• (cs) in reply to JL
    JL:
    ...I don't understand the purpose of this company. If the customers are submitting information in hopes of sales, you'd think the contact information would be public, and publicized as much as possible. It can't be for want of privacy, because their leads are coming from an already-public list of government contractors....
    THAT is TRWTF right there.
  • Intchanter (unregistered) in reply to Random832
    Random832:
    No, a sign that says "This door is locked, you need a key to get in", on a door that has a dummy keyhole but no actual lock.

    You're still assuming there is a room. Put the sign on a door at the end of a hallway that leads outside where you can see the billboard with their "advertiser listing" and you're closer to the real situation.

    It's still visible from the street, and being in the hallway in the first place was obviously optional.

  • hibs (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT
    FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT:
    thank you hackers for trying to destroy federal suppliers guides reputation. i have worked here with my wife for 10 years now and have helped hundreds of clients obtain federal government work. i have 4 children and though you don't care you are hurting the feelings of many good employees and customers by your immature actions. sorry our site wasn't protected to your standards however all of you are being reported to the appropriate authorities as we have your information too. you should of protected your info a little better. not only is the company legit we actually have held a 5 year GSA contract with the federal government and one of my best clients just broke 500,000 dollars in federal sales directly related to the GSA contract we got them. i am proud to work here and help small businesses obtain government workand also help federal buyers locate qualified small businesses to do business with. if you not interested in government work or our services of helping small businesses navigate the federal market fine but please don't slander the company. its rude, your comments are not truthful we are not a scam and i hope someday you realize that all you have to do is check us out with dun & bradstreet or GSA or the florida local and state chambers of commerce to see that what we do is real and federal buyers do request both our hardcopy guides and the online directory as well.

    HAHAHAHAHAHAHAHAHAAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA Listen up you MORON, your security is such that anyone with 8 seconds of work could "hack" their way in. Your idea of site security is laughable at best, and you need to get a grip.

  • John (unregistered)

    Bob Smith: This is the same as leaving your wallet with your bank card and a note that has your PIN at a restaurant.

    No, because even with the PIN and the card, accessing his bank account is illegal and you can't just walk up and access his bank account by knowing his branch address and nothing else.

    This man has an aardvark. On a pedestal. He has a velvet rope surrounding the pedestal. He has a carnival hawker crying "Guess the secret word and SEE THE AARDVARK! You can't see the aardvark if you don't guess the secret word!".

    And, of course, everyone is just looking around the carnival barker, over the velvet rope, and pointing out to him that that's no aardvark, that s a raccoon with a skin condition.

  • John (unregistered)

    Bob Smith: This is the same as leaving your wallet with your bank card and a note that has your PIN at a restaurant.

    No, because even with the PIN and the card, accessing his bank account is illegal and you can't just walk up and access his bank account by knowing his branch address and nothing else.

    This man has an aardvark. On a pedestal. He has a velvet rope surrounding the pedestal. He has a carnival hawker crying "Guess the secret word and SEE THE AARDVARK! You can't see the aardvark if you don't guess the secret word!".

    And, of course, everyone is just looking around the carnival barker, over the velvet rope, and pointing out to him that that's no aardvark, that s a raccoon with a skin condition.

  • Bob Dobbs (unregistered) in reply to Steve

    Check this out:

    http://www.google.com/search?hl=en&q=site%3Ahttp%3A%2F%2Fofficers.federalsuppliers.com%2F+&btnG=Search

    Due to their completely inept security google has spidered and cached all of the pages contents!

  • Stenvne (unregistered) in reply to Annaleemac
    Annaleemac:
    Aren't all you wienies, I mean geeks, just so proud of yourselves? I guess between taking a few tokes you have nothing better to do than slam people trying to actually work for a living. While you have all day to sit around in your underwear trying to prove your superiority breaking into what amounts to other people's houses, (albeit, online houses) the rest of the world is working. It must be tough for you to justify your lives without vilifying others. I'm sure you don't even try. People who make false statements about others may find themselves at the wrong end of a lawsuit. People in glass houses shouldn't throw stones. But, don't worry, nothing could possibly happen to you. I'm sure no one could find your address. I'm sure you all operate everything in your life on the up and up and can hold up to scrutiny as well. So, just smoke another one and don't you worry about it.
    1. Are you aware of the complexities of lawsuits in an international electronic media environment? I think not.. I could be next door or 6K miles away in a country that has no electronic exploitation laws what so ever.

    2. Threatening people with a wet noodle just pisses them off and opens yourself to alot more grief. Not a good idea.

    3. Defaming an individuals character because they happen to be more skilled in an area than you are is simply childish. So take your spanking, learn from it.. and move on.

    Respectfully submitted.

  • CT (unregistered)

    I'd like to thank the author of this article. I've been contacted several times by FSG regarding getting into their guide but never done it. Now they got a hold of my boss and he wants to do this. In addition, I contacted them regarding getting a GSA contract, which they quoted me on, guaranteed we would get on the schedule or our money back. I was worried about the fact that they insisted on addressing my concerns via phone rather than email (for an easy paper trail).

    I was very close to getting the contract signed and sent in, but this is a real eye opener, and I was reminded of the fact that they never sent us a copy of their guide as I requested. Thanks for most likely saving us thousands of dollars (the price they quoted was MUCH lower than other firms that do this, which also worried me). I've disliked their site from the start, it doesn't look professional at all, and after seeing how they handle security and authentication, I'll definitely be looking in another direction. Thanks again!

  • Junkman (unregistered)

    The FIRST PARAGRAPH of the Computer Misuse Act (UK only - I've not looked into US law - wouldn't know where to start...):

    "A person is guilty of an offence if—

    (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer;

    (b) the access he intends to secure is unauthorised; and

    (c) he knows at the time when he causes the computer to perform the function that that is the case. "

    To make a point for any UK readers thinking this may be fun:

    a. clicking "view source" is to "perform any function" - no matter HOW menial it may appear to an experienced IT specialist. b. the access...is unauthorised - attempts were made to conceal the information, no matter how pathetic. c. "he knows...this is the case" - Pretty self evident from the article.

    All in all, I'd say bad show from the TDWTF, stick to anonymity, or wait until April 1st next time...

    ...but also, if those comments are generally from HSG, grow up and get some professionalism - you're an embarassment.

  • Caleb (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT
    i have 4 children and though you don't care you are hurting the feelings of many good employees and customers by your immature actions. sorry our site wasn't protected to your standards however all of you are being reported to the appropriate authorities as we have your information too.

    I'm glad you've run a successful business in order to support your family (I'm serious about that), but the problem is that your site isn't secured whatsoever by any industry standards.

    Your login form is the equivalent of locking the door to your office and taping the key onto the front of the door (and that's being generous). While I don't believe that justifies anyone in using the data, you simply need to use real security.

  • Anonymous (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    thank you hackers for trying to destroy federal suppliers guides reputation

    You're a moron. There was no CRACKing involved. You gave out the name and password freely with each and every "login" page load. Get a clue.

    We have the list of scammed "clients" you so kindly provided openly and will be forwarding it to the FTC and the Attorney General for review. Hold on to your ass pal because you're about to go for a ride.

  • Junkman (unregistered) in reply to Junkman

    HSG = FSG... duh

  • Rev. Spaminator (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    As a former business owner, your company is exactly the kind of scam I came across all the time.

    "We'll list you in our directory for a nominal fee."

    Usually the fee turns out to be FAR from nominal and the directory is something no one has ever heard of.

    You think you're providing a service, fine. Spend some of the fees you are charging to hire a REAL web programmer who can a real layer of security to your site. If I place my home banking password and account number on my website, along with a link to the bank's site, NO prosecutor in their right mind is going to have sympathy on me. