Hacker Newsnew | past | comments | ask | show | jobs | submit | JackFr's commentslogin

> by securing a large personal loan from Carlos Slim, who went on to become their biggest shareholder.

NYT has dual class shares. It’s run by the Sulzberger family despite Slim’s stake.

They are rich, but not billionaires.


I have a strictly hobby web app that I work on. 6-7 years ago I inadvertently pushed AWS email service credentials to GitHub.

Half an hour after the push I got an email and text from GitHub that I had exposed credentials. I quickly logged in to my AWS to turn off the service, to see that AWS had suspended that service because the bounce rate on the 80000 emails sent in that 15 minute period was too high. It was crazy just how fast it was exploited.


>> It was crazy just how fast it was exploited.

People underestimate the speed, but also the number of pivots that advanced attackers will make. Sure, these kinds of problems are easy to exploit, but with major organizations that employ reasonable defenses, the attackers will pivot through 50+ exploits/machines/layers to get to the target(s). This can take place over weeks or months.


It still doesn't make sense that advanced attackers would go to those lengths in order to... refund the customers.

There are lots of smart kids who don't particularly need reasons for causing mayhem. Suppose it was somebody profit-motivated though. They might be:

1. Distracting from a more important vulnerability

2. Later contacting customers, advising them of the "accidental" refund and redirecting them to a more appropriate payment mechanism (one without the KYC Stripe does, were they to try to steal funds directly)

3. Testing stolen credit cards before using them elsewhere

Etc. Scamming people is a big industry, and not all of the plots are immediately obvious.


Maybe guy's running the chatbot as customer service and user turned hacker to get his money back.

Vibe hacking is much older than vibe coding.

Plenty of hackers do it "for the lolz".

> It was crazy just how fast it was exploited.

The internet is a wild place in any aspect of it. You should try spinning up a random virtual private server on any cloud provider, plug in a public IP address,and listen to traffic. Sometimes it takes seconds to get your first traffic from vulnerability scanners.


This 100%. I'm in a space with developers and customers deploying web servers for the first time. This traffic freaks them out.

Basically a simple server listening on a port will experience hundreds of random script-probing attacks per day. And if any of them show the slightest hint of succeeding then that escalates quickly to thousands per minute.

You don't need a DNS entry to "expose" the IP address (there are only 4 billion). Moving to another port reduces, but doesn't eliminate the traffic.

Telling people this freaks them out. But as long as the server is done well its just noise.


Yesterday it was 4 seconds from a LE cert -> scans for .env and other low hanging info leak/vulnerabilities from at least 4 different scanners.

There are groups out there just looking at the certificate transparency logs to get the newly added certs to scan.


Yeah, one of the reasons why I started to for all my dev side projects to be under a single wildcard subdomain, because I used to create new certs automatically with letsencrypt and everytime this spam happened. If I do things right it shouldn't matter, but I still feel better with the wildcard if I was to make a mistake...

Short related story: some customer wanted an API with a basic firewall, they said they don't need filter rules as it won't be used or something. I put a dumb API online (doing nothing) and showed them the request logs after one day. They approved the filter rules immediately.

Years ago back in 2001, I had a /29 giving my 5 real IP addresses from my ISP.

Back then, I mostly only ran Linux, but for some reason, I needed to run something on a Windows machine, so started installing Windows 98 SE onto a machine, and set it up with a public IP address without even thinking about it. It crashed before it'd even finished installing [0], and investigation showed that it'd been whacked by an automated RCE exploit scanner.

I immediately decided it was never worth the risk of putting a Windows machine on a public IP, and set up a NAT even though I had 3 spare public IPs.

[0] There was already a published update to protect against this exploit, but I was scanned and hacked between the base install exposing the bug and the automatic update patching it.


Github repositories have statistics about access. Anyone can test this.

Create a new Github repo, within minutes there's someone (or something) poking around it.

Similarly if you post any credentials, they'll either get nabbed and used or a friendly scanner service will notify you about it and will tell you exactly where the credential is if you make an account in their service.


Here's an amusing thing to try on anything with SSH exposed. These log files go back a month.

  # zcat -f /var/log/auth.log* | awk '/sshd/ && /Invalid user/ && $6 != "from" {print $6}' | sort | uniq -c | sort -bnr | head -n 30
     5190 #redacted: my domain name
     3063 admin
     1891 #redacted: another domain name
      931 user
      724 ubuntu
      287 test
      268 solv
      206 odoo15
      200 solana
      197 sol
      184 ubnt
      173 wialon
      170 Antminer
      169 guest
      168 odoo17
      159 oracle
      157 postgres
      151 git
      150 support
      142 ftp
      135 ftpuser
      120 debian
      118 pi
       91 nginx
       85 baikal
       82 docker
       81 perl
       74 operator
       74 deploy
       72 dev

Interestingly, I have a server that only has IPv6 SSH open to the outside world, and it has exactly zero that aren't me fat-fingering a password. It does have an externally visible hostname, which says to me that the bots aren't looking at hostnames for SSH, just IP(v4) addresses.

