Other than the root account, no accounts unrelated to the hosting were touched and unrelated files in /home/ weren’t touched either. Some accounts and files that weren’t part of the hosting setup were left “untouched,” he said.
DARK WEB HACKING SITES FULL
He had determined that the attacker(s) had gained administrative database rights, but it’s looking like they didn’t get full system access. Unfortunately, all data is lost and per design, there are no backups.Īs of last week, Winzen said his priority was to do a full analysis of the log files. Winzen told ZDNet that there ain’t no such thing as backups on Daniel’s Hosting, by design: I will re-enable the service once the vulnerability has been found, but right now I first need to find it.īackups? Forget it. There is no way to recover from this breach, all data is gone. The service will likely be back in December, he said, but even the “root” account has been deleted, and all the data on those 6,500 sites are toast: Winzen said that it happened on Thursday night, a day after a PHP zero-day exploit was leaked. The administrator at Daniel’s Hosting is a German software developer named Daniel Winzen, who acknowledged the attack on the hosting provider’s portal. The admin says they’re gone for good: he hasn’t even figured out where the vulnerability is yet.
One of the most popular Dark Web hosting services – Daniel’s Hosting – was slaughtered last week when attackers hosed it clean of about 6,500 hidden services.