Is this the first use of the CyberVor cache?


by Jimmy Nicholls| 02 September 2014

Russian hacking group may have given itself away through failed logins.

Hackers are exploiting stolen credentials alleged to have been taken in the CyberVor attack involving 1.2 billion unique records, according to domain registrar Namecheap.

The company was alerted to a potential problem by an increased load on its servers, and believes that details taken from other sites are being used with fake web browser software to gain access to Namecheap accounts.

Matt Russell, vice president of hosting at Namecheap, said: "The vast majority of these login attempts have been unsuccessful as the data is incorrect or old and passwords have been changed.

"As a precaution, we are aggressively blocking the IP addresses that appear to be logging in with the stolen password data."

Though some accounts had been successfully broken into the registrar has blocked those affected and contacted their owners.

However the assertion that the CyberVors hacking group, thought to be based in Russia, is responsible for the attack appears to be speculation, and Namecheap has been contacted for further details.

"I must reiterate this is not a security breach at Namecheap, nor a hack against us," Russell added. "The hackers are using usernames and passwords being used have been obtained from other sources."

Source: Company Press Release

Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

792 people like this.
2210 people follow this.

Security Intelligence

Suppliers Directory

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.