ArvinJA wrote:I'm surprised no-one has posted this yet, but this seems to be the perp: http://www.whois.net/whois/silmaril.biz.
It's the info circulated on IRC. The offending code looked like this according to the people on IRC (his code might even be susceptible to SQL injections, I am not a script kiddie though, so I wouldn't know how to perform them in a systematic way).
As people have already said, seems like a total script kiddie.
Do some detective work fellas and we'll call his mom as burgingham suggested.
Click here to send him a Christmas card.
It's not sql injection. It's social engineering.
xXGhostxX wrote:BruThoL wrote:xXGhostxX wrote:Well, thanks to my programmer, he's come up with a full analaysis. The client is indeed bugged with a keylogger. The .jar file has a bootstrap. Basically, you log in as always, your password goes to a database. Which is what the russians are using to hack your account. It's a dirty trick indeed. Fortunently, there's a way to reverse the the hack. For those of you who actually downloaded the .jar file, you have to re compile the .jar file. This should remove it.
Nice try AD. You suck so bad for this. Your definently the reason why russians have a bad reputation in this community. Once again, nice job Dis.
Am I your programmer? Because i said all of this to you actually.
And recompiling isn't enough, need to remove the GET request first.
PM me on skype. Also, that's part of it I forgot to add.
Edit: if you want to see the whole fight and pictures from the raid, its on the russian forums. A lot of pages but worth it.
http://translate.google.com/translate?h ... 3Ft%3D4866
I am actually busy with trying to keep somewhat a village.
Our LS account still owned by them, and they are actually planning on destroying everything it seems.