30AM (#21813782)

    I am the guy who wrote the story.

    I have already been threatened with a libel lawsuit by a senior executive of Too Much Media for publishing this. I published it anyway. They are still making lawsuit threats http://www.gfy.com/showpost.php?p=13561241&postcount=418 [gfy.com]. I honestly do not care about their threats, I will continue to give media interviews and I will continue to push this story out there. Because people need to know what the industry does not want to tell you.

    Go ahead and do what the other poster recommends. Go to GFY and look up "minusonebit". You'll see that I am not well liked within the industry. Its a good thing I am not in the industry to make friends with people therein. I have a growing following of trolls and bashers who are trying everything to tear me down because I have told it like it is. I went to GFY to grow a venture I started. I have been around there a while and I have seen alot of BS go down but this takes the cake.

    The adult industry would love to sweep this under the rug. They have already directed everyone here to try and do damage control, to vote this down or do whatever they can to keep it from spreading. I don't think thats the way it should be handled so I have spent most of the weekend making sure that this story gets out and people The industry has also been telling me how http://www.gfy.com/showpost.php?p=13561426&postcount=12 [gfy.com] this story wont last here because apparently the ownership of Slashdot has an interest in NATS.

    Yes folks, people still do buy porn. Not everyone uses the torrents. But this is your credit card information that they couldn't care less about. They tried to cover it up. They are still trying to cover it up! They still have not notified the customers. Please people, flush this toilet. Write to your elected officials and your banks and demand action. This is not the first time that the industry has suffered a breach. But it hasn't been publicized like this one. This is not how all of the adult industry wants to do business. Some people want to bury this as well and have business as usual. But some of us welcome a chance to clean this mess up and restore respect to the profession.

    I STAND BEHIND MY REPORT. I CHALLENGE ANYONE TO DISPROVE IT.

  • by minusonebit ( 1207734 ) on Tuesday December 25, 2007 @07:42AM (#21813810)
    For those of you who'd like to see how the Industry's media reported on this mess, checkout this link. http://www.xbiz.com/news/88230 [xbiz.com] XBiz whitewashed the story bigtime. And that flat out lied about billing information not being at risk. The hackers had administrative passwords. They had the equivalent of root. It was all there for the taking. No one knows if they were taken because TMM has not been forthcoming or helpful with that end of things. Of course, they say the billing DBs were safe at all times, but they don't exactly have a track record of honesty or trust in other matters. John Albright at TMM once owned a site that installed trojans on people's computers. He claims to have sold the company and it was the new owners. Who knows what the deal is.
  • by Archon-X ( 264195 ) on Tuesday December 25, 2007 @08:01AM (#21813868)
    As posted before, this guy is nothing more than a troll.
    It's very simple: You've cast aspertions that CC data was stolen.

    Post proof. We're waiting.

    Anyone can go to http://www.gofuckyourself.com/forumdisplay.php?f=26 [gofuckyourself.com] an industry forum, search for 'minusonebit', and read for yourself about this guy, and the misinformation that surrounds him.

  • Re: The Truth (Score:2, Informative)

    by minusonebit ( 1207734 ) on Tuesday December 25, 2007 @08:03AM (#21813872)
    As has been clarified on GFY several times, I did NOT post anyone's passwords anywhere. I linked to a Google cache of about 300 of them that was exposed due to another one of this industry's miserable failings in the security area - a poorly design admin area that did not censor the passwords that got stored in Google. And I covered that on my blog as well. I have never heard the end of that because other people in the industry were upset that another dirty little adult industry secret made it out for everyone to see. You can see what I wrote at the link below - including the link to the now removed Google cache. http://www.icwt.us/index.php/2007/09/30/privacy-of-adult-webmasters-breached-by-google-search-poor-security/ [www.icwt.us] Opinions are like anuses. Everybody has got one. Plenty of people don't like me. Good for them. I honestly could not care less. Yes, I am pretty much universally hated in the adult industry. Thats what happens when you poo poo on everyone in a public manner. But as I have said many times before I do not care and after this over, the industry will be better because of what I have done. No one will ever do something bone headed like this again because this one is going to cost some people their livelihoods and adult websites are going to suffer a hit in the PR department which sadly is a necessary cost to make sure that this does not happen again.
  • by owlnation ( 858981 ) on Tuesday December 25, 2007 @08:04AM (#21813876)

    In addition, it's porn. Individual end users cannot protest very much without either A: Admitting they pay for porn online or B: being the subject of askance glances and the occasional, "Methinks he doth protest too much." Some folks won't care, but the kind of people who actually have influence in the real world can't afford that kind of tarnish.
    You're looking at this from an English speaking World perspective. Note that in countries such as Holland or Germany, where most of the adult/sex industry is completely legal, consumers of adult products have as much rights as any other consumer. There's also not the stigma attached to such things as there is in the UK or the US. People there would sue, and would sue openly.

