Hackers Asking $7,000 for vBulletin.com Exploit

Status
Not open for further replies.

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,143
The Inj3ct0r Team, the hacker group that claims to be behind the attack, posted a note on Facebook saying that it not only hacked vBulletin.com and Macrumors.com but also got to the shell, the database and the root server. The hackers wanted to prove that “nothing is this world” is safe including vBulletin.com and Macrumors.com.

A hacker group is claiming responsibility for exploiting a zero-day flaw in the vBulletin Internet forum software Relevant Products/Services. Hackers are bragging that they broke into both the MacRumors.com and vBulletin.com forums.

VBulletin Solutions, the company that develops the online forum software, reset all account-holder passwords on Friday. The company has confirmed that customer Relevant Products/Services log-in credentials were indeed stolen.

“Very recently, our security Relevant Products/Services team discovered sophisticated attacks on our network, involving the illegal access Relevant Products/Services of forum user information, possibly including your password,” the company said on its bulletin board. “Our investigation currently indicates that the attackers accessed customer IDs and encrypted passwords on our systems. We have taken the precaution of resetting your account password. We apologize for any inconvenience this has caused but felt that it was necessary to help protect Relevant Products/Services you and your account.”

The Inj3ct0r Team, the hacker group that claims to be behind the attack, posted a note on Facebook saying that it not only hacked vBulletin.com and Macrumors.com but also got to the shell, the database and the root server Relevant Products/Services. The hackers wanted to prove that “nothing is this world” is safe.

“We found a critical vulnerability in vBulletin all versions 4.x.x and 5.õ.x. We've got upload shell in vBulletin server, download database and got root,” the hackers wrote. “Macrumors.com was based on vBulletin CMS. We use 0day exploit on vBulletin, got password moderator. 860000 hacked too. The network security is a myth.”

The Inj3ct0r Team offered to sell the vulnerability for $7,000. The post generated more than 190 likes, 49 shares, and 58 comments as of the time of this writing. One Facebooker named Kori Stroud said, “No one will pay $7000 for this or any other exploit. But good try though.”
Brian Krebs, a former Washington Post reporter who now runs KrebsonSecurity, reports that several individuals do indeed appear to be selling what they claim are zero-day exploits in vBulletin 4.x and 5.x, including the attackers who first contacted him on Thursday claiming responsibility for the break-in.

“That person, using the nickname Inj3ct0r, advertised a copy of the supposed exploit for $7,000, available for payment via virtual currencies Bitcoin and WebMoney,” he wrote in a blog post. “According to this user’s Bitcoin wallet, at least one person appears to have paid for a copy, sending the user 15 Bitcoins on Nov. 15 (when Bitcoin’s value was approximately $435 per BTC, according to Bitcoincharts.com).”

As Krebs sees it, the person who posted on Friday may have seen an opportunity to generate or scam interested buyers by offering to sell the same exploit for just $200 in Bitcoins. Although Krebs said it’s unclear if that sale was for real or a scam, several buyers apparently thought it worthwhile and cheap enough to verify the claim with a payment.

http://www.newsfactor.com/news/Hack...om-Exploit-/story.xhtml?story_id=103003JWTC3V


(An important sidenote from the above story is the value of Bitcoins. A few weeks ago a story was posted here about the ransom the Cryotolocker team was extorting. They were asking 2 BC, at that time valued at 1 Bitcoin per 220USD- which then increased to over 300USD. Today 1BC=574USD. This is getting to be just like Tulipomania).
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top