Jump to content
IObit Forum
Top Free Driver Updater Tools Best 25 PC Optimization Software Best 22 Antimalware Best 22 Uninstaller Software IObit Coupons & Discount Offers PC Optimizer Mac Boost Advice IObit Coupons A Good Utility Program From IObit IObit Promo Codes IObit Coupon Codes IObit Coupons and Deals FAQs Driver Booster Pro Review

ATTENTION Ashampoo users


wozofoz

Recommended Posts

The following quote is just a snippet, please read the full article @

http://www.ashampoo.com/en/usd/dth

 

What happened?

Hackers gained access to one of our servers. We discovered the break-in and interrupted it instantly. The security gap through which the hackers gained access was closed immediately. At the same time we reported this incident to the police. Further investigations are underway. Unfortunately, the traces of the well-concealed hackers currently disperse abroad. That is why the expenditure of the German law enforcement agency was significantly increased and the clearing up has become more difficult.

 

Which data were stolen?

The stolen pieces of information are data of addresses such as name and e-mail address. Billing information (e.g. credit card information or banking information) is definitely not affected, because our shop service contractors are concerned with this data and it is not stored on our system.

 

What are the hackers doing with the stolen information?

Among other things hackers try to use the vulnerabilities in mail server systems of other companies in order to send alleged order confirmations in their name. The company PurelyGadgets has for example announced on Facebook that their servers were used to send bogus confirmations of orders.

[Update (21.04.2011): According to the latest findings and in contrast to previously announced by PureleyGadets on Facebook, the servers of PurelyGadgets were not compromised, but the company name has been used for sending fictitious confirmations of orders.]

The e-mails contain a manipulated PDF document in the attachments that apparently uses security vulnerability in order to load malicious code as soon as one tries to open the PDF.

 

Take care

 

All the best, woz of oz

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...