Fwd: An Important Message From HostRocket

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 






>From: "Customers" <support@hostrocket.com>
>Reply-To: "Customers" <support@hostrocket.com>
>To: sleeping_bum@hotmail.com
>Subject: An Important Message From HostRocket
>Date: 23 Nov 2001 17:58:18 -0000
>MIME-Version: 1.0
>Received: from [66.162.64.120] by hotmail.com (3.2) with ESMTP id 
>MHotMailBDC7E58700AC4004315742A24078B7A80; Fri, 23 Nov 2001 10:50:48 -0800
>Received: (qmail 17365 invoked by uid 99); 23 Nov 2001 17:58:18 -0000
>From support@hostrocket.com Fri, 23 Nov 2001 10:51:26 -0800
>Message-ID: <20011123175818.17364.qmail@host20.hrwebservices.net>
>Errors-To: "Customers Administrator" <support@hostrocket.com>
>Organization: Customers
>List: Customers
>List-Archive: 
>http://66.162.64.120/cgi-bin/mojo.cgi?flavor=archive&list=Customers
>List-ID: 20011123125431
>List-Owner: <support@hostrocket.com>
>List-Subscribe: 
>http://66.162.64.120/cgi-bin/mojo.cgi?flavor=subscribe&list=Customers
>List-Unsubscribe: 
>http://66.162.64.120/cgi-bin/mojo.cgi?flavor=unsubscribe&list=Customers
>List-URL: http://66.162.64.120/cgi-bin/mojo.cgi?list=Customers
>List-Software: Mojo Mail 2.5.1 http://mojo.skazat.com
>Precedence: list
>X-Priority: 3
>
>Dear Customer,
>
>You are receiving this letter because you either are a current or a past 
>customer of HR Web Services (HostRocket.Com).  The letter below details to 
>you the specifics of the situation including what has happened, what is 
>being done to remedy the situation and prevent its reoccurrence, and what 
>you the customer need to do.
>
>What Happened:
>
>A security hole found in a 3rd party billing software package used by us to 
>manage our customer billing which has had no known security holes until 
>this date was exposed, and the possibility arose that this information may 
>have found its way into the hands of people who should not have it, despite 
>our use of both SSL and heavy encryption.  We have no confirmation that 
>this information is in the hands of anyone with any malicious intent 
>towards our customers at this time, however the possibility may exist in 
>the future.  We cannot release the details of what program it was etc. yet 
>as there are many other hosts out there that run the same software package 
>who’s information will need to be protected as well.
>
>What We Did:
>
>Immediately upon the discovery of the intrusion we disabled the affected 
>systems to prevent the possibility of further access.  We then immediately 
>contacted the credit card processing companies involved to make them aware 
>of the possibility that the card info was compromised.  They assured us 
>that the card issuing banks would be notified immediately about the 
>situation, and it will be up to their discretion whether or not there is a 
>large enough threat posed by this to warrant canceling the cards and 
>issuing replacements.  They also reminded us to remind you the consumer 
>that you are not and would not be responsible for any fraudulent 
>transactions that might occur on your card in a worst-case scenario.
>
>The details regarding this policy implemented by Visa are located at: 
>http://www.usa.visa.com/personal/secure_with_visa/
>
>The details regarding this policy implemented by MasterCard are located at: 
>http://mastercard.com/general/zero_liability.html/
>
>What We Are Doing Now:
>
>The billing system was heavily modified to be more secure and moved to a 
>new more secure server in a new physical location and locked down with no 
>outside connection to the general Internet available for the affect backend 
>system, which has also been completely recoded.  Along with this, all 
>account passwords have been changed and new passwords sent to all current 
>HostRocket customers.  Other security policy changes are as follows.
>
>-3 digit confirmation code on the back signature panel of all cards to be 
>submitted with new orders.
>
>-All new orders to be confirmed by a live person on our staff before 
>account activation.
>
>-All telnet access to all hosting servers and requiring customers to use 
>SSH (secure shell).
>
>-IDS (intrusion detection systems) are being installed on all of our 
>hosting servers.
>
>These additional security measures are to help cut down on possible 
>security breaches on other servers of ours in the future.
>
>What You The Customer Should Do:
>
>All affected customers should contact their credit card company to see if 
>they feel that the card should be placed on hold.  Check to make sure that 
>you have received your new login and password information which should be 
>coming shortly after this email, and that the login and password work for 
>your account.  If they do not work, please contact us for immediate 
>resolution of any account access problems.
>
>We at HostRocket apologize repeatedly for any and all inconvenience this 
>will cause everyone involved.  We have hired additional staff to help with 
>the expected influx of support and to finish up our own in house billing 
>system which we have coded from the ground up and know to be secure. We 
>greatly appreciate your understanding and continued support, and look 
>forward towards working both for and with you to improve our services to 
>you and your websites alike during the coming years.
>
>-The HostRocket Team
>http://www.hostrocket.com
>
>
>--
>To unsubscribe from: Customers, just follow this link:
>
>http://66.162.64.120/cgi-bin/mojo.cgi?f=u&l=Customers&e=sleeping_bum@hotmail.com&p=8233
>
>Click the link, or copy and paste the address into your browser.
>
>


_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux