Meet the Other Phone. Child-safe in minutes.

Meet the Other Phone.
Child-safe in minutes.

Buy now

Please or to access all these features

Site stuff

Join our Innovation Panel to try new features early and help make Mumsnet better.

See all MNHQ comments on this thread

Site attacks, hackergate and resetting passwords - here's what we know, what we're doing about it and what we think you should do. PLEASE READ!

999 replies

JustineMumsnet · 18/08/2015 15:37

On the night of Tuesday 11 August, Mumsnet came under attack from what's known as a denial of service (DDoS) attack. Our servers were bombarded with requests, which required our internet service provider to massively increase server capacity to cope. We were able to restore the site at 10am on Wednesday 12 August. Meanwhile a Twitter account, @DadSecurity, claimed responsibility, saying in various tweets "Now is the start of something wonderful", "RIP Mumsnet", "Nothing will be normal anymore" and "Our DDoS attacks are keeping you offline".

To add to the 'fun', it seems @DadSecurity also resorted to Swatting attacks. Swatting is a criminal practice in which someone makes an emergency call to the police claiming that a crime is taking place at the house of the intended victim, in order to get them to send a swat team to the address.

An armed response team turned up at my house last week in the middle of the night, after reports of a gunman prowling around. A Mumsnet user who engaged with @DadSecurity on Twitter was warned to "prepare to be swatted by the best" in a tweet that included a picture of a swat team, after which police arrived at her house late at night following a report of gunshots. Needless to say, she and her young family were pretty shaken up. It's worth saying that we don't believe these addresses were gained directly from any Mumsnet hack, as we don't collect addresses. The police are investigating both instances.

@DadSecurity also claimed that he had access to Mumsnet user data. Later on 12 August, it became apparent that someone/ones had hacked into some of Mumsnet's administrative functions, at which point they were able to redirect our homepage to the @DadSecurity Twitter profile page, as well as to edit posts from two users' account and an MNHQ account on our forums.

Someone claiming to be the hacker also posted on the thread on which users were discussing the site outage. We immediately locked down all access to our admin functions and reported the attack to the police. We were confident that users' passwords had not been accessed, because MNHQ doesn't hold them as plain text; they're all encrypted, so that no one - not even us - can see them.

However, over the weekend, a user reported that posts had been made under her name which weren't by her, and we spotted two other cases where this had happened. This clearly suggested that the hacker had nonetheless been able to get hold of some users' passwords.

Our best guess at this stage (and it is just a best guess) is that this has been done via a form of phishing, in which the hacker creates a fake Mumsnet login page to which users are directed when clicking on our login button. The page would have had a different url but otherwise would look just like the usual page. The hacker would have been able to see passwords in plain text when they were typed in.

We take great care to protect the information you give us and not to ask for or store any more information than we need to run the site, but though we can't know how many accounts have been affected, there have been enough breaches for us to ask all Mumsnet users to change their passwords. As a result, you'll no longer be able to log in to Mumsnet with your current password, and will need to create a new one, here.

This will mean that any passwords the hacker has been able to harvest up to this point will be useless. We are looking into what we can do to strengthen our defences against phishing, but in the meantime we need to ask you to be vigilant, and to check the URL of the login page for the foreseeable future. The correct URL is www.mumsnet.com/session/login and it reads rather than at the beginning. We will place a warning on the login page reminding you to do this.

Alternatively use the social login option (ie Facebook/Google) as then you won't be required to enter a password. And if you log into any other sites using the same password that you use on Mumsnet, it makes sense to change your password on those sites, too.

We're really sorry for the alarm and inconvenience this might cause, and we realise you're likely to have further questions about what's been happening, so here's a summary of answers to the most obvious questions.

You say the hacker was able to access Mumsnet users' data: was data from my personal account accessed?
We have no way of knowing how many Mumsnetters were affected - so far we have evidence of 11 user accounts being hacked but it's an ongoing investigation. Those users have been informed, and their passwords have been reset. We think it prudent, however, that everyone reset their passwords - which in any case is a sensible thing to do from time to time.

What data could the hacker see?
By using your password and login, he would have been able to see the data on your profile - so that includes your username or email plus your password, your postcode if you've supplied it, your username history and your Mumsnet inbox.

Now that I've changed my password, can you guarantee that my data is safe?
Unfortunately, we can't give you a cast-iron guarantee of this - no site can. By forcing a password reset the hacker won't be able to log in as you; however, if phishing was the cause, the page could be phished again, which is why it's important that you check the URL of the login page when you enter your details, or use your social login. If the URL is anything other than www.mumsnet.com/session/login, don't use it.

Final thoughts
The internet is of course brilliant, but it's not 100% safe and secure. Whenever you share anything on the web, either publicly (such as on a Mumsnet thread) or privately (such as the data you give to a website when signing up), have a think about how happy you'd be for that information to fall into the hands of someone else. Make your passwords as secure as possible and change them every few months. Use different passwords for different accounts. Close redundant accounts that you no longer use.

