easyhostmedia
Well-known member
So today out of the blue i get this email
strange as i dont have an account with them and never have had. so did some checking and found they are part of hosting24.com which is part of the Hostinger (Hostinger International Ltd) group, so messaged then as no contact details on 0 0 0 webhost website.
the reply i got was
to me this reply is pointless and why point to an article by someone else who has also had an account set up in their mane and points our many security issues with 0 0 0 webhost
From: 0 0 0 webhost
Sent: Friday, October 30, 2015 5:49 PM
To: Terry Robertson
Subject: Important information regarding recent security breach
What happened?
A hacker used an exploit in an old PHP version, that we were using on our website, in order to gain access to our systems. Data that has been stolen includes usernames, passwords, email addresses, IP addresses and names.
Although the whole database has been compromised, we are mostly concerned about the leaked client information.
What did we do about it?
We have been aware of this issue since 27th of October and our team started to troubleshoot and resolve this issue the same day, immediately after becoming aware of this issue.
In an effort to protect our users we have temporarily blocked access to systems affected by this security flaw. We will re-enable access to the affected systems after an investigation and once all security issues have been resolved. Affected systems include our website and our members area. Additionally we have temporarily blocked FTP access, as FTP passwords have been stolen as well.
We reseted all users passwords in our systems and increased the level of encryption to prevent such issues in the future.
We are still working around the clock to identify and eliminate all security flaws. We will get back to providing the free service soon. We are also updating and patching our systems.
What do you need to do?
As all the passwords have been changed to random values, you now need to reset them when the service goes live again.
DO NOT USE YOUR PREVIOUS PASSWORD.
PLEASE ALSO CHANGE YOUR PASSWORDS IF YOU USED THE SAME PASSWORD FOR OTHER SERVICES.
We also recommend that you use Two Factor Authentication (TFA) and a different password for every service whenever possible. We can recommend the Authy authenticator app and the LastPass password manager.
We are sorry
At 0 0 0 webhost we are committed to protect user information and our systems. We are sorry and sincerely apologize we didn't manage to live up to that.
At 0 0 0 webhost our top priority remains the same - to provide free quality web hosting for everyone. The 0 0 0 webhost community is a big family, exploring and using the possibilities of the internet together.
Our leadership team will closely monitor this issue and will do everything possible to earn your trust every day.
Sincerely,
0 0 0 webhost CEO,
Arnas Stuopelis
strange as i dont have an account with them and never have had. so did some checking and found they are part of hosting24.com which is part of the Hostinger (Hostinger International Ltd) group, so messaged then as no contact details on 0 0 0 webhost website.
the reply i got was
PLEASE DO NOT EDIT THE SUBJECT OF THIS EMAIL!
************************
REPLY HAS BEEN ADDED:
************************
Hello ,
We have witnessed data breach and it appears that someone have used your email to register to our website.
Troy Hunt have written an article about this incident, and it appears, that someone have also used his email to register to our site. More info in article at http://www.troyhunt.com/2015/10/breaches-traders-plain-text-passwords.html
We greatly appreciate this opportunity to be of service to you. We hope that all of your concerns have been addressed. Please feel free to reopen this ticket if you need any additional assistance.
Thank you for using our services,
George M.
Help Desk Staff
to me this reply is pointless and why point to an article by someone else who has also had an account set up in their mane and points our many security issues with 0 0 0 webhost
Last edited: