Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Twitter

Notorious Group OurMine Hacks TechCrunch (betanews.com) 12

Prominent technology blog TechCrunch -- which is often cited on Slashdot -- has become the latest victim of the OurMine hacking group. The notorious group gained access to Seattle-based writer Devin Coldewey's account, and posted the following message earlier today: "Hello Guys, don't worry we are just testing techcrunch security, we didn't change any passwords, please contact us." The post was then promoted as a ticker, the top banner in red and as the main story on TechCrunch's front page. BetaNews adds: The OurMine website says that the group offers "top notch vulnerability assessment", so it's possible that the hack was little more than a PR stunt touting for business. It did not take TechCrunch long to notice and remove the story (and presumably change a series of passwords...) but the site is yet to issue a statement about what has happened.
This discussion has been archived. No new comments can be posted.

Notorious Group OurMine Hacks TechCrunch

Comments Filter:
  • Pi (Score:4, Interesting)

    by FST ( 766202 ) on Tuesday July 26, 2016 @12:00PM (#52582865) Journal
    This is slashSlashdot story 314159.
    • Yes, but the real question is whether or not I should hold out for story 3141592 or 3141593...

  • Yes, no. (Score:4, Insightful)

    by Frosty Piss ( 770223 ) * on Tuesday July 26, 2016 @12:05PM (#52582905)

    The notorious group gained access to Seattle-based writer Devin Coldewey's account, and posted the following message earlier today: "Hello Guys, don't worry we are just testing techcrunch security, we didn't change any passwords, please contact us...

    So they fished a single user's account and by the way, "contact us"? Yeah, no . Coldewey, if he actually has any other access than to submit stories for editorial review (you know, like I do at Slashdot), needs to have his account douched, but beyond that, this is most likely just some "leet" little boys playing on the 'puter.

    If it turns out to be something more than almost nothing, I would be surprised.

  • And yet the slashdot moderators don't consider this post [slashdot.org] to be relevant on a technology site.

    UAC bypass attack on Windows 10 allows malicious DLL loading [helpnetsecurity.com]
  • Oh-em-gee. Good thing there was a news story telling people about it or the only thing people would've noticed was the marginal less spam on the Internet.

Think of it! With VLSI we can pack 100 ENIACs in 1 sq. cm.!

Working...