• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Hahahaha..PA website got hacked!!! Any bros here did it?

kingrant

Alfrescian
Loyal
Joined
Feb 8, 2009
Messages
7,933
Points
48
SINGAPORE NEWS




PA website hacked
By Kimberly Spykerman | Posted: 02 December 2012 1500 hrs




SINGAPORE: The website of the People's Association (PA) has been hacked and is currently not available.

A spokesman told Channel NewsAsia on Sunday evening that the PA is working to restore the website.

The spokesman said the PA discovered what it described as an "intrusion" on its corporate website, which provides general information on the association and its programmes.

The website is not for transactions.

The websites of four Community Development Councils (CDCs) which are linked to the PA were also affected. Users can't access the websites of the North West, North East, South East and South West CDCs for the time being. Only the website of Central CDC is not affected.

The association is investigating and is tightening the security of the website.

A viewer sent an email to Channel NewsAsia on Sunday afternoon, pointing out that the website had a picture of a figure in a hoodie, accompanied by the words "Hightech Brazil Hackteam".
 
Could be the work of Chinese agents!

I smell that too. Wait till they hack MINDEF, PMO, MTI and MFA and MOF. We are using so much PRC hardware and we take so many India sub standard contractors we are asking for it. See how Leegime throw thunder and lightning but still get shafted up their asses. Watch.
 
At any given time, at least 3 to 5 bots originating from China are attempting SSH login to this server. It's an ongoing process and it has been going on for many years.

The bots probe for weaknesses... open ports... weak passwords. If they gain access, most of the time, nothing happens. The server is simply flagged for future use. That's why it's so important to change passwords on a regular basis.
 
This is a common event happening to most production servers.
There are ways to prevent, detect an intrusion ie. IDS eg SNORT, etc...

Common practice is to disable root login via SSH and use another port instead of 22, etc....

Here is a guide to ssh server best practices
http://www.cyberciti.biz/tips/linux-unix-bsd-openssh-server-best-practices.html

It's all done. I'm no server security expert. I leave it to my host to set up the security infrastructure. I just do the routine maintenance.
 
Back
Top