Seals With Clubs Hacked - Warning

Status
Not open for further replies.
BluffMeAllIn

BluffMeAllIn

4evrInmyheart RIP xoxo :(
Silver Level
Joined
May 2, 2009
Total posts
11,324
Chips
0
With the price of bitcoins these days I'm not surprised it would be a place to attack, aint read the article but probably will this evening maybe.
 
R

redwards92

never going to move up
Silver Level
Joined
Jan 17, 2013
Total posts
2,234
Awards
1
Chips
8
just binked some high stakes accounts

gg life
 
Debi

Debi

Forum Admin
Administrator
Joined
Oct 13, 2006
Total posts
74,703
Awards
20
Chips
1,351
SealsWithClubs Database Likely Compromised

SealsWithClubs poker site advised it's users that their database had likely been compromised.

This is the site that uses bitcoins only for transactions.

They issued a mandatory password re-set and advised users to re-set their passwords at other sites if they had used the same one there.

Posted on their site:
sp.gif


Manditory Password Reset

The datacenter that we employed up to November permitted unauthorized access to a database server and our database containing user credentials was likely compromised. Passwords were salted and hashed per user, but to be safe every user MUST change their password when they next log in. Please do so at your earliest opportunity. If your Seals password was used for any other purpose you should reset those passwords too as a precaution.

As a response to this occurrence, a top priority is to further put user’s security into their own hands beyond offering two-factor authentication. This includes the ability to permanently lock withdrawal address, locking out the transfer feature, and locking out account access except for a set of IPs (at least one of which must be the currently used IP). Expect to see these features in the near future.

Transfers may be disabled for a short period of time. Thank you very much for your understanding and support during this rough time. We sincerely apologize for any inconvenience or concern this may cause our players.
 
SANDYHOOKER KY

SANDYHOOKER KY

Rock Star
Silver Level
Joined
Jul 20, 2010
Total posts
382
Chips
0
Seems like someone has it in for swc's, they have also had a DDoS attack last year.
 
Henry Minute

Henry Minute

Legend
Silver Level
Joined
Oct 6, 2013
Total posts
2,740
Awards
8
Chips
0
If you want to check if any of your details have been leaked, at any time, not just from this exploit just enter any email address you use into this site: http://haveibeenpwned.com/

It searches all of the known leaked info and tells you if you're there. If it says that you have been pwned, you might consider changing the passwords you use on anything using that email address.
 
S

SallyLamb

Rising Star
Silver Level
Joined
Dec 21, 2013
Total posts
20
Chips
0
wow that's pretty scary
 
horizon12

horizon12

Legend
Silver Level
Joined
Nov 2, 2013
Total posts
4,126
Chips
0
This incident demonstrates once two problems that exist at the moment, owners of online services: first - weak passwords, the second - not using reliable methods of data encryption.
 
dmorris68

dmorris68

Legend
Loyaler
Joined
May 27, 2008
Total posts
6,788
Awards
2
Chips
0
This incident demonstrates once two problems that exist at the moment, owners of online services: first - weak passwords, the second - not using reliable methods of data encryption.

If passwords were salted per user as they claim, that's about as reliable as one can get for passwords. Especially if they used a SHA hash instead of MD5. Hashes are non-reversible, and if uniquely salted can never be compared with the same password found elsewhere, even if the same hash algorithm is used.

The issue is how the information was accessed in the first place. They claim their datacenter "permitted unauthorized access" to their server. Could be just a decoy to shift blame from themselves, but if true it's not something they have control over. When you use the services of a third-party datacenter, you have to accept the staff as trustworthy. They manage your servers and have physical access to them. It's very rare that a datacenter insider steals user info, but it's not unheard of either. The vast majority of sites (or other businesses for that matter) can't afford to setup and run their own datacenters, which is why 3rd party datacenters are typically used.
 
C

cAPSLOCK

Cardschat Elite
Silver Level
Joined
Jul 22, 2008
Total posts
2,550
Chips
0
They were salted SHA1. So they have all been cracked by now. :(

Seals is a good site run by honorable folks who work hard to keep it safe. I have made a fortune playing on SwC...

This event sucks, but the site owners are legit. I vouch for them.
 
Status
Not open for further replies.
Top