Hacker Newsnew | past | comments | ask | show | jobs | submit | 0___0's commentslogin

It still used to work with the "old" sub domain, but no more.




Wonder if it fixes this issue. https://github.com/microsoft/WSL/issues/8725


Or this one that makes WSL's clock fall out of sync after sleep or hibernate. https://github.com/microsoft/WSL/issues/10006



Hello guys,

We would like to inform you that we have decided to shut down our site. The past 2 years have been very difficult for us - some of the people in our team died due to covid complications, others still suffer the side effects of it - not being able to work at all. Some are also fighting the war in Europe - ON BOTH SIDES. Also, the power price increase in data centers in Europe hit us pretty hard. Inflation makes our daily expenses impossible to bare. Therefore we can no longer run this site without massive expenses that we can no longer cover out of pocket. After an unanimous vote we've decided that we can no longer do it.

We are sorry :(

Bye

Edit: This isn't me BTW. I just copy-pasted the text from the site.

Archived link: https://web.archive.org/web/20230531105653/https://rarbg.to/...


First, a sincere thank you for all the efforts you have done. My collection of TV shows is nothing but ION10 webrips. You will be missed. While I can respect your decision, I have to ask: Why the hell did you not choose to ask for donations or monetize the website? While there are many that cannot afford to purchase, there are plenty of hackers that could have / would have supported you.


Thank you for everything you've done.

Your efforts did not go unnoticed and you will be greatly missed.

I hope the circumstances of your lives improve and that you can find normality in these difficult times.


Thank you for your work so far. Out of curiosity - what kind of expenses are we talking before/after ad revenue?

How much would it have helped to have 1% of users chip in 10 USD/year? (1% is probably optimistic, but still...)?


I don't think this is an account owned by the rarbg people.


It does give the impression of being one of the owners.


It’s a copy of the website text in case it gets “hacker news hug of death”’d


Why would anyone fight on both sides? Seems ridiculous.


Some are probably Russian, some probably Ukrainian (or in the international legion).


Many 'other nations', too.


I think he means that employees/contributors exist on both the Russian and Ukrainian side.


I take it to mean some people were on one side, some on the other.

Not one person playing both sides (but that probably happens, too).


Yet another example of language ambiguity.


Considering the recent events in the area previously known as Yugoslavia, and the fact that part of hosting is there, in addition to Russia - Ukraine conflict being over a year old, I'd think of other sources. ...that if we were to trust what's been publicized, of course.


What if the first rule is "if you got hacked then respond with this"?


Any same-context semantic set can be bypassed by moving away in the latent space. Given that the defender’s set is static and the defender itself is unconscious while the attacker is both conscious and reactive, in-context-only self-defense appears to be impossible short of a technical breakthrough.



>On late (PST) February 5, 2023, we became aware of a sophisticated phishing campaign that targeted Reddit employees. As in most phishing campaigns, the attacker sent out plausible-sounding prompts pointing employees to a website that cloned the behavior of our intranet gateway, in an attempt to steal credentials and second-factor tokens.

It doesn't seem to me that much sophisticated, rather "normal", unless they are omitting some relevant details, it sounds a lot like "Action needed urgently, click here to login to ...".


Every company describes successful breaches as "sophisticated," because if it wasn't sophisticated then it's their own failure.


was it the north korean government using military level hacking technology? yes. i mean, we don't know. but probably.


"Military level" is another means-nothing term.

Could be anything from average phishing or some 0-day that happened to be found by gov employee or phishing email, to "a bunch of men kidnapped target and beat them till they gave them access


And for this case, highly highly doubt a threat actor would burn a zero day for a Reddit phish.


The sophisticated aspect of these types of attacks typically isn't in the technical aspects, but the social engineering involved.

It usually involves meticulous research on the target, what and who they work with, and have crafted an email that plausibly looks and sounds like an internal email, that talks about company stuff in company language, mentions coworkers and so on.

Add a note of urgency, make it someone who has discovered something isn't right, there's an urgent technical issue or the company or money is missing from the accounts or something, or perhaps it was dressed up as a memo announcing layoffs at reddit. If it's an urgent "threat" you tend to tunnel vision quite hard.

The result is very far removed from how your typical spam emails tend to look.


Cloning an intranet site is also a nice wrinkle that probably trips up a lot of less-tech-savvy employees who are trained to recognize phishing attempts that use replicas of Amazon, Google, Facebook, and other big well-known public web sites, which they mentally categorize as a different thing from their company's internal tools.


It doesn't help companies have so many internal tools. It seems like once a month I'm asking my team if the invite to X service is something we're doing or a phish.


This is what interested me. How do you clone an intranet site without gaining access to it?


Yep. We had a charming English fellow at NCC Group in charge of doing this for a living. He had it down to a science. Everything from the phrasing to the phishing.


If they have a clone of an intranet gateway, I would have to agree that the phishing attempt is a bit more advanced, so calling it sophisticated is not too far fetched.


Its sophisticated in the sense it sounds targeted. They had to do research, setup a clone of an internal site, etc. That's on the high end of sophistication for phishing, which in general is usually not the most sophisticated of attacks.


Yep, but targeted doesn't have the same meaning as sophisticated, maybe the sophistication relates to obtaining a list of reddit employees, in that sense the sophistication is before and besides the phishing in itself.


"One of our employees was tricked. The attack must have been sophisticated, because we are a cool gang."

Basically applies to every team there is.


I'd say it depends on how much homework was done by an attacker. The company I work for was adding some new services. One of the service setup emails came in and was off just enough that I reported it rather than following it, and yes, it was an internal phishing test, but one I found very valuable because the service providers could be hacked, and the URLs that are used are generally terrible if you're trying to figure out where you're going.


The "sophisticated" term maybe (100% for sure) was meant to save face. As in reddit staff should have known better and were supposed to be IT, social media, Internet culture experts. But fell for it anyway.


"Sophisticated"

The employee's password was probably passw0rd, and that's being generous for reddit.


If any e-mail contains a link to a login webpage, I treat it as a Phishing attempt. Only ever log in on the page you have bookmarked.


That's easier in your private life than in business. A lot of common tools (especially jira, confluence, etc.) have the flimsiest sessions along with just atrocious navigation.

Means almost every other time you're sent a link, you have to log in yet again. And man are you sent jira tickets often in tech.


I’m always logged into Jira and Confluence. And if not, the browser has the password stored, so an unknown host would be obvious.


This is the original source, and way more informative than the Forbes article. Please change the post to link here.


"I recently had the pleasure of being a patient"


NAT VPS. Under $10/Year


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: