Results 1 to 5 of 5

Thread: Warning - Distributed brute force attack on user profiles in progress

  1. #1
    Site Caretaker Dave A's Avatar
    Join Date
    May 2006
    Location
    Durban, South Africa
    Posts
    22,663
    Thanks
    3,309
    Thanked 2,676 Times in 2,258 Posts
    Blog Entries
    12

    Warning - Distributed brute force attack on user profiles in progress

    Dear members of TFSA,

    I advise that there is currently a distributed brute force attack trying to gain access to member profiles on TFSA.

    It is a particularly clever attack that has attempted to be stealthy in that it is not triggering the user profile lockout limit (which is triggered when there are 5 unsuccessful log-in attempts from the same IP address). It is doing so by using a very wide range of IP addresses and appears to be deliberately stopping short of making too many attempts from the same IP address.

    So far I have identified 7 hacked profiles - all of which fall in the category of dormant (generally never posted or not logged into for over a year). However, other than seeing a steady stream of failed login attempts at a rate of 3 to 5 per minute in the activity log, I can't see which user profiles are being attacked.

    I am working on a way to blunt this form of brute force attack without triggering a flood of warning emails to legitimate users of the site. In the interim I ask that regular users in particular ensure that they have strong passwords that would make their profile difficult to hack.

  2. #2
    Diamond Member Neville Bailey's Avatar
    Join Date
    Nov 2010
    Location
    Westville, Durban
    Posts
    2,763
    Thanks
    44
    Thanked 452 Times in 397 Posts
    Thank you for the heads up, Dave.

    I have just changed my password.
    Neville Bailey - Sage Pastel Accounting Consultant
    www.accountingsoftwaresupport.co.za
    neville@accountingsoftwaresupport.co.za
    IronTree Online Solutions

    "Give every person more in use value than you take from them in cash value."
    WALLACE WATTLES (1860-1911)

  3. #3
    Diamond Member AndyD's Avatar
    Join Date
    Jan 2010
    Location
    Cape Town
    Posts
    4,924
    Thanks
    576
    Thanked 934 Times in 755 Posts
    A bit late I know but hope you guys had a great holiday and all the best for 2023.

    Thanks for the heads-up Dave. Why would they go to such sophisticated lengths to hack low level accounts? Even if they were sucessful on a small scale what have they got to gain?
    _______________________________________________

    _______________________________________________

  4. #4
    Site Caretaker Dave A's Avatar
    Join Date
    May 2006
    Location
    Durban, South Africa
    Posts
    22,663
    Thanks
    3,309
    Thanked 2,676 Times in 2,258 Posts
    Blog Entries
    12
    Quote Originally Posted by AndyD View Post
    A bit late I know but hope you guys had a great holiday and all the best for 2023.

    Thanks for the heads-up Dave. Why would they go to such sophisticated lengths to hack low level accounts? Even if they were sucessful on a small scale what have they got to gain?
    So far it has just been to post links to a crypto pump website. The posts have been caught by the auto-moderation scripts which is why no-one else will have noticed up to now. Sometimes hacked accounts are used for PM spam, but no evidence of that in this instance as yet.

    So far our systems have coped with the consequences well. However, if they manage to hack a regular's account, it will become a much more significant challenge to contain or prevent nuisance.

    The sophistication is probably to delay detection of their activities, but it is also a way to be able to attack at a faster rate if you don't trip known lock-out mechanisms. My immediate problem is I can make mods in the code to lock out profiles quicker and for longer, but it may impact normal use if they are targeting regulars, and it will seed a flurry of "failed log-in" notification emails. Kinda feeling this one over for an elegant solution.

    In the meantime, encouraging strong passwords seems the first step to mitigate.
    Last edited by Dave A; 20-Jan-23 at 07:14 AM.

  5. #5
    Diamond Member Mike C's Avatar
    Join Date
    Apr 2012
    Location
    Umkomaas
    Posts
    2,857
    Thanks
    247
    Thanked 371 Times in 327 Posts
    Thanks Dave. Password changed.
    No act of kindness, no matter how small, is ever wasted. - Aesop "The Lion and the Mouse"

Similar Threads

  1. WIP (work in progress) journals
    By mango in forum Accounting Forum
    Replies: 9
    Last Post: 07-Mar-19, 01:22 PM
  2. Virtually Distributed Co-Founders
    By project x in forum Business Online Forum
    Replies: 2
    Last Post: 01-May-12, 11:14 PM
  3. The Genuine Progress Indicator vs GDP
    By duncan drennan in forum Business Finance Forum
    Replies: 2
    Last Post: 13-Feb-08, 12:29 PM
  4. BEE progress – depends on how you look at it
    By Eugene in forum BEE and Employment Equity Forum
    Replies: 1
    Last Post: 18-Aug-07, 07:05 PM

Did you like this article? Share it with your favourite social network.

Did you like this article? Share it with your favourite social network.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •