Skip to main content

User login

What is OpenID?
  • Log in using OpenID
  • Cancel OpenID login
  • Create new account
  • Request new password
Register
  • Home
  • Browse
    • 2D Art
    • 3D Art
    • Concept Art
    • Textures
    • Music
    • Sound Effects
    • Documents
    • Featured Tutorials
  • Submit Art
  • Collect
    • My Collections
    • Art Collections
  • Forums
  • FAQ
  • Leaderboards
    • All Time
      • Total Points
      • Comments
      • Favorites (All)
      • Favorites (2D)
      • Favorites (3D)
      • Favorites (Concept Art)
      • Favorites (Music)
      • Favorites (Sound)
      • Favorites (Textures)
    • Weekly
      • Total Points
      • Comments
      • Favorites (All)
      • Favorites (2D)
      • Favorites (3D)
      • Favorites (Concept Art)
      • Favorites (Music)
      • Favorites (Sound)
      • Favorites (Textures)
  • ❤ Donate

Found it.

bart
Tuesday, November 24, 2015 - 06:36
bart's picture

There was an old, unused test Drupal instance that was sitting on the server unpatched, with a couple of PHP scripts sitting in the files directory, including one that was meant to send outgoing mail.  I've removed the test instance in question and started the mail server back up.   It's always possible that I didn't get everything, so please let me know here in a comment (or in a private message) if you receive any more suspicious emails from OGA.

Thanks,

Bart

 

  • bart's blog
  • Log in or register to post comments

Comments

WolfMountainGames
joined 9 years 10 months ago
Tuesday, November 24, 2015 - 10:08
WolfMountainGames's picture

Ah thanks for fixing it!

  • Log in or register to post comments
withthelove
joined 11 years 4 months ago
Wednesday, November 25, 2015 - 03:28
withthelove's picture

 

 

Yay!  Thanks for fixing this!

So it was just somebody remotely exploiting a PHP script to send garbage emails and not someone gaining login on the server itself?

Just curious, and it's ok if you can't or don't want to answer! ;)

 

 

  • Log in or register to post comments
congusbongus
joined 11 years 7 months ago
Wednesday, November 25, 2015 - 21:54
congusbongus's picture

In other words, the attackers had access to email addresses and the mail server, but not passwords?

You should send a mass email to all affected email addresses, and to advise them to ignore emails and definitely not to click any links purporting to be from OGA during the attack. Simply posting this on the front page is going to miss a lot of people.

  • Log in or register to post comments
spikec
joined 12 years 2 months ago
Saturday, November 28, 2015 - 12:00
spikec's picture

The old compromised test install. If I had a dollar for everytime I saw that in my line of work... I agree with congusbongus about sending the mails to the effected. Not sure what your level of experience is with SysAdmining, but a little bash-fu on the mail server's logs should help in determining who was sent the phishing mails, if you haven't already handled it. You find any PHP shells amongst the malicious files?

  • Log in or register to post comments