Forum: Poser - OFFICIAL


Subject: ...HACKER (S) Working the Renderosity Marketplace?

Veritas777 opened this issue on Jan 26, 2005 ยท 91 posts


Veritas777 posted Wed, 26 January 2005 at 2:54 PM

I've had several experiences over the past two-three weeks that lead me to believe that a hacker (or hackers) are working the Renderosity Marketplace- most likely to steal password info- and- to download models maybe? My first experience was about two-three weeks ago when I entered the marketplace page and saw a Pop-Up that offered computer games for sale. I have NEVER seen a pop-up like this before at Renderosity as I have my all Norton settings fairly high (and current). This was followed days later by a "MS-SQL_Packet_DoS" intrusion attempt, and then again on a later day- and then on a later day I had my printer software disabled (and subsequently had to re-install it) while browsing in the marketplace. I can tell when my printer port is being "hit" because my printer makes a distinct port-hit sound. More recently I was alerted by Norton that a "MS-SQL_NullPacket_DoS" threat had happened while in the marketplace- Norton says- "This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening." Then today I entered the marketplace an was alerted with a "Tcp_Xmas_Scan" - which Norton describes as "a condition that indicates an attempted IP spoofing attack." I really have to think that this is either someone who is "inside" Renderosity- or it working with the help of someone at Renderosity- perhaps from another location. Anyone else see stuff like this happening?


Penguinisto posted Wed, 26 January 2005 at 3:06 PM

Err, R'osity doesn't use Microsoft SQL... at least they used MySQL as a base the last time I saw an error msg from it. Also, a Norton client wouldn't have any way of accessing enough of the RMP's server to determine what everyone else is doing there (IOW, you can't see everyone else's connections to the RMP, just yours. Consequently, unless your own machine has been compromised to alert someone when you hit a certain URL, there's no way for a "hacker" to tell whether or not you're connected to the RMP.) Are you sure that your own computer hasn't been popped? Setting Norton to "high" security don't mean jack when there are a plethora of security holes gaping wide in XP (even with Service Pack 2 installed...) If you're using Internet Explorer the odds of catching something nasty are even better. To top it off, your firewall and A/V software are only as good as the last time you patched it. Heh - glad I use Linux and OSX to do all my Internet shit... /P


Aeneas posted Wed, 26 January 2005 at 3:08 PM

I've had some bizarre experiences also, now that you talk about it. the mysql I also had (yesterday?), and also my browser trying to connect to other pages whilst here in the marketplace...

I have tried prudent planning long enough. From now I'll be mad. (Rumi)


Scarab posted Wed, 26 January 2005 at 3:41 PM

My firewall just intercepted a "Xmas tree" attack. When I traced it back the address leads to the renderosity marketplace (avalon bondware), so SOMEthing funny is going on. How 'bout it, admins? Scarab


SAMS3D posted Wed, 26 January 2005 at 4:06 PM

:-(...oh no....hope it is going to be alright? Sharen


XENOPHONZ posted Wed, 26 January 2005 at 4:17 PM

I hate being attacked by Xmas trees.

Something To Do At 3:00AM 



Penguinisto posted Wed, 26 January 2005 at 4:20 PM

yeah... leaves needles all over the fscking carpet. /P


Jovial posted Wed, 26 January 2005 at 4:36 PM

My firewall has also just blocked the Xmas Scan

Symantec Personal Firewall reports:
Details: Attempted Intrusion "TCP_Xmas_Scan" against your machine was detected and blocked.
Intruder: market.renderosity.com(66.18.106.198)(http(80)).
Risk Level: Low.
Protocol: TCP.

Not good. Probably not a good time to go shopping at R'osity.

Regards,
Jovial.


XENOPHONZ posted Wed, 26 January 2005 at 4:47 PM

That does it! They are off of my Xmas card list.

Something To Do At 3:00AM 



mateo_sancarlos posted Wed, 26 January 2005 at 4:50 PM

I thought they do use MySQL. Maybe one of their machines has been infected, or is being used as a slave machine by some hacker at a remote location.


Veritas777 posted Wed, 26 January 2005 at 4:52 PM

A hacker could have a great time downloading models from various people's accounts- once they could log in under your own account name. In this respect I think Renderosity has the most LOW TECH security system of any website like it. But RDNA uses Bondware also, and once logged-in, you can freely download a couple of years worth of model purchases! If I was a MERCHANT, all of this would really make me CRINGE at the thought that hackers could be robbing their sales and future income. But the earlier Pop-Up of someone trying to sell computer games might be a clue as to who might be doing this. I have my Norton log of where these attacks are (or appear to be) coming from- (but I'm not posting them here...)


Kalypso posted Wed, 26 January 2005 at 4:52 PM Site Admin


spothmann posted Wed, 26 January 2005 at 4:56 PM

Alright... have to say a few things. First, the evil people who all have nothing else to do but trying to get hold of your computer via the net are not hackers, they are called crackers or scriptkiddies. Second. If you are 'browsing Renderosity', you are not only only 'browsing Renderosity'. Your computer is permanently connected to the net at that moment, with its own IP address which usually is given to you by your ISP for the time you're online. If you severe the connection and dial in anew, you will probably have a different IP address, because those are given away dynamically. And that's where those 'attacks' often come from: Imagine someone else has the IP 1235 and is playing an online game, which identifies him by his IP address. Now that playing person turns off the computer. The IP 1235 is available again. If you now dial in and your ISP gives that 1235 to you. The game server is still 'looking' if the player at 1235 is present by sending data packets to him. And now - surprise - your firewall pops up with something like 'Attempted Intrusion "TCP_violent_gameserver" against your machine was detected and blocked' - even if you were 'just' checking your emails or browsing Renderosity. See what this is about? Of course, there is the faint possibility that someone is doing a portscan on your computer - with a billion possible IPs to scan, this is still more unlikely than being struck by lightning. But that would not result in one, but in possibly several thousand messages from your firewall... And if your ports are correctly configured, you don't need to be afraid (but then you also would not need a firewall, right...?). But then there's still another possibility: the server of Renderosity has caught a virus or worm. That, however, would be, let's say, rather not so good....


maxxxmodelz posted Wed, 26 January 2005 at 5:01 PM

If it only happens when you log into the marketplace, I'd be more worried they're trying to steal your credit card info rather than your downloads. Sounds more like you guys all got hit with a spyware virus that is triggered by keywords that may appear in the taskbar of your browser... like 'market'. Try going somewhere else that also has the word 'market' in the URL, and see if it happens again. That should narrow it down to being possible spyware, or something fishy with this marketplace in particular.


