Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
Going to share a little update related to my security incident Monday. Going to keep it terse for now, because I still have work to do, to fully put my mind at ease, but a few things I wanted to get out there for others, and I now have secured danfinlay.com to a degree where I no longer feel threatened by some self righteous sysadmins.
7 replies
76 recasts
186 reactions

Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
The compromise was of my main danfinlay.com domain. It was a domain I'd had on the same registrar (asmallorange) since I'd first gotten it almost 20 years ago. It was a small shop, but I'd never had issues with them, so it felt very lindy. I didn't realize they sold to web.com, and I didn't realize how bad web.com security was.
1 reply
3 recasts
27 reactions

Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
The domain was compromised at least a month ago, and I became aware of it because the attacker attempted (and failed) to takeover my twitter/X account (thanks 2FA!). Twitter locked down the account very well (I still don't have access, but neither does an attacker), but the DNS registrar was deceptive:
1 reply
1 recast
9 reactions

Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
The registrar claimed they locked down the account, and no attacker had my domains/emails anymore, but they were wrong. They had left an email forwarder on their servers (not visible on public DNS records) to the attacker's address. That forward is how the attacker performed a password reset/login using the warpcast web interface.
1 reply
1 recast
13 reactions

Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
The registrar had requested many documents from me to restore the account to myself, and I provided them, and they were slow to reply. I should have nagged more, but I believed the account was at least no longer under attacker control. A month later, they conducted this FC attack, which promoted a meme coin which was used to defraud my followers of ~$150k after the rug.
1 reply
0 recast
6 reactions

Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
At this point, the registrar requested EVEN MORE documents from me, and claimed they had stopped forwarding emails to the attacker (I later found this was also not the case). I drove around getting the docs they requested and regained control of the account on the same day (Monday), but due to issues within the registrar site, only was able to finally transfer the account to another registrar today, so I'm free of them now.
1 reply
0 recast
7 reactions

Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
Some friends in the security community were able to freeze the attacker's stolen funds. I believe this does not mean they are recoverable, but it does mean the attacker will not profit from this attack, which is nice. Some readers of this were probably defrauded and will continue to assume the worst of me, and that sucks.
2 replies
0 recast
6 reactions

Dan Finlay 🦊 pfp
Dan Finlay 🦊
@danfinlay
The domain that was taken over was used for many of my accounts, but none of my MetaMask related responsibilities, which were gapped to accounts that are controlled by different machines entirely, so MetaMask infrastructure was never at risk during this attack.
1 reply
0 recast
7 reactions

accountless.eth pfp
accountless.eth
@accountless.eth
nobody blames you for that man
0 reply
0 recast
0 reaction