And if you read nothing else...
I do realise this post is long, so here's a quick summary:

DO reset your Mumsnet password
DO make passwords really strong to reduce the risk of them being guessed
DO check the URL of any login page to reduce risk of phishing
DO verify that is being used on login pages
DO use social login to avoid typing passwords
DON'T give out information to any organisations without verifying they are who they say they are (such as the fake @mumsnetsupport twitter account that had also been started but has now been removed by Twitter)

Please post here or mail us on [email protected] with any questions or thoughts. As you can imagine our inbox is fairly voluminous at the moment but we'll get back to you as quickly as we can.

Thanks very much for reading,

Justine

OP posts:
wickedlazy · 19/08/2015 01:11

.gq domain name. Equatorial Guinea. Domains became available for free on January 1, 2015. No links on page. Usual troll stuff.

HoneyDragon · 19/08/2015 01:12

Well on the bright side after this monumental fuck up we're probably all off the hook over NYE now Grin

DollyTwat · 19/08/2015 01:12

I think you should shut the site down til you've secured it. We were assured our passwords weren't compromised, no one gets 3000 from phishing
Please do the right thing MN

SurlyCue · 19/08/2015 01:13

"This was only possible because one of our members is a mod of Mumsnet. This member would like to remain anonymous"

This is bollocks. Even if a mod is helping them they couldnt give them passwords. They are encrypted. HQ cant see them. Ever.

wickedlazy · 19/08/2015 01:14

4chan oddballs.

Site attacks, hackergate and resetting passwords - here's what we know, what we're doing about it and what we think you should do. PLEASE READ!
Bogeyface · 19/08/2015 01:14

And I bet the "men" behind DadSecurity will say that they are not abusive!

I wondered when a certain group of abusive men all egging each other one would rear their (very) ugly heads again.

Bogeyface · 19/08/2015 01:14

on not one

SecretNutellaFix · 19/08/2015 01:14

Yay- our grounding is over, Honey!

SOmething we didn't do!

BertieBotts · 19/08/2015 01:14

How would shutting the site help, though?

cozietoesie · 19/08/2015 01:15

Naughty Honey. Grin

SecretNutellaFix · 19/08/2015 01:17

Shutting the site means that these silly people win.

DrLego · 19/08/2015 01:18

The number of registered users means 3000 is very possible with phishing. Ive noticed very weird things recently with password/site but put it down to the annoying added bits of trending and follow a thread, and the recent thing where everything went green. Yoof of today etc.
I'm so sorry to hear what Justine's been through and think it's rather grotesque when many people post here for support at a traumatic time in their lives, not just chit chat and debate. It's horrible. But for people to change their passwords the site needs to remain up I would think, and that's important.

wickedlazy · 19/08/2015 01:19

This reply has been deleted

Message deleted by MNHQ. Here's a link to our Talk Guidelines.

WellWhoKnew · 19/08/2015 01:20

You can cut and paste the list into word and then do a search that way for your username as a quick check.

Eeyorees you're not on it.

SurlyCue · 19/08/2015 01:20

no one gets 3000 from phishing

Lots of people will have NCed within the last week in the aftermath of the initial hacking. Very possible the initial hack was set up for that very purpose- scaring everyone into NCing so they could phish the new passwords as they were being changed.

HoneyDragon · 19/08/2015 01:22

Yes, Justine only shuts the site down and suspend EVERYONES posting privileges when we mess it up.

The moral of the story being Mnetters are more trouble and mayhem than actual hackers. #hashtagDadSecFailWeDidItBetterToOurOwnDamnSiteSoNer.

HarrietSchulenberg · 19/08/2015 01:22

Assuming that your MN password is unique and not used for anything else, just change it every 24 hours or so. 12 hours if you've got the time.

It devalues UselessDadsec's currency - he's going to have to work very hard to keep up.

You can have mine for free Dadsec, there's nowt juicy attached to it other than some chat I had with random women - it's DadsecWanksInSocks or something like that, I copied and pasted it into a memo app to save time logging in. Capitals might be a bit different but your glittering brain will soon crack it so you can post away or sell it. I couldn't give a stuff really.

YUDOTHIS · 19/08/2015 01:23

Fucking cockwombles, a cock the size of a flea and an ego bigger than a hot air balloon is probably an accurate description... I'm not going anywhere. fuck that. why should they win?

CloserToFiftyThanTwenty · 19/08/2015 01:24

You can do Control+F to search the list on the website through Internet Explorer, folks

HoneyDragon · 19/08/2015 01:25

Who you calling random Harriet?

TrionicLettuce · 19/08/2015 01:27

DollyTwat A previous username of mine is on that list, along with an older password, but it has a one letter mistake in it. A mistake that I very often made whilst typing it quickly to login. If all these usernames and passwords were actually from the database mine wouldn't have the spelling error in as the wrong version wouldn't be in their database.

Kleptronic · 19/08/2015 01:28

Good point well put Trionic.

BishopBrennansArse · 19/08/2015 01:29

Couple Of days ago people were getting logged out and had to log in again.

Cue phishing.

This lot do like Tuesdays

HarrietSchulenberg · 19/08/2015 01:30

Don't get offended Honey, this is where we all stick together (links arms forcibly and sings something about not being moved).

BertieBotts · 19/08/2015 01:31

Oh nice catch Trionic :)

Sounds like they have gone to bed anyway.