Tools :  3dsmax 2015, Daz Studio 4.6, PoserPro 2012, Blender v2.74

System: Pentium QuadCore i7, under Win 8, GeForce GTX 780 / 2GB GPU.


ziggie posted Wed, 26 January 2005 at 5:02 PM

Beware the mutant Xmas trees....!

"You don't have to be mad to use Poser... but it helps"


XENOPHONZ posted Wed, 26 January 2005 at 5:13 PM

ziggie -- Yes, that's the way it happens. It's horrible. Worst of all is when it spews tinsel, and then ties someone up in it.

Something To Do At 3:00AM 



zippyozzy posted Wed, 26 January 2005 at 5:20 PM

I have yet to experience any of this. For those of you using windows you should turn on your windows firewall if you have XP Pro. I browse this site at all different times as I work the odd shift and have never been attacked on the web or this site. The firewall will stop all incoming messages from windows. It doesn't sound like a hacker. A real hacker wouldn't be bothered with this site. It wouldn't be worth their trouble. Hackers, the real ones, do not lower themselves to script kiddie level. Sounds to me like you picked up something from your browsers not this site and it infected your machine, hence, the popups. I haven't had any popups appear from this site when browsing and I dont use any fancy software. Just windows firewall. ;)

Message edited on: 01/26/2005 17:25


wolf359 posted Wed, 26 January 2005 at 5:33 PM

MAC OSX .... accept no substitutes.... ;-)



My website

YouTube Channel



Veritas777 posted Wed, 26 January 2005 at 5:43 PM

I visit RDNA, Poser Pros and DAZ on a regular, almost daily basis, and it doesn't happen over there. Never seen anything like this on the other sites- so right now I would have to narrow it down to someone targeting the RMP. And the FACT IS, there are models worth THOUSANDS of Bucks to be downloaded and resold, etc. I think those who are trying to laugh this off have me wondering where they are coming from. I think its a SERIOUS threat to people who might be getting their personal info ripped off and to venders who could be losing $$$ in sales. It's nothing to be laughed at... I've been on the internet for over 15 years, manage over 20 websites and a large server- and while I'm not a true techie (I have others doing that for me)- I'm not stupid either. I have the latest firewall and Norton packages and updates- which probably does protect me from script-kiddies, but NOT from a hacker with SERIOUS TOOLS, or maybe an INSIDE ACCESS- where Administrator Powers can do almost ANYTHING once you are logged into someone else's domain...


Jovial posted Wed, 26 January 2005 at 5:49 PM

Hi all,

It is a nice theory that those of us who have SEEN the messages warning of blocked intrusions into our PCs have actually already been compromised BUT this neglects the following facts:

Can't someone wake up a techie at R'osity?

Jovial.


XENOPHONZ posted Wed, 26 January 2005 at 6:08 PM

I agree that this is something that should be looked into by RR staff -- but (at this point) I don't think that it represents a particularly serious threat. My firewall fends off 100's of various types of scans every week. And it has done so for years. So, a mere scan doesn't get me started. Besides, that's why I've got both hardware and software firewalls in the first place.

Something To Do At 3:00AM 



Veritas777 posted Wed, 26 January 2005 at 6:24 PM

Well- if you read my original post- it is NOT just one "mere scan"- this is a regular pattern that has been going on for nearly three weeks- all ONLY HERE at RMP. Among the MANY attempts reported by Norton was "MS-SQL_NullPacket_DoS" A threat which happened while in the RMP- Norton says- "This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening." So there is no "mere scan" or low level threat here- someone is trying a SERIES of attempts using a variety of methods- and they are INCREASING in frequency... Just because YOUR MACHINE software hasn't warned you, doesn't mean that it is NOT happening on your machine! Maybe you just haven't DISCOVERED it yet- or the hacker(s) hasn't reached your machine yet...


Moonbiter posted Wed, 26 January 2005 at 6:35 PM

Crap I thought this was another post about some new Poser like software that would render better than Vue or have a cartoon plugin. :(


JeniferC posted Wed, 26 January 2005 at 6:37 PM

Yes, avalon/bondware is the Renderosity Marketplace server. Without doing any diggin yet, it seems (or I'd like to hope) that someone is just spoofing our information. It does seem strange. I have looked over the Marketplace server and I don't see anything out of the ordinary. However, I have reported this to the real "techies" for them to make sure it's not a problem. They are currently dealing with backbone connection issues right now, so it may be a little while before they can look into this. I'll let you know something as soon as we find out more. Thanks to everyone that has notified us about it. Jenifer Keeling Rendeorsity Admin

 


JeniferC posted Wed, 26 January 2005 at 6:47 PM

Attached Link: http://www.whitehats.com/info/ids144

This is what I read about the error from Norton's site: *"Tcp_Xmas_Scan Severity: Low This attack poses a minor threat. Corrective action may not be possible or is not required. Attack Category: Suspicious Activity Anomalous network conditions or traffic patterns. A suspicious activity signature, for example, might detect two systems with identical IP addresses, a condition that indicates an attempted IP spoofing attack. Description This signature detects a TCP packet that contains a sequence number of zero, and with the FIN, URG, and PUSH bits set. Sending invalid combinations can result in DoS, Enumerations, and Reconnaissance. Additional Information There are reported incidents where legitimate traffic may cause an intrusion detection system to raise "false positive" alerts for this event."* More info at link

 


Veritas777 posted Wed, 26 January 2005 at 7:22 PM

Attached Link: http://securityresponse.symantec.com/avcenter/attack_sigs/sigs/MS-SQL_NullPacket_DoS.html

