WARNING: HOLD YOUR ONLINE ORDERS FOR ZZP!!!
#1
Senior Member
Posts like a Northstar
Thread Starter
Join Date: Feb 2003
Location: Sacramento, CA WCBF '06, '07 survivor
Posts: 658
Likes: 0
Received 0 Likes
on
0 Posts
![rrounds is on a distinguished road](https://www.gmforum.com/images/reputation/reputation_pos.gif)
![Default](https://www.gmforum.com/images/icons/icon1.gif)
just saw this on Club GP
http://www.clubgp.com/newforum/tm.as...mode=1&smode=1
could be trouble ?
ROD
(sticky by Admin, thanks for the info, Rod!)
http://www.clubgp.com/newforum/tm.as...mode=1&smode=1
could be trouble ?
![Evil or Very Mad](https://www.gmforum.com/gm/images/smilies/icon_evil.gif)
ROD
(sticky by Admin, thanks for the info, Rod!)
#5
Senior Member
Posts like a Supercharger
Join Date: May 2003
Location: Columbus, OH
Posts: 163
Likes: 0
Received 0 Likes
on
0 Posts
![13secGTP is on a distinguished road](https://www.gmforum.com/images/reputation/reputation_pos.gif)
![Default](https://www.gmforum.com/images/icons/icon1.gif)
I got an email from that guy too. Whats funny is it came to my work email which is Whirlpool/Penske/GE specific. And no one knows it......
I have informed Zoom, and he told me to play along to see what else comes up.....
I have informed Zoom, and he told me to play along to see what else comes up.....
#10
Senior Member
True Car Nut
Join Date: Jul 2006
Location: Granville, Ohio ~NEBF '07 Survivor~
Posts: 5,001
Likes: 0
Received 0 Likes
on
0 Posts
![petraman is on a distinguished road](https://www.gmforum.com/images/reputation/reputation_pos.gif)
![Default](https://www.gmforum.com/images/icons/icon1.gif)
Originally Posted by Zoomer via CGP
So far I have confirmations from people that do not have their email attached to clubGP who have recieved this spam.
I have also received confirmations from people who have never bought from ZZP or had their email attached to ZZP or the other sites who received the spam.
We're still working on the issue and haven't noticed anything strange log ins, changes to anything on the site, coupon codes added or changed, etc.
We have two separate comanies with teams pouring over our code. Neither has found any holes and the software. While based on OScommerce, our site is so highly modified from the orignal code, that the developer was offended when it was called OScommerce. Being this custom, it would be very difficult to hack into our site based on a hole in the code. We're still looking none-the-less. Even not finding anything, we are adding encription to coupon codes, customer data, and putting SSL? on the admin side. Should take effect shortly.
We have been in contact with helidirect and their software developer. They claim that their code is good. Their code and their site are totally different from ours. They also host with a completely different company. They did find the breach though and it relates to their server. For security reasons, I don't want to go into it further until they have completed the patches. We checked our site and server and we did not have the exploits affecting them.
No info from zipzoomfly, but I'm guessing that was added for email legitimacy.
On our site we are leaning towards a brute force attack stealing our admin password which would give them access to the site. He couldn't change code or get in super deep but he could get email addresses, change coupons, look up people'* order history and edit products. The only thing we ever noticed was that one coupon code and nothing more. Since changing our password, we haven't had issues. As a further step we will probably be changing hosts just in case. I'll post more info as I get it.
I have also received confirmations from people who have never bought from ZZP or had their email attached to ZZP or the other sites who received the spam.
We're still working on the issue and haven't noticed anything strange log ins, changes to anything on the site, coupon codes added or changed, etc.
We have two separate comanies with teams pouring over our code. Neither has found any holes and the software. While based on OScommerce, our site is so highly modified from the orignal code, that the developer was offended when it was called OScommerce. Being this custom, it would be very difficult to hack into our site based on a hole in the code. We're still looking none-the-less. Even not finding anything, we are adding encription to coupon codes, customer data, and putting SSL? on the admin side. Should take effect shortly.
We have been in contact with helidirect and their software developer. They claim that their code is good. Their code and their site are totally different from ours. They also host with a completely different company. They did find the breach though and it relates to their server. For security reasons, I don't want to go into it further until they have completed the patches. We checked our site and server and we did not have the exploits affecting them.
No info from zipzoomfly, but I'm guessing that was added for email legitimacy.
On our site we are leaning towards a brute force attack stealing our admin password which would give them access to the site. He couldn't change code or get in super deep but he could get email addresses, change coupons, look up people'* order history and edit products. The only thing we ever noticed was that one coupon code and nothing more. Since changing our password, we haven't had issues. As a further step we will probably be changing hosts just in case. I'll post more info as I get it.