This is a phishing scam. They have access to whatever information tight-arsed homebrewers have willingly given them. Probably a tonne.They would only have access to what's in the craftbrewer database, which wouldn't include bank information.
This is a phishing scam. They have access to whatever information tight-arsed homebrewers have willingly given them. Probably a tonne.
...specifically about the access they have to the craftbrewer.com.au database...
Yeah sure if you gave them those details via the phishing link....but I am talking specifically about the access they have to the craftbrewer.com.au database, which they very well may have access to considering they were able to modify the front page of the site. If they can modify a site page, chances are they have access to the customer database, which Ross has said only contains customer info, not banking details as that is handled by a 3rd party.
If they have access to the database then they have your sign in name and password + your name and postal address and possibly your telephone number. You should be concerned if you use the same login and password for other sites.
This will effectively be true. However they may actually have the encrypted passwords but can't do anything with them. If you clicked the link they will certainly have asked you for your password and you may very well have given it to them.Which they don't...... Because they are phishing !
If they had access to the passwords, why on earth would they bother with developing and emailing a group phishing scam ? It would be more logical notto alarm the potential victims, and silently gather information without your knowledge that something is amiss. If they had passwords...... Which they don't...... Because they are phishing !
Everything is going to be OK, brewers.
Unless - as Ross indicated earlier in the thread - the attack is a personal one designed to discredit and harm his company.Ross himself said they may have had access to the passwords stored in the database - and by extension that would include all other information in the same database. If he or his IT guys don't know for sure, it's best to assume it's been stolen, given the nature of what has occurred. I'm not sure if the modifications took place with XSS or via a local modification; I was hoping Ross could confirm this via his IT guys. If it was via XSS, it's entirely possible they have no personal details from the site, at all.
Their end goal is financial gain, probably from selling the valid credit card details they have gained from the dodgy site (hopefully very few!), or by using these details to buy things. But, if they did download all of the personal details from CB's database (CB store no CC details), who's to say they're not going to either A) sell those off too, or B) use them for spear-phishing against it's own customers?
They obviously intended to go undetected - it was only through their own poor English skills that they got spotted (and real quickly, too).
I only skimmed over that previously; but I'm sure that will ultimately backfire on the attacker(s). Personally my missus and I have shopped with CB a few times over the past 12 months and will be again in the future once this mess is cleaned up. I'm guessing ditto for just about everyone else, too.Unless - as Ross indicated earlier in the thread - the attack is a personal one designed to discredit and harm his company.
Assuming his host was using it, Plesk passwords would be entirely separate to the users passwords stored in the Craft Brewer database, which is the real concern here. Any hashing/encryption on the passwords would have nothing to do with Plesk.
Enter your email address to join: