TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

PokeBeach Hacked, Next Steps for the Site

29 pointsby gabythenerdalmost 4 years ago

6 comments

squeaky-cleanalmost 4 years ago
Wow, pokemon cards as ransom, that's a new one for me. The post doesn't say how much later the message was sent, so it could possibly be a troll who noticed the website was missing data. But still that's quite a story. Sorry that happened to you guys.
vmceptionalmost 4 years ago
So the only mistakes the hacker made was not waiting for the download to complete before trying to get greedy<p>The paypal switcheroo was dumb too
评论 #27714996 未加载
sovaalmost 4 years ago
Wow that really sucks. I&#x27;m sorry this happened to you guys. Hopefully you&#x27;ve got a backup on a USB somewhere. If not, all the best with working on a brand-new site! =)
评论 #27714019 未加载
personjerryalmost 4 years ago
Perhaps archive.org can provide some of the missing articles?
ezoealmost 4 years ago
&gt;The team first reverse-engineered our backup script to delete all of our offsite backups.<p>I guess the permission should be one way. The production server can only push data to backup server, never to delete or overwrite anything even if it wanted to.
评论 #27715158 未加载
endigmaalmost 4 years ago
what software introduced the vulnerability? it seems sorta odd to write an article about this and not warn others how to prevent it or document exactly what went wrong