From Symantec's Website... MS-SQL_NullPacket_DoS Attack Category: Denial of Service Severity: High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit the NULL byte vulnerability in MS SQL Server. If Microsoft SQL Server 7.0 receives a TDS header with three or more NULL bytes as data, it will crash. The crash will generate an event in the log with ID 17055 "fatal exception EXCEPTION_ACCESS VIOLATION." Links SecurityFocus Website, BID: 817 Common Vulnerabilities and Exposures (CVE) Website, CVE-1999-0999 Microsoft Security Bulletin MS99-059

MindVision-GDS posted Wed, 26 January 2005 at 7:57 PM

hmmm.. well...hmmmm...



wolf359 posted Wed, 26 January 2005 at 8:05 PM

"And the FACT IS, there are models worth THOUSANDS of Bucks to be downloaded and resold, etc. I think those who are trying to laugh this off have me wondering where they are coming from." Perhaps from this place called "reality" where these "thousands of bucks worth of models" can be had freely from P2P networks by any half blind chimpanzee with an internet connection all accomplished without some elaborate ghost in the shell backdoor campaign requiring one to assume the virtual identity of each os us merchants and login to renderosity directlyas that person and then .......sheesh!!!! do i even need to finish this paragraph??.



My website

YouTube Channel



Sarte posted Wed, 26 January 2005 at 8:06 PM

We are so screwed.

Do the impossible, see the invisible

ROW ROW FIGHT THE POWER

Touch the untouchable, break the unbreakable

ROW ROW FIGHT THE POWER



MindVision-GDS posted Wed, 26 January 2005 at 8:09 PM

hey now wolf...be nice..not everyone is brilliant :P



Dale B posted Wed, 26 January 2005 at 8:25 PM

Don't forget the woody points of cracking a high traffic site...and let's face it, if a kiddie could infect the Rosity backbone servers with a DoS worm, think of how many zombies might be created, just waiting to attack...


SamTherapy posted Wed, 26 January 2005 at 8:50 PM

[Bad Scottish Accent] Aye, we're doomed. Doomed, I tell ye. [/Bad Scottish Accent]

Coppula eam se non posit acceptera jocularum.

My Store

My Gallery


XENOPHONZ posted Wed, 26 January 2005 at 9:27 PM

I don't view this as a major threat. It's not the type of thing that I'll lose any sleep over. And, believe me......when it comes to internet security issues: I'm paranoid. This one doesn't rise to the level of a serious concern. Sorry if that disappoints anybody........

Something To Do At 3:00AM 



Veritas777 posted Wed, 26 January 2005 at 9:35 PM

If its not happening to YOU- then you are NOT concerned... But since some of the above seem to make it clear that they get their software and models from P2P- which basically means theft and piracy- I'm not surprised at their LACK of concern about security issues. I guess I must be one of the few people who still BUY their software and models. I hadn't realized that the acceptance of THEFT is so wide-spread and basically "cheered"... (Only STUPID people still BUY their software and models, according to some of the above posts...)


XENOPHONZ posted Wed, 26 January 2005 at 9:53 PM

*But since some of the above seem to make it clear that they get their software and models from P2P- which basically means theft and piracy- I'm not surprised at their LACK of concern about security issues.

I guess I must be one of the few people who still BUY their software and models. I hadn't realized that the acceptance of THEFT is so wide-spread and basically "cheered"...

(Only STUPID people still BUY their software and models, according to some of the above posts...)*

Oops. I think that you are misinterpeting wolf359's post. He's one of the last people that I would accuse of using P2P for purposes of theft.

He was merely stating that since it's so easy to steal models by the services of P2P, then why would any hacker expend the great effort that's required to swipe the models directly? Not to mention the risks involved to the thief. P2P is so much easier.

BTW - I don't have any P2P software. I know some people that use Kaazaa -- and there are legit uses for that software -- but I don't have it. Or any others like it.

As for wolf359, he's an old hand in the Poser community -- well known. No P2P going on there, I wouldn't think.

If its not happening to YOU- then you are NOT concerned...

No.....I just don't see this one as a serious threat.

And that's my honest opinion.

If I did perceive this to be a matter of deep concern, then I'd say so -- whether it was happening to me or not.

Something To Do At 3:00AM 



Moonbiter posted Wed, 26 January 2005 at 9:54 PM

Game over man! Game over! What are we gonna do now?! No one above seemed to make it clear that they got anything from a peer to peer network, they said it would be much easier than trying some complicated hack as you were 'theorizing'. So lay off the snide insinuations. I'm sorry your getting bent out of shape that some folks are not taking your cries of alarm to seriously but as JennyK covered in the info about the Xmas deal "There are reported incidents where legitimate traffic may cause an intrusion detection system to raise "false positive" alerts for this event." As a computer technician who does this sort of thing for a living, I consider Nortons to be slightly above actually being infected with a virus. It's buggy, gives false positives far to often, and many times indicates the wrong type of attack is occurring.


elizabyte posted Wed, 26 January 2005 at 11:38 PM

If people really were breaking in to Renderosity to steal stuff, why on earth would they be pinging people and otherwise attracting attention? Why is it only apparently affecting one person? What do the alerts actually mean? There are more questions than anything else here, as far as I can see. bonni

"When a man gives his opinion, he's a man. When a woman gives her opinion, she's a bitch." - Bette Davis


hauksdottir posted Thu, 27 January 2005 at 12:37 AM

Just because people are bouncing up and down excitedly on the trampoline with you doesn't mean that they are all skulking sneak thieves! Maybe they have other protections. Maybe they use other operating systems. Maybe they've seen enough of Norton's quirks not to panic. Maybe they even have severe real world issues more worth worrying over than whatever is going on inside YOUR machine. Given all the sites that you visit, you ought to be more worried about that. And, BTW, it is crackers, not hackers. Carolly


Scarab posted Thu, 27 January 2005 at 1:29 AM

Oooorah! ....sorry....wasn't that my line? ....(shit!) Scarab <-(will never work in this town again, yadda yadda)


Seraphira posted Thu, 27 January 2005 at 2:00 AM

well, at least it brings to our attention to have better at home and server security that is the issue here. Sigh Unfortantly there will always be some taffer trying to invade servers, which I know all to well because Myself I have two large servers. I do doubt that hackers are stealing passwords from renderosity though, I mean their security is pretty tight from what understand, but nothing is perfect. PHP problem: As a merchant finding my products on warez cds and other cd's being sold I am quite pissed off, of course it effects sales and thing is what can i do? contact jenyk I gather and hope for a reslove? This is my idea, purely therological though. I believe that the "crackers" as haunksdottir so corrected. Is ethier buying and reselling or putting it up on PHP servers for mass distrobution. >:(. Sera


kawecki posted Thu, 27 January 2005 at 2:13 AM

Is like the vampires, they only enter if you open the door.
Renderosity can have ten thousands of hackers, crackers, trackers, packers, but they only can enter if your computer has something that opens the door.
The problem is your computer and not Renderosity, probably you have some spy or virus installed on it.
I have no Norton, no firewall, no active antivirus and I live in peace and very happy, of course I have no XP neither use IE!

