Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
Going to share a little update related to my security incident Monday. Going to keep it terse for now, because I still have work to do, to fully put my mind at ease, but a few things I wanted to get out there for others, and I now have secured danfinlay.com to a degree where I no longer feel threatened by some self righteous sysadmins.
7 replies
76 recasts
206 reactions

Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
The compromise was of my main danfinlay.com domain. It was a domain I'd had on the same registrar (asmallorange) since I'd first gotten it almost 20 years ago. It was a small shop, but I'd never had issues with them, so it felt very lindy. I didn't realize they sold to web.com, and I didn't realize how bad web.com security was.
1 reply
3 recasts
30 reactions

Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
The domain was compromised at least a month ago, and I became aware of it because the attacker attempted (and failed) to takeover my twitter/X account (thanks 2FA!). Twitter locked down the account very well (I still don't have access, but neither does an attacker), but the DNS registrar was deceptive:
1 reply
1 recast
9 reactions

Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
The registrar claimed they locked down the account, and no attacker had my domains/emails anymore, but they were wrong. They had left an email forwarder on their servers (not visible on public DNS records) to the attacker's address. That forward is how the attacker performed a password reset/login using the warpcast web interface.
1 reply
1 recast
13 reactions