TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Mailgun Security Incident and Important Customer Information

187 点作者 hodgesmr超过 7 年前

12 条评论

ad_hominem超过 7 年前
When I get spam email, I usually check the headers and if it&#x27;s coming from a reputable service (Postmark, Sendgrid, etc.) they usually have a web form or an abuse@ email to send the headers to so that they can shut down the account.<p>Months ago I received spam from a Mailgun server and tried to use their web form[1] to report it, but it was broken. I reported both that bug and the spam email to their support, which acknowledged it. Weeks later I got another spam email from that same domain, popped open that report form and it was still broken (FWIW as of today it seems to be working again). So I followed up on my initial support request with that info but got no response. Just a few days ago I received another spam message from that domain.<p>I personally consider all that a very bad sign in an email service provider and wouldn&#x27;t use Mailgun myself. In contrast, I&#x27;ve been very happy with Postmark.<p>[1]: <a href="https:&#x2F;&#x2F;www.mailgun.com&#x2F;receiving-spam-from-mailgun" rel="nofollow">https:&#x2F;&#x2F;www.mailgun.com&#x2F;receiving-spam-from-mailgun</a>
评论 #16080888 未加载
评论 #16082336 未加载
评论 #16080659 未加载
r1ch超过 7 年前
This was used to steal bitcoin cash tips on Reddit by hijacking password reset emails (<a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;bugs&#x2F;comments&#x2F;7obxkb&#x2F;mailgun_security_incident_an_update_on_the_state&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;bugs&#x2F;comments&#x2F;7obxkb&#x2F;mailgun_securi...</a>)<p>I find it amusing they still have a &quot;trusted by Reddit&quot; blurb on their homepage after this!
评论 #16080795 未加载
评论 #16080440 未加载
评论 #16080631 未加载
评论 #16080566 未加载
评论 #16084081 未加载
clon超过 7 年前
Why would employees need access to client API keys, as opposed to just client ID?<p>Furthermore, this seems to indicate that the API keys are not hashed. I would expect some bits of the API key to work as an identifier and the rest of the bits treated as secret material (properly hashed).<p>As a Mailgun customer, this is concerning..
评论 #16083987 未加载
评论 #16084459 未加载
OJFord超过 7 年前
Er, can we expect more information to follow?<p>1. How was the employee&#x27;s account accessed? No 2FA?<p>2. Do employees ordinarily have access to customer secrets (e.g. API keys) or was there some further exploit?<p>3. The advice in OP for affected customers is to roll keys and SMTP logins. Couldn&#x27;t&#x2F;shouldn&#x27;t you do that for them? Surely security should trump up-time&#x2F;deliverability?
评论 #16081895 未加载
评论 #16083989 未加载
rcMgD2BwE72F超过 7 年前
Does this only affect Mailgun&#x27;s customers? If these customers hold data of third-party – let&#x27;s call them &quot;end-users&quot; – in Mailgun accounts, Mailgun could&#x2F;should communicate the total number of individuals affected. &quot;1% of our customers&#x2F;users&quot; can affect millions of individuals.
gouggoug超过 7 年前
In those security disclosures, I often read what I see as contradictory language.<p>For example, I&#x27;m confused by this kind of statement:<p>&gt; Mailgun has now completed its diagnostic of accounts that were affected and has notified each of the affected users. At this time, we believe less than 1% of our customer base was potentially affected. If you were not directly notified by Mailgun regarding this incident, then your account was not affected.<p>If you <i>believe</i> that <i>less than</i> 1% of users were affected, it means you don&#x27;t know for sure how many accounts were affected.<p>From there, how can you state that &quot;If you were not directly notified by Mailgun regarding this incident, then your account was not affected&quot;?<p>Doesn&#x27;t this last statement mean you know for sure my account was not affected? Isn&#x27;t it in direct contradiction with the previous statement?
评论 #16081196 未加载
评论 #16081270 未加载
devicenull超过 7 年前
No 2FA on staff accounts?
评论 #16080135 未加载
rajeemcariazo超过 7 年前
I like Mailgun so much because of its simplicity but last November 2017 the default postmaster account of one of our domain in Mailgun was hacked. (I don&#x27;t know where it was hacked but i suspect it was on the Mailgun server because I kept the secret key in my server very well). We moved to Sendgrid because my account in Mailgun got a very bad reputation. One of the hacked smtp credentials was used to send spam.
Gys超过 7 年前
&gt; At this time, we believe less than 1% of our customer base was potentially affected. If you were not directly notified by Mailgun regarding this incident, then your account was not affected.
ppierald超过 7 年前
&gt; Finally, we’d like to assure our customers and partners that we take security at Mailgun very seriously.<p>So very seriously that they don&#x27;t even use https for their blog...
评论 #16080300 未加载
评论 #16080877 未加载
评论 #16080203 未加载
评论 #16080200 未加载
ram_rar超过 7 年前
2FA, 2FA, 2FA!
MechEStudent超过 7 年前
Only 1%? My eye. This has smell of Yahoo to it. I bet within 6 months, this goes up toward 10%. I bet they lost their entire data.