← Back to context

Comment by Brendinooo

8 days ago

Does anyone want to talk about the hack itself? Can anyone give more details than "left their database open"? I came to this site hoping for a real discussion about that and didn't see it here yet...

Someone unminified the js, and it turned out that a bunch of the rest endpoints it knew about were just unverified crud endpoints for the site.

https://archive.ph/2025.02.14-132833/https://www.404media.co...

> The database it is pulling from can be and has been written to by third parties, and will show up on the live website.

Not enough detail to say for sure; could be SQL injection, could be credentials exposed in the frontend.

My bet is on SQL injection

  • They used one of those databases which are easy to connect directly to the internet, it's the same thing as about 90% of modern data breaches.

    Every generation we make things much easier, lower the bar, and are rewarded when amateurs make amateur mistakes like this.

  • In the year of our lord 2025? I doubt it. I'd put money on "some third party cloud service was configured in a silly way".

    But, I would love to see details.

I mean the article is paywalled but it sounds like this is isolated to their site-displayed twitter feed; basically the site was hosted by cloudflare and you could insert your own fake tweets into what was recorded on the site (but not on the actual DOGE twitter feed). I don't think any data was actually compromised

  • I can't speak to any data that may or may not be compromised, but this isn't about inserting fake tweets. Anything in their "government org chart" can be edited unauthenticated.