Message edited on: 01/27/2005 02:16

Message edited on: 01/27/2005 02:17

Stupidity also evolves!


Khai posted Thu, 27 January 2005 at 2:22 AM

I think it's Norton at fault here. ZoneAlarm Pro shows nothing when going to the marketplace. and put it this way, ZA Pro is 20 times the firewall than norton will ever be. Plus the logs from my hardware firewall..... show nothing as well. false positive to norton again.


Andi3d posted Thu, 27 January 2005 at 2:43 AM

Not wishing to be contentious, but I can verify that Wolf359 DOES buy, and, without going into specifics, I would be very very surprised indeed if he/she was stealing stuff via p2p.

 "That which doesn't kill you is probably re-loading"


Porthos posted Thu, 27 January 2005 at 3:00 AM

Nothing showing up on ZA Pro logs here either!

MS Windows 7 Home Premium 64-bit SP1
Intel Core i7-2600 CPU @ 3.40GHz, 12.0GB RAM, AMD Radeon HD 7770

PoserPro 2012 (SR1) - Units: Metres , Corel PSP X4 and PSE 9


Kalypso posted Thu, 27 January 2005 at 3:29 AM Site Admin

Attached Link: http://www.renderosity.com/messages.ez?ForumID=12357&Form.ShowMessage=2092238

Recently I came across a thread in the Community Center forum with a link to Mike Bonnel's wallpaper site which I HAD been to months ago but just re-visited to refresh my memory. I got the same exact alert as Veritas did the MSSQL Nul Packet DoS. Just mentioning this in case anyone can figure out where these are coming from - I'd guess one of the ads?

12rounds posted Thu, 27 January 2005 at 6:30 AM

"I have no Norton, no firewall, no active antivirus and I live in peace and very happy, of course I have no XP neither use IE!" Good luck in the future. I don't have XP nor use IE nor anything remotely associated with Outlook, but I don't rely on being lucky - I have a firewall (which btw reports access attemps every freaking day - about 1/100 of them being reported as blocked high-security risks), av-software and anti-spyware software. I consider having the protection BEFOREHAND a wise precaution.


wolf359 posted Thu, 27 January 2005 at 6:32 AM

Thanks to all that have "defended" me even though it was not even necessary, I thought it was *common knowledge that P2P existed and poser items,Mp3's as well as entire major 3D packages can be Gotten from those sources. without this frankly ridiculous scheme of assuming a particular merchants identity just to steal his/her "conforming latex thigh boots" :-) But Alas Some people now seem upset that they have taken time from playing "flight simulator" in thier luxury Hawaiin condo, to post yet another EARTH SHATTERING revalation that will save us all. and we, the great unwashed masses, have yet again shown a complete lack of apreciation for the wisdom and grand vision of our would be saviour:-) Same old, Same old ( walks away, shaking head ruefully)



My website

YouTube Channel



Poisen posted Thu, 27 January 2005 at 6:35 AM

<---- puts on his tinfoil beanie hat.


JHoagland posted Thu, 27 January 2005 at 8:40 AM

I don't mean to spoil the fun, but what does this have to do with Poser? Why is this in the Poser Forum? I only ask because I've had messages moved that had a lot more to do with Poser than this message. And I agree with wolf359- there are a lot easier ways to obtain Poser products than by trying to hack into this site. Just install [no name], so a search for "Poser" or "Renderosity" or "DAZ" and you'll be able to download hundreds of items. (I left out the name of the actual p2p program so the 10 people who don't know about p2p file-sharing won't figure it out.) --John


VanishingPoint... Advanced 3D Modeling Solutions


ArtyMotion posted Thu, 27 January 2005 at 8:58 AM

I don't mean to spoil the fun, but what does this have to do with Poser? Why is this in the Poser Forum? I only ask because I've had messages moved that had a lot more to do with Poser than this message. << Because the off topic forum is gone. 8-)


Moonbiter posted Thu, 27 January 2005 at 9:37 AM

Seven Days? We're not gonna last seven hours? Incase you haven't been keeping up with current events we just got our asses kicked out there! (i no longer have anything constructive to say, just felt like adding to the comedic hysteria the thread is losing) :)


XENOPHONZ posted Thu, 27 January 2005 at 10:49 AM

I'm still worried about that Xmas Tree thing......ziggie's picture was a warning to us all......

Something To Do At 3:00AM 



pakled posted Thu, 27 January 2005 at 11:04 AM

I haven't been to the site lately, but I've got a URL to show what OS/Systems, etc. a web site is running. At last check (few months ago), I seem to remember it was about 10 Linux servers, and one Microsoft box. I can dig the URL up if anyone's interested..
Now that you guys mention it, when I logged onto 'rosity last night, instead of the usual Vickie clothing advert in the upper right hand corner, I saw one for finding out about my credit score (which is 0, so there's no sense looking even if it was legit..;). That didn't look normal. Time to drag out ad-aware and do another scan
Re warez- I went there about 3 years ago, and it was something like what I've heard about the pr*n sites; thumbnails that direct you to sites with more thumnails that direct you to sites with more thumbnails, etc..ad infinitum. Then I got a virus, so I'd steer clear of 'em. Not worth the trouble.