    All in all, in countries like Germany there's a much healthier attitude to sex and the adult industry. Both consumers and providers are much better protected there.

    It seems to me that in the UK in particular (which is a semi-fascist state at best anyway) the repression and legislation of the adult industry is increasing, from what was already a very repressed and intolerant level. This is not healthy, this simply makes it easier for organized crime, and incidents like this one to occur.
  • by Amelia G ( 672327 ) on Tuesday December 25, 2007 @08:12AM (#21813906) Homepage
    I've seen estimates as high as that 95% of adult sites use NATS and that is just patently not the case. First of all, only sites which have affiliate programs would have any use for NATS at all. Many site owners who have affiliate programs use one of the half dozen other major affiliate program solutions out there or use a custom software solution.

    I can personally vouch for the fact that neither BlueBlood.com [blueblood.com] nor SpookyCash.com [spookycash.com] nor any of their subsidiary or partner sites have ever implemented NATS in any way.

    If, during the time of the alleged NATS security breach, you bought a membership to an adult site, the odds are that no vital data of yours was harvested. If you happened to buy from a site using NATS and anything was harvested, it was probably only your email address. Which sucks, but does not mean you need to cancel your credit cards and checking account. Some industry insiders allege that NATS knew about the data security breach and ignored it, some say NATS thought they had successfully fixed the problem, and some say there was no technical data leak and NATS people were the ones spamming. The specifics do not matter all that much to me because I don't personally use their software and I'm resigned to being spammed. Your credit card info is probably safer at an adult site than most places on the net because adult industry tends to lead technological advances in media.

    I do think it is important for people to understand that a sites' members are vital for the site to continue. If you like the kind of content a site is posting, buying a membership is the most effective way to keep that kind of content being produced. It might seem like your few dollars, plus or minus, would not make that big a difference, but it really does. It is basically voting with your wallet for what you want to exist and flourish.
  • Re: The Truth (Score:3, Informative)

    by Archon-X ( 264195 ) on Tuesday December 25, 2007 @08:18AM (#21813922)
    Really? Please explain:

    The MinusOneBit Guide to Tax Evasion [gofuckyourself.com]

    And the kicker:
    If You Cheat on Your Taxes and Get Away With It... Do the Right Thing... [gofuckyourself.com]

    If You Cheat on Your Taxes and Get Away With It... Do the Right Thing...
    E-mail me at minusonebit@gmail.com and tell me how you did it so I can spread the tip to others.
  • Re: The Truth (Score:4, Informative)

    by Archon-X ( 264195 ) on Tuesday December 25, 2007 @10:04AM (#21814264)

    Really? Not even when the user signs up for the account and enters the credit card number?

    Now, I've never actually bought porn before, but assuming that porn sites work like every other ecommerce site in existance, the credit card number is most certainly entered into a form that's sent to the web server of the porn site. And if the web site has been compromised by a shell account that has premissions to modify the website software (like, say, it has been), then the credit card numbers of anyone who has signed up since the breach are likely to have been stolen.
    It actually doesn't work like that.
    NATS, the software in question here, acts as a gateway to the payment processor. CC information is never entered or passed through NATs.
    It's just the same as when you make a purchase on a website through paypal. No CC information information is ever given to the site, all they receive is a postback. That's exactly the situation here, CC data is stored on the processing servers, and is completely distinct from this mess.

    It was reported that CC data was stolen, or may have been but this is entirely untrue as you can see above.

    You gave a privileged SSH account to a third party, what did you expect?!
    No, I didn't. The accounts were NOT ssh accounts, they were logins to Web UI systems.

    Seems? So even you admit you don't actually know whether credit card numbers were stolen.
    I do. CC numbers are not stored on this system [I sound like a broken record]. When I say 'seems', I mean that the hacker did not try to take any other information, such as affiliate information, statistics information, or anything else stored in NATS, the software in question.

    I'll bet you some were stolen. Any account opened since the breach or that used a recurring payment scheme should check to make sure their credit card wasn't stolen.
    Rubbish. This information is not stored in the software or on any of the servers. You can 'bet' all you want. I'll take you on that wager, because you're posting and not knowing what you're talking about.
  • by jmac1492 ( 1036880 ) on Tuesday December 25, 2007 @10:56AM (#21814526)
    I originally modded this up, but then I read the post again. The website is "gofuckyourself.com" Any address with the word fuck in the title should probably be considered NSFW or NSFMCFM ("More conservative family members"). Especially when the OP called it a fourm for porn industry insiders. Duh.

    So I'm posting to undo the moderation.

  • by Anonymous Coward on Tuesday December 25, 2007 @04:35PM (#21816536)
    Is there really anyone that close to you who still thinks looking at porn is an awful stigma?

    A hell of a lot of women don't like the idea. Maybe that's why geeks find it hard to have women stay close for long.

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...