From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 21390 invoked from network); 2 Apr 2022 20:52:15 -0000 Received: from 4ess.inri.net (216.126.196.42) by inbox.vuxu.org with ESMTPUTF8; 2 Apr 2022 20:52:15 -0000 Received: from 5ess.inri.net ([107.191.111.177]) by 4ess; Sat Apr 2 16:42:40 -0400 2022 Received: from smtpclient.apple ([166.170.221.87]) by 5ess; Sat Apr 2 16:42:39 -0400 2022 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable From: Stanley Lieber Mime-Version: 1.0 (1.0) Message-Id: <9125915D-A156-4DE0-8192-5217D5533299@stanleylieber.com> References: In-Reply-To: To: 9front@9front.org Date: Sat, 2 Apr 2022 16:42:38 -0400 X-Mailer: iPhone Mail (19E258) List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: structured managed ACPI CSS-aware property generator Subject: Re: [9front] werc got "hacked" Reply-To: 9front@9front.org Precedence: bulk we turned off the entire vm until we had a fix. 4chan was able to read files= outside the website root, but nothing private was stored on the server. ver= y old werc passwords for defunct websites were leaked, as well as all of our= mailing list subscriber lists that any of them thought to look for. no othe= r form of attack was reported by 4chan, or detected by us. sl > On Apr 2, 2022, at 4:32 PM, Hensley wrote: >=20 > =EF=BB=BFdid we take down the 9front.org pages or was that 4chan? >=20 > ------- Original Message ------- >=20 >> On Thursday, March 31st, 2022 at 2:38 AM, hiro <23hiro@gmail.com> wrote: >>=20 >> some 4chan has looked into the werc and found some files, some of >>=20 >> which seem to be the werc passwords. >>=20 >> posting here in case somebody has a werc password that is also used in >>=20 >> other places. >=20