Our wordpress index.php file was filled with “animal sex” spam… I reset the file, but I don’t know what the security vulnerability is. So we’re back up for now, but might not be some time soon. Let’s hope no more jackholes try to interrupt our fun.
7 thoughts on “We got hacked”
Comments are closed.
And what kind of animals would that be?I’m curious.
It was a variety, really. Have a look:
free animal sex
zoo sex
horse cum free
dogs sex
monkey animal sex
animal zoo sex
zoo sex video
rape sex
rape free
horse sex
female animal sex
monkey animal sex
animal monkey sex
free doggy sex
animal porn
gay animal sex
dog sex
animalsex free
animals cum
And on and on.
Consider yourself that now this blog is worth hacking.Congrats.
Yes, our 500 or so regular readers (most of whom never fucking comment) are a double-edged sword.
On an upnote, a wikipedia search for “jackhole” turned up this awesome entry on “Fictional Expletives.”
Jackhole – Coined by late night talk show host Jimmy Kimmel while still a member of the Kevin and Bean morning show on KROQ-FM in Los Angeles. Was later used by Cameron Diaz when hosting Saturday Night Live and became the title of Kimmel’s production company, Jackhole Industries. One of the more convincing fictional expletives since it is derived from parts of two actual expletives.
I’m sorry that my first comment on this site happens to be about one of the most lowbrow topics so far, but I was always partial myself to the expletive “buttass”, a perfect amalgam of potty humor that fans of “jackhole” might also enjoy.
Keep up the good work!
Don’t say what version you’re running in a comment, but there is a way to SQL inject on WordPress 2.0.2 and earlier. 2.0.5 just came out and I’ve been upgrading to it, since there are some other security fixes.
Now, if someone happened to brute force your ftp password, that’s not good. I’d change the ftp password ASAP to something crazy like bh189fasc9a.
If you know about when it happened, server logs could be very helpful, they’ll pretty much let you know who accessed and how.
Don’t worry, I upgraded wordpress to the latest version, and it seems to have fixed the very exploit that was used. Funny thing is that the new page they uploaded didn’t even work, just cause an error.