TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Mailgun Security Incident and Important Customer Information

187 pointsby hodgesmrover 7 years ago

12 comments

ad_hominemover 7 years ago
When I get spam email, I usually check the headers and if it&#x27;s coming from a reputable service (Postmark, Sendgrid, etc.) they usually have a web form or an abuse@ email to send the headers to so that they can shut down the account.<p>Months ago I received spam from a Mailgun server and tried to use their web form[1] to report it, but it was broken. I reported both that bug and the spam email to their support, which acknowledged it. Weeks later I got another spam email from that same domain, popped open that report form and it was still broken (FWIW as of today it seems to be working again). So I followed up on my initial support request with that info but got no response. Just a few days ago I received another spam message from that domain.<p>I personally consider all that a very bad sign in an email service provider and wouldn&#x27;t use Mailgun myself. In contrast, I&#x27;ve been very happy with Postmark.<p>[1]: <a href="https:&#x2F;&#x2F;www.mailgun.com&#x2F;receiving-spam-from-mailgun" rel="nofollow">https:&#x2F;&#x2F;www.mailgun.com&#x2F;receiving-spam-from-mailgun</a>
评论 #16080888 未加载
评论 #16082336 未加载
评论 #16080659 未加载
r1chover 7 years ago
This was used to steal bitcoin cash tips on Reddit by hijacking password reset emails (<a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;bugs&#x2F;comments&#x2F;7obxkb&#x2F;mailgun_security_incident_an_update_on_the_state&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;bugs&#x2F;comments&#x2F;7obxkb&#x2F;mailgun_securi...</a>)<p>I find it amusing they still have a &quot;trusted by Reddit&quot; blurb on their homepage after this!
评论 #16080795 未加载
评论 #16080440 未加载
评论 #16080631 未加载
评论 #16080566 未加载
评论 #16084081 未加载
clonover 7 years ago
Why would employees need access to client API keys, as opposed to just client ID?<p>Furthermore, this seems to indicate that the API keys are not hashed. I would expect some bits of the API key to work as an identifier and the rest of the bits treated as secret material (properly hashed).<p>As a Mailgun customer, this is concerning..
评论 #16083987 未加载
评论 #16084459 未加载
OJFordover 7 years ago
Er, can we expect more information to follow?<p>1. How was the employee&#x27;s account accessed? No 2FA?<p>2. Do employees ordinarily have access to customer secrets (e.g. API keys) or was there some further exploit?<p>3. The advice in OP for affected customers is to roll keys and SMTP logins. Couldn&#x27;t&#x2F;shouldn&#x27;t you do that for them? Surely security should trump up-time&#x2F;deliverability?
评论 #16081895 未加载
评论 #16083989 未加载
rcMgD2BwE72Fover 7 years ago
Does this only affect Mailgun&#x27;s customers? If these customers hold data of third-party – let&#x27;s call them &quot;end-users&quot; – in Mailgun accounts, Mailgun could&#x2F;should communicate the total number of individuals affected. &quot;1% of our customers&#x2F;users&quot; can affect millions of individuals.
gouggougover 7 years ago
In those security disclosures, I often read what I see as contradictory language.<p>For example, I&#x27;m confused by this kind of statement:<p>&gt; Mailgun has now completed its diagnostic of accounts that were affected and has notified each of the affected users. At this time, we believe less than 1% of our customer base was potentially affected. If you were not directly notified by Mailgun regarding this incident, then your account was not affected.<p>If you <i>believe</i> that <i>less than</i> 1% of users were affected, it means you don&#x27;t know for sure how many accounts were affected.<p>From there, how can you state that &quot;If you were not directly notified by Mailgun regarding this incident, then your account was not affected&quot;?<p>Doesn&#x27;t this last statement mean you know for sure my account was not affected? Isn&#x27;t it in direct contradiction with the previous statement?
评论 #16081196 未加载
评论 #16081270 未加载
devicenullover 7 years ago
No 2FA on staff accounts?
评论 #16080135 未加载
rajeemcariazoover 7 years ago
I like Mailgun so much because of its simplicity but last November 2017 the default postmaster account of one of our domain in Mailgun was hacked. (I don&#x27;t know where it was hacked but i suspect it was on the Mailgun server because I kept the secret key in my server very well). We moved to Sendgrid because my account in Mailgun got a very bad reputation. One of the hacked smtp credentials was used to send spam.
Gysover 7 years ago
&gt; At this time, we believe less than 1% of our customer base was potentially affected. If you were not directly notified by Mailgun regarding this incident, then your account was not affected.
ppieraldover 7 years ago
&gt; Finally, we’d like to assure our customers and partners that we take security at Mailgun very seriously.<p>So very seriously that they don&#x27;t even use https for their blog...
评论 #16080300 未加载
评论 #16080877 未加载
评论 #16080203 未加载
评论 #16080200 未加载
ram_rarover 7 years ago
2FA, 2FA, 2FA!
MechEStudentover 7 years ago
Only 1%? My eye. This has smell of Yahoo to it. I bet within 6 months, this goes up toward 10%. I bet they lost their entire data.