I wish I'd said that.. The Staircase Wit

anahl nathrak uth vas betude doth yel dyenvey..;)


AntoniaTiger posted Thu, 27 January 2005 at 12:56 PM

Speaking from a position of ignorance, are you looking at the wrong side of the equation? Which is more valuable to the crook? A random Marketplace item, or a customer's credit-card details? But how paranoid do you want to get?


svdl posted Thu, 27 January 2005 at 12:59 PM

The most probable cause are the off-site banners (like Smiley Central). Renderosity has no control over what those other sites are doing. I've read another thread about SmileyCentral and nasty script kiddies. A bit OT maybe, but I think it would be a good idea to remove all off-site banners (okay, RDNA, PoserPros and other RESPECTABLE sites about 3D would be fine!) and reserve that space for merchants. That would also increase trips to the MP. Right now, I don't trust the banners anymore, so I don't click them anymore (and I consider blocking them). That's a loss for the MP.

The pen is mightier than the sword. But if you literally want to have some impact, use a typewriter

My gallery   My freestuff


Aeneas posted Thu, 27 January 2005 at 1:12 PM

It's always the easiest solution to say that people need to check their own puters instead of warning that they met with something bizarre here at R. (or another site).
My puter is free of Adware, I have no Trojans, viruses or whatever.
And I see no reason whatsoever to try and ridiculise someone who starts a thread like this and asks for a second opinion (because to him also this seems unlikely).
It is very cheap to try and make fun about it.

Message edited on: 01/27/2005 13:14

I have tried prudent planning long enough. From now I'll be mad. (Rumi)


JeniferC posted Thu, 27 January 2005 at 1:17 PM

Anyone concerned about this Norton warning should do a search on "TCP_Xmas_Scan" to see that it is a relatively common warning that does NOT usually require action. If you do a search, you'll see it's rather common. It is possible that our site having multiple IP addresses causes some to get that warning. I use Norton too, but haven't received that message. I think it's because I don't have my settings as sensitive (I don't care to know about minor things that don't need attention). I can say that the site was running slow due to backbone/bandwidth issues. That caused several SQL errors, but the slowness was not related to the Norton message you received (above). We do occassionally get DoS attacks and have to fight over zealous crawlers (search bots), but we try hard to keep the site (servers) running at their best. We do have adds running that do not direct back to us, so seeing ads about credit reviews isn't highjacked banners :) We did get complaints about the "Central Smileys" banner ad that was running (because when you go to their site it does want to load a bunch of junk on your computer) so we have removed it. Our Marketplace does not load spyware. If you have pop-ups when you're browsing the MP, then it's ad ware that is already on your computer. I hope that helps resolve any concerns about the RMP. Thanks, Jenifer

 


zippyozzy posted Thu, 27 January 2005 at 1:19 PM

**Among the MANY attempts reported by Norton was
"MS-SQL_NullPacket_DoS"
A threat which happened while in the RMP- Norton says-

"This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening."**

Norton is too buggy and untrustworthy. I'd trust my windows firewall before I'd trust what Norton tells me.

I think you guys need to lookup the term "HACKER" again: a real hacker WOULD NOT be interested in this site. Not even for credit card info. They target sites like GOV or FBI, etc. This site would not be a challenge to any real hacker. You can actually DL Poser figures from P2P so they wouldnt bother with this site at all. They would NOT lower themselves to script kiddie level and even a script kiddie would not be able to hack into this site. and if that was the real case this site would have gone down for the count, bigtime if it was under a hack, dont get so paranoid. One hack attack and the admins here would catch it in a heartbeat. :)
Message edited on: 01/27/2005 13:24


AntoniaTiger posted Thu, 27 January 2005 at 1:20 PM

Agreed that off-site banners are a risk -- I've known other places where the adverts have caused me browser problems, perhaps because they throw some Javascript at me which my browser doesn't like.


Aeneas posted Thu, 27 January 2005 at 1:35 PM

I do not browse with IE. I do not have Norton. My own puter is very well protected, so I am not worrying about something that might be installed on my puter through the MP. I am shure that R. does everything possible to protect their servers,and that they have the necessary specialists that can block 99,9% of the eventual attacks. Yet it is not true that one of the biggest Poser-related vendor site with many customers paying either with a credit card or Paypal would not be interesting for someone with dishonest intentions. I am not saying someone got through the safety, but I see no problem in someone warning that something bizarre happened and asking for a second opinion. We all have to be attentive.

I have tried prudent planning long enough. From now I'll be mad. (Rumi)


zippyozzy posted Thu, 27 January 2005 at 1:42 PM

If people from here are getting popups from the MP that means they could also have a Trojan already embedded in their system or a worm from a previous site and didnt look in their system folders to clean it out. Popup banners lead to browser hijacking, which will, in turn, place trojans & worms on your machine. Norton wont always catch it. If you got caught and keep on experiencing popups on certain sites that don't have em then you will need to cleanout your computer. Virus software doesn't always prevent your browsers from being hijacked especially in IE. No virus software catches everything that's out there.


LonCray posted Thu, 27 January 2005 at 2:10 PM

Strange thing - this morning I saw a banner here that advertised a Hess Visa or Mastercard. Ran Ad Aware just 'cause I do so about once a week. Now the banner is a definite Poser merchant. Was that Hess banner ad a hijacking of some sort? It definitely wasn't Poser related.


DrunkMonkey posted Thu, 27 January 2005 at 2:41 PM

It's the freakin' military man! Yeah! Just like that Twilight Zone episode where they turned off the electricity and phones on this one block to see how they'd react to losing their technology. They started accusing each other of being aliens and killing each other... yeah that's what's happening... it's aliens.... OH MY GOD THEY'RE EVERYWHERE!!!!!!!!! AAAAAAAAAAAHHHHHHHHHH!!!!!!! yes doctor, i'm sorry i'll take my pills now


Veritas777 posted Thu, 27 January 2005 at 2:43 PM

The other websites I visit- like DAZ, RDNA and PoserPros don't have these Norton alerts. I have been visiting RMP for years and have never seen this type of activity before. As I stated, this began about three weeks ago- when the first alert came up. I regularly run several programs to check for viruses, trojans, spy-ware, etc. I am also VERY cautious about clicking on links. I skip over a lot of Free Stuff now because I don't like the looks of some of these offers- which seem to be fronts for other activities. I don't visit game sites, other than, yes, Flight Simulator sites in the US and UK, and I don't get these Norton alerts there either. I have NEVER seen a pop-up ad at Renderosity until I saw the full page pop-up advertising computer games for sale in the RMP about two weeks ago. I can't buy into the idea at all that hackers, etc- would NOT be interested in RMP. A lot of hackers aren't just going after FBI websites- they are DRUGGIES going for where ever they can get some cash- or something (anything) to turn into cash. The fact that just a password can get you access to a couple of YEARS worth of model purchases- is well worth a hacker's efforts if they want to get a lot of models for free... and since Renderosity AND RDNA have the most LAX of security policies reguarding this. (DAZ and PoserPros are obviously more aware or "paranoid" -I wonder why???) Bottom line: I have bought a lot of models over the years at RMP- and if my software says its becoming a place to get hacked- I'm not shopping here anymore- I'm going to safer websites where I don't get bogus ad pop-ups and alert warnings. I would rather trust what my computer firewall software is saying rather than some half-baked Pollyana view that everything is "o.k.". I DON'T think so...


ryamka posted Thu, 27 January 2005 at 3:39 PM

Wow. Have you considered that maybe "YOUR" firewall software is actually that which is chuffed?


wolf359 posted Thu, 27 January 2005 at 3:49 PM

"I can't buy into the idea at all that hackers, etc- would NOT be interested in RMP. A lot of hackers aren't just going after FBI websites- they are DRUGGIES going for where ever they can get some cash- or something (anything) to turn into cash." --------------------------------------------------------------------------------------- Ya and desparate "druggies" inevitably steal cash value items from,family friends and realworld retailers to suppot their habits. Think about what you are saying citizen, who, in all of creation, is going to pay cash for some ill gotten internet downloads of poser specific fetishwear etc.?????? Please ;-/



My website

YouTube Channel



Khai posted Thu, 27 January 2005 at 3:52 PM

two words. False Positive. funny that ZoneAlarm reports nothing. Black Ice reports nothing. Windows Firewall reports nothing. move on ppl. nothing to see here. no mutant christmas trees....EK!


XENOPHONZ posted Thu, 27 January 2005 at 4:02 PM

no mutant christmas trees....

Huh. At midnight, when a full moon is shining through your window......when you hear a strange rustling noise coming from somewhere down the hall....coming from your living room......closer......closer........

Just keep repeating to yourself, over and over again: "It's not real......it's not real.........it doesn't exist.........."

Something To Do At 3:00AM 



svdl posted Thu, 27 January 2005 at 4:07 PM

If crackers/script kiddies ARE interested in 'rosity, it won't be for the models. Script kiddies go for the "fun" of bringing down a high-traffic site (but they'd do it using a distributed DoS attack), crackers would go after credit card info - and 'rosity doesn't store that info. About port scans: I expect to see several port scans per day in my logs, those are just the automated ones used by crackers and script kiddies in search of vulnerable systems. Any decent firewall (yes, even the WinXP firewall) is sufficient to fool those port scanners. I'm not worried. But I still don't trust offsite banners.

The pen is mightier than the sword. But if you literally want to have some impact, use a typewriter

My gallery   My freestuff


Moonbiter posted Thu, 27 January 2005 at 4:40 PM

Okay kiddies I'm bored at work so quiz time: Scenario 1: I'm a druggie. I need another fix. Do I a: learn how to run a series of scripts so I crack my way into Veritas's Renderosity session, steal his password, download tons of models and then trade them for drugs? b: tell the dealer how to download them from a p2p network for drugs. c: sell my computer for drugs. d: go into rehab. Scenario 2: When Nortons tells me that my PC is under attack do I: a: Seek information on the type of attack to determine if it is a serious threat to my pc or information then act accordingly? b: Panic and scream the equivalency of the sky is falling and attack anyone who doesn't agree with me? c: Shoot my PC and stop the cracker cold? d: Unistall Nortons after realizing that the Xmas attack is another false positive and get Zone Alarm which offers some real protection? Scenario 3: After being told that the 'attack' on my pc was most likely a 'false positive' or if real not a big deal I should: a: Claim that attack was the work of a gang of druggies seeking to steal tons of models in their 'Bytes for Snorts' campaign. b: Assure myself that everyone else is crazy, even if they are professionals, because the Xmas_Scan is out to get me. c: Take the advice offered try Zone Alarm and see if I still get reports of these attacks. d: Click the big red x in the corner and forget I ever posted last night? :)


Khai posted Thu, 27 January 2005 at 4:46 PM

if you answered : Question 1: A Question 2: B Question 3: A then please enter our "most likely to get it wrong again" contest! First Prize is a Tinfoil Hat donated by everyone that answered C, D, C.


kawecki posted Thu, 27 January 2005 at 5:06 PM

There is a black market for Poser's props, you can buy a nuke for a Vicky3, a side-road bomb for a chair prop and a sling for a background plane.

Stupidity also evolves!


zippyozzy posted Thu, 27 January 2005 at 6:18 PM

LMAO. I just don't think a hacker/cracker or even a script kiddie would bother with RMP. A 'cracker' cracks software & databases for passwords. THEY DO NOT HACK INTO WEBSITES. Hackers DO NOT GO into 3D sites to hack for 3D Models or figures. I know plenty about website security and what hackers go after they target Bill Gates before they'd target this site. Hackers are too busy hacking Microsoft to be bothered with Renderosity's MP. Hacker's do not bother with stolen software sorry, not even a druggie would bother with Poser items, even for cash.


musicat posted Thu, 27 January 2005 at 6:30 PM

Attached Link: mySQL virus

you may have the newly discovered MySQL bot/trojan virus.

elizabyte posted Thu, 27 January 2005 at 7:52 PM

ZoneAlarm reports nothing. Black Ice reports nothing. Windows Firewall reports nothing. Sygate Personal Firewall reports nothing. Just thought I'd mention it. bonni

"When a man gives his opinion, he's a man. When a woman gives her opinion, she's a bitch." - Bette Davis


prixat posted Thu, 27 January 2005 at 8:17 PM

Just to be clear, musicat!

Is that a link about the virus or the virus itself?!?!?

Message edited on: 01/27/2005 20:18

regards
prixat


elizabyte posted Thu, 27 January 2005 at 8:27 PM

Attached Link: http://news.zdnet.com/2100-1009_22-5553570.html?tag=nl.e589

It's a link to an article at zdnet. :-) Link attached. ;-) bonni

"When a man gives his opinion, he's a man. When a woman gives her opinion, she's a bitch." - Bette Davis


SWAMP posted Thu, 27 January 2005 at 9:15 PM

MySQL bot/trojan virus.. "......infects computers running the Microsoft Windows operating system and open-source database known as MySQL.... ..installed alongside open-source operating systems, such as Linux". From what pakled posted, that sounds exactly like Rendo's server set-up. SWAMP


musicat posted Thu, 27 January 2005 at 10:32 PM

The link i provided is the Zdnet info on the virus. thanx eliz

Message edited on: 01/27/2005 22:33


dutchman posted Fri, 28 January 2005 at 12:16 AM

Attached Link: http://www.javacoolsoftware.com/

Get SpyBlaster. It is free with no gimmicks or adware and all that junk. I use Norton Anti-virus, Ad-aware, Microsoft anti-spyware, and Yahoo Anti-Spy. Since installing Spy-Blaster I haven't received any notices of spy-ware on my computer from any of these programs. Forgot to mention: Spyblaster doesn't find spyware or ads on your computer; its job is to prevent them from getting into your computer. You can find Spy-Blaster here: www.javacoolsoftware.com/

Veritas777 posted Fri, 28 January 2005 at 2:55 PM

Attached Link: http://www.eweek.com/article2/0,1759,1756090,00.asp

Thanks to those who have provided some useful help and further useful information. Having a few SANE people join this thread is great (instead of the usual Yo-Yo's)... ********************************************************* MySQL 'Bot' Attacks Windows Systems January 27, 2005 Malicious hackers have launched a zero-day bot attack against default Windows installations of the MySQL database engine, infecting vulnerable systems at the rate of 100 per minute, security experts warned on Thursday. The bot takes advantage of the publicly released "MySQL UDF Dynamic Library Exploit" to break into the open-source MySQL package. Once a database is hijacked, infected systems will connect to an IRC (Internet Relay Chat) server and retrieve propagation instructions. Johannes Ullrich, chief technology officer at the SANS Internet Storm Center, said his handlers discovered more than 8,000 hosts connected to the IRC server during the day on Thursday. MySQL is a freely available database engine designed to provide fast access to stored data. It is installed on more than 8 million systems worldwide, according to MySQL AB, the Cupertino, Calif.-based firm that develops and manages the program. Because of the wild popularity of MySQL, it is likely that many more MySQL systems could be infected but blocked from connecting to the swamped IRC server, Ullrich told eWEEK.com. In order to launch the exploit, Ullrich said the bot first has to authenticate to "mysql" as "root" user. Once authenticated, brute-force attacks are launched using a list of passwords included with the bot. Jacques Erasmus, security consultant at host intrusion detection firm Prevx, said the hijacked database engines are creating a zombie network of machines capable of being misused. Attacking all MySQL Windows installations, Erasmus said the bot, identified as MySpooler, opens three listening ports on the target machine and drops in an eight-character random file name. He said MySpooler also provides a backdoor for the attack to access the machine and deliver payload. According to an advisory from the SANS ISC, the bot creates a table called "bla" using the database "mysql," which is typically used to store such administrative information as passwords. Ullrich said the bot includes the usual set of bot features such as a DDoS (distributed denial of service) engine, various scanners, commands to solicit information like system stats and software registration keys from infected systems. "This bot does not use any vulnerability in MySQL. The fundamental weakness it uses is a weak 'root' account," he said. The SANS ISC recommends that MySQL users select a strong password for the "root" account on Windows installations. Administrators should also set up restricted access to root accounts and apply firewall rules to make sure MySQL servers are not exposed to attackers.

Veritas777 posted Fri, 28 January 2005 at 2:58 PM

Attached Link: http://www.computerworld.com/securitytopics/security/virus/story/0,10801,99282,00.html

MySQL installations targeted by Forbot worm variant JANUARY 27, 2005 (IDG NEWS SERVICE A new wormlike threat spreading on the Internet targets computers running the MySQL open-source database software, and thousands of Windows machines running MySQL have already been infected, according to one security expert. The new pest is a version of a common network worm named Forbot. It infects machines by exploiting loosely secured MySQL installations running on Windows machines connected to the Internet. The new Forbot variant is one of the first known examples of an automated Internet threat targeting MySQL and could infect machines running a wide range of database applications that use MySQL, according to Joe Stewart, a senior security researcher at LURHQ Corp. MySQL is an open-source database software program that is managed by MySQL AB. The product runs on Unix, Linux and Windows systems and is a popular alternative to Microsoft's proprietary SQL Server database among Web developers. The MySQL AB Web site claims more than 5 million MySQL installations worldwide. MySQL AB didn't immediately respond to a request for comment. The new threat was first detected yesterday, when Web developers in Australia reported infections by a program called spoolcll.exe, which was attempting to connect to an Internet Relay Chat channel in Sweden, according to Johannes Ullrich, chief technology officer at the SANS Institute's Internet Storm Center. The ISC also noted a spike in scans for MySQL port 3306, which is associated with infection by the new Forbot variant, Ullrich said. A check of the IRC channel today showed more than 8,000 systems connected. Many more MySQL systems could be infected but may be prevented from connecting by the overwhelmed IRC server, Ullrich said. The new version of Forbot infects machines by taking advantage of administrator accounts with weak or nonexistent passwords. The worm cracks the accounts by trying values from a predefined list of around 1,000 possible passwords, Ullrich said. First discovered in July, Forbot is a network worm with built-in backdoor features, according to antivirus company Sophos PLC. Dozens of Forbot variants have been identified. Once the worm gains access to the MySQL root account, it uses a known exploit, called the MySQL UDF Dynamic Library Exploit, to upload and install malicious code to the infected system. The exploit used by Forbot was first noted in December and allows an attacker with so-called "root" administrator permissions to expand the default functions available to the root account dynamically, Stewart said. "I'm not even sure it's an exploit so much as a feature -- the ability to create new functions on the fly," he said. Systems infected with the new Forbot variant connect to an IRC channel that is controlled by the worm author and receive instructions through that channel, Stewart said. Right now, the systems are being instructed to scan for and infect other MySQL systems. But those instructions could be changed to instruct the infected systems to launch a denial-of-service attack or other actions, which would stop the worm's spread, at least temporarily, he said. To be infected, MySQL has to be configured to allow the root account to log in remotely to the system. By default, the root account is allowed to log on only at the machine running MySQL, rather than remotely. The root account also has to use a password that is on Forbot's list of passwords, Ullrich said. The worm poses the most risk to Web developers who may be running the product on loosely secured workstations that are connected to the Internet but do not have firewall software running, he said. However, MySQL is commonly used in third-party database-driven applications, as an inexpensive and open-source alternative to Microsoft SQL. That could expand the pool of likely victims beyond the developer community to "power users," Stewart said. Stewart said that the new Forbot variant will probably not rate a severe threat, noting that the number of computers running MySQL is much smaller than the number of systems running programs like Windows or Microsoft Office. However, the worm is notable for being one of the first automated attacks on MySQL, Ullrich and Stewart said. MySQL administrators were encouraged to strengthen their root account password, make sure that MySQL does not allow remote logins for the root account and use a firewall to prevent direct access to port 3306 from the Internet.