I'm wondering what 'seekcy' is. Possibly a Chinese security product?

  $ journalctl | awk '/sshd/ && /Invalid user/ && $6 != "from" {print $8}' | sort | uniq -c | sort -bnr | head -n 30
     34 admin
     26 oracle
     21 postgres
     20 user
     18 test
     18 seekcy
     17 ftpuser
     15 ubuntu
     15 inspur
      9 zabbix
      8 nginx
      8 mysql
      8 jenkins
      8 hadoop
      7 server
      7 nagios
      6 teste
      6 amax
      5 support
      5 backup
      5 administrator
      4 git
      4 demo
      4 a
      3 zyfwp
      3 usuario
      3 tomcat
      3 testuser
      3 test1
      3 teamspeak

Googling it points to a Chinese IoT company, so I am thinking maybe they have some IoT software with known vulnerability where they have seekcy as the ssh username that is being actively scanned for.

Meanwhile on my publicly available Oracle VPS...

  22307 admin
  19668 user
  15396 ubuntu
   7038 user2
   6954 test
   6375 debian
   3938 ftpuser
   3433 postgres
   3416 oracle
   3076 deploy
   3003 steam
   2917 user1
   2830 dev
   2570 test1
   2352 es
   2187 server
   1957 hadoop
   1680 alex
   1676 guest
   1517 testuser
   1494 sammy
   1392 mysql
   1228 minecraft
   1218 pi
   1184 support
   1148 sysadmin
   1140 ubnt
   1120 from
   1090 123456
   1035 test2

> 118 pi

I wonder why this features so low in the list. The default user:pass combo for Raspbian/Raspberry Pi OS is pi:raspberry

https://forums.raspberrypi.com/viewtopic.php?t=151745


was pi: raspberry, but it was changed a long time ago to have no default user:pass

Wouldn't say it is low if it is within the top 20 amongst other very popular services.

I'm surprised there is no root there? In my experience this is by far the most common.

I'm almost certain SSH does not allow root login by default.

Yes, and it is disabled on my servers and I'm glad for this, because it still seams to be the most common in my logs.

I think common people also underestimate how fast a computer really is nowadays, because they only know bloated MS Windows machines.

> Don’t like porn? Don’t buy it.

Ok.

Don’t like porn? Don’t sell it.

“CENSORSHIP! PURITAN NAZIS!”


I spent years knowing nothing but C and I’d say it handicapped me in many ways. (I recall insisting that it would be impossible to do anything without assignment.)

After getting my eyes opened a little bit, I read SICP and it was mind blowing. I read a little Haskell, wrote a little Clojure and a lot of Scala. And even though the day job now is Java and Python, I’m much better off for having bothered to learn it.


My daughters went to a Catholic all girls high school. The translated Catallus 16 in Latin class.

https://en.m.wikipedia.org/wiki/Catullus_16

I don’t think anyone considered that the Latin syllabus might be a cause for concern.


If people are gonna use “natural” as a justification, nothing more natural than violence.

The concept of natural vs. non-natural is a human and largely cultural construct.

It’s still a useful word, but it can’t really shoulder the burden of making one argument more rational than the other.


This is off-topic, but I like pointing out that natural does not mean good, especially to hippies at the supermarket who want to pay more for "organic" foods that "aren't full of chemicals". I sympathise with them, but also wish they'd use more appropriate words, and understand the cost of their luxury beliefs.

Tsunamis, earthquakes, flash floods, tornadoes, locust swarms, plagues are "natural". Amanita muscaria, Dendrobatidae and Boa constrictors are "natural" and will fucking kill you.

I think the better distinction is found in Leviathan, contrasting human society (and its set of social contracts) with the "state of nature" - what human life was like before we formed societies:

> In such condition there is no place for industry, because the fruit thereof is uncertain, and consequently no culture of the earth, no navigation nor the use of commodities that may be imported by sea, no commodious building, no instruments of moving and removing such things as require much force, no knowledge of the face of the earth, no account of time, no arts, no letters, no society, and which is worst of all, continual fear and danger of violent death, and the life of man, solitary, poor, nasty, brutish, and short.


That's reporting by the local affiliate, not the Fox News.

You can volunteer for a study. Check for flyers at your hospital asking for volunteers. (Especially psychiatric institutions - they love brain MRIs for their research.)

Yeah, hopefully someone will want to do a study on autism, adhd, trans women or all of the above

Multiple heart attacks.

That I can well believe!

Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: