![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|
|
#1
|
|||
|
|||
![]()
There is little personal data at risk for most of AH's affected.
When you register, you provide your name, address, email and phone. No financial info or any kind(credit card or bank account info) nor SS #. AH's taking Paypal and Credit cards might have another issue, if they have data on their server, more likely it's on the payment processors side and quite secure. I think the jist here was to hold Simple hostage and not gain benefit from the users info, otherwise they would have stayed quiet and milked the data for a long time. |
#2
|
|||
|
|||
![]()
I understand what you're saying Scott, my point was to err on the side of caution, not that anything definitively happened.
__________________
Check out https://www.thecollectorconnection.com Always looking for consignments 717.327.8915 We sell your less expensive pre-war cards individually instead of in bulk lots to make YOU the most money possible! and Facebook: https://www.facebook.com/thecollectorconnectionauctions |
#3
|
|||
|
|||
![]()
MeiGray is part of this as well.
Additionally, if user IDs are tied to their personal information and large purchases, this could help further identify "high value" targets. Don't cast off PII so easily.
__________________
An$on Lyt!e Last edited by Throttlesteer; 12-20-2020 at 10:10 AM. |
#4
|
||||
|
||||
![]()
I think Scott's assessment makes sense. If they were stealing personal financial information, they wouldn't say anything. They would try to be completely covert about that.
Quote:
|
#5
|
|||
|
|||
![]()
Well if it's ransomware it means someone has control of their servers. That means they have control of ALL info. So if they keep credit card info on file, it's in there. I don't believe they encrypt passwords, so there's that too. If you use the same passwords for important things such as credit cards, banking, etc., you might want to make some changes. I know some are joking on this thread, but this is serious. ALL of SA customers (auction houses) have been compromised.
|
#6
|
||||
|
||||
![]() Quote:
|
#7
|
||||
|
||||
![]() ![]()
__________________
Read my blog; it will make all your dreams come true. https://adamstevenwarshaw.substack.com/ Or not... |
#8
|
|||
|
|||
![]()
Net54 Members, the threat actors have encrypted our servers and the firm we have hired to negotiate with the threat actors have told us that the threat actors usually do not steal the data in these instances but anything is possible, We have Cyber insurance and we have been told that a full forensic analysis will be done once the key to the encryption has been delivered (we have paid the ransom and are awaiting the keys but we have been told that the threat actors usually do not work on the weekends). I wish I had more answers and understandings of why this has happened and when it will end. We will get answers to you as quickly as possible and thank you for your patience and support
|
#9
|
||||
|
||||
![]()
My business site does not provide access to payment info. That is handled through my merchant and even I do not see payment info beyond last four. Though refunds are possible, no money can be withdrawn beyond the initial approved transaction. Name, addresses, email and phone numbers are accessible.
__________________
"Chicago Cubs fans are 90% scar tissue". -GFW |
#10
|
||||
|
||||
![]() Quote:
I m involved with Information Security as a profession and in my experience - the attackers are really only interested in getting paid (usually thru Bitcoin as it is almost impossible to trace). Additionally, In almost ALL cases - once the payment is made the victim WILL receive instructions on how to recover their data. In my opinion - there are many more $$ and much less chance of getting caught by doing what they do best - extorting cash from their victims. https://blog.emsisoft.com/en/36569/t...an-one-in-ten/ A well designed security posture can nearly eliminate Ransomware Breach but can get quite expensive and smaller companies struggle with trying to provide adequate security against ALL Internet perils.
__________________
Lonnie Nagel T206 : 225/520 : 43% |
#11
|
||||
|
||||
![]() Quote:
|
#12
|
||||
|
||||
![]() Quote:
I believe that in Sterling's case the issue was on the Simple Auction provider (cloud?) side and not on the Sterling Side. So not only do you have to protect yourself - you have to be reasonably sure that the companies you do business with are also protecting themselves.
__________________
Lonnie Nagel T206 : 225/520 : 43% |
#13
|
|||
|
|||
![]()
+1000
__________________
Check out https://www.thecollectorconnection.com Always looking for consignments 717.327.8915 We sell your less expensive pre-war cards individually instead of in bulk lots to make YOU the most money possible! and Facebook: https://www.facebook.com/thecollectorconnectionauctions |
#14
|
|||
|
|||
![]()
Except that most of the time the guys who steal the info aren't stealing it to use it but rather to sell it.
__________________
Check out https://www.thecollectorconnection.com Always looking for consignments 717.327.8915 We sell your less expensive pre-war cards individually instead of in bulk lots to make YOU the most money possible! and Facebook: https://www.facebook.com/thecollectorconnectionauctions |
#15
|
||||
|
||||
![]()
What auctions use simple auctions?
“the threat actors do not work on weekends”—really? This is a nine to five job? Better hope that they have not taken off for a Christmas vacation. Once you pay a ransom to unlock your site what is to prevent these people from not turning it back on and simply asking for more money? What can you do to safeguard your site from ransom ware and why wasn’t it done before? Last edited by oldjudge; 12-20-2020 at 03:09 PM. |
#16
|
||||
|
||||
![]() Quote:
So what can Simple Auctions do? There should be back-ups kept elsewhere so that when the one is locked the data can be restored with only a small disruption and loss. The back-ups should run frequently, at least daily. Or the data can be stored on a cloud-based app which makes this sort of attack meaningless, more or less. If they had a single server with no back-ups, shame on them. Also stop downloading porn.
__________________
Read my blog; it will make all your dreams come true. https://adamstevenwarshaw.substack.com/ Or not... Last edited by Exhibitman; 12-20-2020 at 10:37 PM. |
#17
|
||||
|
||||
![]()
In simple terms, what is the exposure to bidders of auction houses that use the Simple Auction service?
As mentioned before, what auction houses use the Simple Auction platform? There are several auction services that are probably similar to Simple Auctions, so the assumption here is that any one of them could have had this happen to them.
__________________
fr3d c0wl3s - always looking for OJs and other 19th century stuff. PM or email me if you have something cool you're looking to find a new home for. |
#18
|
|||
|
|||
![]()
True, and the smartest thing to do is bring everything down when you realize one of the sites has been hacked.
__________________
An$on Lyt!e |
#19
|
|||
|
|||
![]()
This is a ridiculous assumption. True, any website or platform can be compromised. But to assume that because one auction service is "similar" to Simple Auctions that auction service is just as vulnerable is missing the point. If the people running auction platforms do things like implement proper security, have proper monitoring software and upgrade their software when they see red flags (as Simple Auctions saw throughout 2020) then it's not a case of "this could happen to anyone."
Last edited by BRoberts; 12-21-2020 at 09:11 AM. |
#20
|
||||
|
||||
![]()
Right. These are thieves. They have a primary target and probably a secondary one as well. A car thief might be after the McLaren, but if there's a briefcase with money on the front seat, he'll take that too.
|
#21
|
|||
|
|||
![]()
As someone who has consulted for companies that have been the victims of ransomware, here’s my experience (and these are my experiences only - I have no knowledge of the exact variant of ransomware that hit simple auction):
One customer paid the ransom, and the decryption key was never supplied. The threat actor simply stole the money and then disappeared. Our other costumers simply restored from backup and ignored the threat actor. In all cases, a forensic investigation was undertaken to determine both the mechanism of intrusion and the extent of data exfiltration. If data were indeed stolen, notifications were made to those individuals affected. There are laws (GDPR in europe and CCPA in California, to name two) which require the users of the affected platform to be notified if their PII has been stolen. Also, Some new variants of ransomware do indeed steal data and threaten to release said data if the ransom is not paid. My heart goes out to Bob at simple auction - this is a shitty situation. |
![]() |
|
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Sterling Auctions | Neal | Modern Baseball Cards Forum (1980-Present) | 1 | 11-14-2017 01:57 PM |
Sterling Auctions Lot #144 | Yoda | Net54baseball Vintage (WWII & Older) Baseball Cards & New Member Introductions | 0 | 11-06-2015 10:56 AM |
Sterling Auctions | Kingcobb | Net54baseball Vintage (WWII & Older) Baseball Cards & New Member Introductions | 12 | 10-20-2015 11:21 PM |
Sterling Auctions? | EvilKing00 | Net54baseball Vintage (WWII & Older) Baseball Cards & New Member Introductions | 35 | 03-28-2013 01:48 PM |
Baggers Auctions and Sterling Sports Auctions ending tonight... | Leon | Net54baseball Vintage (WWII & Older) Baseball Cards & New Member Introductions | 3 | 07-21-2011 10:55 PM |