FreeBass posted Fri, 28 January 2005 at 3:03 PM

OK, jus curious here... I've read through & noticed 3 sides to this issue; those who have had this activity, those who haven't, & those who couldn't give a rat's ass whether they have or not. What I've (almost) deduced from ny obsevation is a question...What Browser/ AV setup are those experiencing this phenomenon running? To me it looks universally like IE/ Norton. My suggestion; Get a better browser & A/V ( I heartily agree w/ seveal others above that Norton is a PoS, & we all know 'bout Microsoft & security, right?)



WARNING!

This user has been known to swear. A LOT!


kawecki posted Fri, 28 January 2005 at 8:37 PM

"The new threat was first detected yesterday, when Web developers in Australia reported infections by a program called spoolcll.exe, " If it is spoolcll.exe it means that are running Microsoft Windows or DOS, programs with the extension .exe does not work under Linux, FreeBDS, Unix and as I know Renderosity doesn't use Microsoft's servers!

Stupidity also evolves!


Veritas777 posted Fri, 28 January 2005 at 11:07 PM

So what's the "logic" that because people running Norton were gettings these alerts- that Norton is shit? Norton was RIGHT! The news stories just out PROVE THIS! People who were running a current and up-to-date Norton Firewall setup SAW IT, while the rest did NOT! How can it be "better" that firewalls and software that did NOT detect this activity is BETTER? Is just the OPPOSITE! Anyone who is in Science or Medicine would want tools that DETECT things- not HIDE them! (That would be totally stupid!) How can these be FALSE DETECTIONS when the above stories show that the alerts I and others were getting were TRUE DETECTIONS of the signatures of this virus/worm. Because people are not seeing them NOW is because we would have to assume that the Renderosity techs have found the problem and corrected it. But I really DOUBT they will ever admit to it. The articles on this virus/worm indicate that the problem is really due to LACK of good security measures, and no one wants to admit that. RMP has one of the most LOW-TECH and easy to pilfer and plunder setups of any marketplace anywhere. By just getting passwords (that are easy to crack) people can get access to SEVERAL YEARS WORTH of model purchases-- worth THOUSANDS in some cases- yet a LOT of people here seem to LIKE THIS setup! I think RMP mechants are being RIPPED OFF like crazy and it makes RMP just like a big P2P Piracy setup for those who get the passwords. But OBVIOUSLY NOBODY here wants to talk about this really lousey "security" at RMP. DAZ and PoserPro's don't operate with such a really sloppy and loose security setup over customers model purchases...


musicat posted Fri, 28 January 2005 at 11:09 PM

Attached Link: windows processes

here is a process list found in windows. before disabling it in the configuration section, read the info here. this is a very good site for giving basic info on faulty windows processes that run in the background.

Message edited on: 01/28/2005 23:10


kawecki posted Fri, 28 January 2005 at 11:40 PM

Don't forget the hidden ptocesses that you normaly are not able to know that there are running. Also I should like to know how do you do for running spoolcll.exe under Linux, maybe with Lin4Win?

Stupidity also evolves!


Khai posted Sat, 29 January 2005 at 12:16 AM

oh shut up veritas. you running a MySQL setup at home? hmm? like spreading panic? hmmm? talk to the Admins. and shut up for a change will you? thats a good little shouty person.


Bobbie_Boucher posted Sat, 29 January 2005 at 12:17 AM

I use Norton, and have had no such alerts. Veritas777, let me give you some friendly advice. You did your part by trying to alert people to a problem you experienced. You may be right, or the problem could be caused by something unknown going on behind the scenes. Some of us might be interested enough to ask more questions, or point out some possible alternative explanations. But you did your part, and you can take care of yourself. Let the rest of us worry about ourselves.


Moonbiter posted Sat, 29 January 2005 at 12:54 AM

Veritas, you're clueless. Yeah there is a new mysql worm out there. But your little Norton alerts you screamed about have nothing to do with it. Nor did the info you posted about it say anything about Nortons being the only thing finding it. That is a conclusion you made up to back up your rantings. I'm also pretty sure that all the papers I've read on this worm didn't say anything about druggies creating it in order to steal poser content. In addition IF and I repeat IF rendo was infected then only their root login would be in danger, not your PC unless you are running an unprotected mySql database. I also doubt that you have the technical background to judge the quality of any sites security measures regarding root/admin accounts or data security. What it comes down to is that you are trying to pass off information you read but obviously don't understand as back up for your parinoid rantings. That's wrong plain and simple.


SndCastie posted Sat, 29 January 2005 at 4:07 AM

This thread has run its corse and is getting out of hand I am locking this thread. SndCastie Poser Moderator


Sandy
An imagination can create wonderful things

SndCastie's Little Haven