Jump to content
Search In
  • More options...
Find results that contain...
Find results in...
Crude

Linustechtips Dark Web Notification

The number of breached accounts listed there exactly matches the number of accounts that we know were breached in September 2015 (although from what I have seen of the dataset, it actually predates that slightly), so I'm pretty confident that this is not a new breach.

 

If you may have been affected, you should have been emailed at the time (in 2015), but if you're concerned then please feel free to send me a PM to check.

 

To the best of my ability to tell, this data seems to have been circulating for a while in some very deep parts of the internet.

Recommended Posts

I don't remember hearing or reading about a security breach here....hmmm


Ryzen Rig 2: ASrock B450 Pro4 ATX, Ryzen 7 1700 @ 4.2ghz all core 1.4vCore, Sapphire R9 Fury Tri-X Nitro 4gb HBM, 16gb (2x8) 3600mhz V-Color Skywalker, Corsair HX850 PSU, Custom Loop 2x240mm + 1x120mm radiator, 128gb Patriot Scorch NVMe Win 10 boot drive, 500gb Samsung 840 EVO SSD, CoolerMaster HAF XM Case

https://www.3dmark.com/3dm/37004594?

Ryzen Rig 1: ASUS B350-PRIME ATX, Ryzen 7 1700, Sapphire R9 Fury Tri-X Nitro 4gb HBM, 16gb (2x8) 3200mhz V-Color Skywalker, ANTEC Earthwatts 750w PSU, MasterLiquid Lite 120 AIO cooler in Push/Pull config as rear exhaust, 250gb Samsung 850 Evo SSD, Patriot Burst 240gb SSD, Cougar MX330-X Case

https://www.3dmark.com/3dm/37628874?

Dwight: The Mixed Metals Loop Media Center.  Ask me about it.

Micro Form Factor Dell OptiPlex 3040: Dell 0MGK50 A02, i3-6100T, 4gb DDR3 1600, Team Group 120gb SSD, Windows 10 Pro, Logitech K400+, M.2 Intel Wifi/Bluetooth

Linux Box: Toshiba Laptop, i7 620M, NVS graphics, 2gb ram tinker toy at the moment.  Running Manjaro at the moment

Link to post
Share on other sites
1 minute ago, CrudeR said:

I don't even remember signing up here with that email account they notified me about.

Hmm....

maybe the man himself can help...
 

@LinusTech 


Spoiler

Main Rig: 

AMD Athlon II X4 650 at 3.1GHz [4 cores, 4 threads] 

Foxconn Alvorix RS-880-uATX

MSI Radeon R9 380 Gaming 4G

2x4GB Generic 1600MHz DDR3

Seagate Firecuda 2TB 

Seagate Barracuda 1TB

Corsair CX500 (move along...)

HP Pavilion Case

Windows 10 Home, Pop! OS and Linux Mint 64-Bit

32 Inch Samsung TV 1080P 60Hz

Spoiler

Laptop #1

HP G56

Celeron 900 at 2.2GHz

Intel 4500MHD 

2x2GB Generic 800MHz DDR2

120GB Samsung 850 EVO SSD

Linux Mint 64-Bit 

Spoiler

REALLY Old (and unusable) Laptop

Intel Pentium M at a whopping 1.93GHz🔥

1x2GB Generic 800MHz DDR2

Nvidia GeForce GO 128 something or other

40GB 5400RPM IDE drive

Linux Mint 32-Bit (I’ve found its snappy on old systems. It works really well with both of my old laptops. 

Spoiler

Mobile Devices:

iPad Air 2 64GB Space Grey [running iPadOS 13]

iPhone SE 16GB Space Grey (oof) [running iOS 13] (soon to be iPhone 11)

 

 

Link to post
Share on other sites

There was this one "breach" couple of years back ( if my memory serves me correctly, right after switching to IPB). That kinda looks like a phishing email.

EDIT: I was correct.

image.png.e65f70ed0af232f5d7d6133eb4004a52.png

Link to post
Share on other sites
14 minutes ago, star_pilot475 said:

Hmm....

maybe the man himself can help...
 

@LinusTech 

As if he would know. @colonel_mortis

Is master on forums.


^^^^ That's my post ^^^^
<-- This is me --- That's your scrollbar -->
vvvv Who's there? vvvv

Link to post
Share on other sites
Posted · Original PosterOP

No need to bother Linus, I was just sharing.

And no it's not a phishing email, this is in my actually Lifelock account dashboard for dark web monitoring.

Link to post
Share on other sites

Have you had an account before 45 minutes ago? If not, that wouldn't make sense to be legitimate information.

 

If you had an account a while ago, the chances are that it was the breach from 2014, but I will look into it further to verify that. 


HTTP/2 203

Link to post
Share on other sites
3 minutes ago, colonel_mortis said:

Have you had an account before 45 minutes ago? If not, that wouldn't make sense to be legitimate information.

 

If you had an account a while ago, the chances are that it was the breach from 2014, but I will look into it further to verify that. 

Thx dawg 

Link to post
Share on other sites
Posted · Original PosterOP

Yeah I had an account way back but created a new one today with my Google account to post this.

I'm not even sure if my old account with that email address is still active here.

Link to post
Share on other sites

If the email that was sent to wasn't signed up with linustechtips.com I don't know how they would have gotten the password that wouldnt exist? Could it be a phishing email? Is the email sender legit? are there are fishy links in the email (do not click links unless you know where they lead and are safe)? Is the sender list a distro group where its being mass sent out and the email field is just being autofilled?

Link to post
Share on other sites
Posted · Original PosterOP
1 minute ago, hammjoel said:

If the email that was sent to wasn't signed up with linustechtips.com I don't know how they would have gotten the password that wouldnt exist? Could it be a phishing email? Is the email sender legit? are there are fishy links in the email (do not click links unless you know where they lead and are safe)? Is the sender list a distro group where its being mass sent out and the email field is just being autofilled?

This is not from an email, it's a notification in LifeLocks dashboard for darkweb monitoring.

Link to post
Share on other sites

The number of breached accounts listed there exactly matches the number of accounts that we know were breached in September 2015 (although from what I have seen of the dataset, it actually predates that slightly), so I'm pretty confident that this is not a new breach.

 

If you may have been affected, you should have been emailed at the time (in 2015), but if you're concerned then please feel free to send me a PM to check.

 

To the best of my ability to tell, this data seems to have been circulating for a while in some very deep parts of the internet.


HTTP/2 203

Link to post
Share on other sites
Posted · Original PosterOP

Yeah this does look to be from way back then but kind of surprised me this morning. I just wanted to post here for that slim chance it was something new so everyone was aware.

Is there anyway to combine my old account with this new one? I was able to change the pw and log into my old account.

If this is not possible I'll go through the steps of deleting my old one.

Link to post
Share on other sites
On 9/12/2019 at 3:10 AM, Crude said:

Yeah this does look to be from way back then but kind of surprised me this morning. I just wanted to post here for that slim chance it was something new so everyone was aware.

Is there anyway to combine my old account with this new one? I was able to change the pw and log into my old account.

If this is not possible I'll go through the steps of deleting my old one.

Yes - can you send me a PM that includes both accounts, and send a message from each to verify that you are you, then I can merge them for you.


HTTP/2 203

Link to post
Share on other sites
On 9/12/2019 at 12:34 AM, TempestCatto said:

https://haveibeenpwned.com/

 

Just checked and my email for here isn't compromised (granted that's only one source).

I checked and it says that there has been 1 breach and no pastes, should I be worried? I haven't seen any suspicions activity on my account yet

Link to post
Share on other sites
3 hours ago, realpetertdm said:

I checked and it says that there has been 1 breach and no pastes, should I be worried? I haven't seen any suspicions activity on my account yet

If you reused the password from that breached site on any other site, you should change it (ideally you should be using a password manager with a unique password for each site). The data loaded into HIBP is primarily sourced from publicly available data, so anyone could download your password and try to use it to log into your other accounts.

 

There are a couple of things listed as breaches there which didn't include any passwords. It should give you the details of the breaches that your email appeared in if you scroll down, and that should include what data was exposed. Even if your password wasn't leaked, I would still recommend switching to a password manager (LastPass and OnePassword are good, among others) if you haven't already.


HTTP/2 203

Link to post
Share on other sites
52 minutes ago, colonel_mortis said:

If you reused the password from that breached site on any other site, you should change it (ideally you should be using a password manager with a unique password for each site). The data loaded into HIBP is primarily sourced from publicly available data, so anyone could download your password and try to use it to log into your other accounts.

 

There are a couple of things listed as breaches there which didn't include any passwords. It should give you the details of the breaches that your email appeared in if you scroll down, and that should include what data was exposed. Even if your password wasn't leaked, I would still recommend switching to a password manager (LastPass and OnePassword are good, among others) if you haven't already.

My info seems to have been leaked in a canva.com breach, so thankfully there isn't any kind of credit card info that was leaked. It also seems like I used a completelt different password on that site so it's not that big of an issue... I think. Thanks for the help

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

Buy VPN

×