WHMCS kena hack ?


Status
Not open for further replies.

budiono

Expert 1.0
Just share... ini Berbahaya! database global whmcs udah ke expose sudah seperti info diatas.
ada temen saya yg ym dan infokan sdh download databasenya kalau member saya sendiri detail order semuanya kelihatan
saya dikasih file .txt dari db yg di download, yang cuman ngasih tau table akun kita disana. Cocok semuanya! Horrayyyyy :42:
Pastinya semua akun juga sama nasibnya.

maksudnya, apakah dari data yang tersebar itu ada data dari member di instalasi whmcs kita?
 

mixmaxspace

Hosting Guru
maksudnya, apakah dari data yang tersebar itu ada data dari member di instalasi whmcs kita?

Data-data member dari whmcs.com aja kok mas, misalnya detail order, detail Leasednya dan lainnya. Semuanya Cucok Baba :109:
Kalo detail akun klien whmcs kita mah enggak ke expose lah, itu dah di db server masing2 dong
 

mixmaxspace

Hosting Guru
Contoh:

cat whmcscom_clients.sql | grep domainmu

(xx363, xx745, 'Trial-XXXXXXX27875cb1e20', 'clients.domainmu.com,Wannafind.dk', 'x.x.x.x', '/home/domainm/public_html/clients', 1, 'Expired', '2009-06-14 00:00:00'),
(xx694, xx567, 'Leased-XXXXXXX6692d9883371d', 'clients.domainmu.com,Wannafind.dk', 'x.x.x.x', '/home/domainm/public_html/clients', 7, 'Suspended', '2010-12-18 10:58:43'),
(xx700, xx9847, 'Leased-XXXXXXcf05c52075e46', 'clients.domainmu.com,Wannafind.dk', 'x.x.x.x', '/home/domainm/public_html/clients', 2, 'Active', '2012-05-12 03:31:39'),
(xx12, '2009-08-05 16:36:28', 'clients.domainmu.com', 'clients.domainmu.com', 1, 0, 0),
(xx71, '2009-09-27 16:53:29', 'domainmu.com', 'domainmu.com', 1, 0, 0),
 

voezie

Hosting Guru
File DB SQL nya 806MB , data pentingnya sendiri yang berisi detail contact, password dan CC / Kartu kredit sekitar 55MB , yang paling besar data sent email dan ticket sekitar 277MB , dari data tersebut iseng2 saya coba login secara random, ternyata masih banyak member yang blum merubah password nya :109:
 

vkios01

Expert 1.0
File DB SQL nya 806MB , data pentingnya sendiri yang berisi detail contact, password dan CC / Kartu kredit sekitar 55MB , yang paling besar data sent email dan ticket sekitar 277MB , dari data tersebut iseng2 saya coba login secara random, ternyata masih banyak member yang blum merubah password nya :109:

wiw ngeri juga, ini kalau di salah gunakan bisa fatal hasilnya..
mungkin dibuat pengalaman developer client billing yang lain untuk tidak menyimpan data pasword kliennya :S
 

GriyaHosting

Expert 1.0
Contoh:

cat whmcscom_clients.sql | grep domainmu

(xx363, xx745, 'Trial-XXXXXXX27875cb1e20', 'clients.domainmu.com,Wannafind.dk', 'x.x.x.x', '/home/domainm/public_html/clients', 1, 'Expired', '2009-06-14 00:00:00'),
(xx694, xx567, 'Leased-XXXXXXX6692d9883371d', 'clients.domainmu.com,Wannafind.dk', 'x.x.x.x', '/home/domainm/public_html/clients', 7, 'Suspended', '2010-12-18 10:58:43'),
(xx700, xx9847, 'Leased-XXXXXXcf05c52075e46', 'clients.domainmu.com,Wannafind.dk', 'x.x.x.x', '/home/domainm/public_html/clients', 2, 'Active', '2012-05-12 03:31:39'),
(xx12, '2009-08-05 16:36:28', 'clients.domainmu.com', 'clients.domainmu.com', 1, 0, 0),
(xx71, '2009-09-27 16:53:29', 'domainmu.com', 'domainmu.com', 1, 0, 0),


Apakah terlihat passwordnya ? Plain text / hash ?
 

voezie

Hosting Guru
wiw ngeri juga, ini kalau di salah gunakan bisa fatal hasilnya..
mungkin dibuat pengalaman developer client billing yang lain untuk tidak menyimpan data pasword kliennya :S

Password sudah di encrypt, tapi masih terang benderang seperti saya membaca tulisan ini, kartu kredit juga sudah di encrypt plus hash, tapi masih juga terang benderang, salahnya whmcs mereka menyimpan data kartu kredit di database nya, seharusnya pakai pihak ketiga saja seperti paypal atau quantum gateway
 

drupadi

Apprentice 1.0
21st May 2012 - Further Update - WHMCS Forums

21st May 2012 - Further Update

Following an initial investigation I can report that what occurred today was the result of a social engineering attack.

The person was able to impersonate myself with our web hosting company, and provide correct answers to their verification questions. And thereby gain access to our client account with the host, and ultimately change the email and then request a mailing of the access details.

This means that there was no actual hacking of our server. They were ultimately given the access details.

This is obviously a terrible situation, and very unfortunate, but rest assured that this was no issue or vulnerability with the WHMCS software itself.

We are immediately reviewing all of our hosting arrangements, and will be migrating to a new setup at the earliest opportunity.

I would like to take this opportunity to thank all of you who have sent in messages of support, and offers of help. It has clearly been a very stressful time, and I thank everyone both personally and on behalf of WHMCS for their loyalty and support.

The matter is now in the hands of the FBI.
__________________
█ WHMCompleteSolution
█ The Complete Client Management, Billing & Support Solution
WHMCS - The Complete Client Management, Billing & Support Solution

Kalo yang nulled di laporin ke FBI juga gak ya?
 
Status
Not open for further replies.

Top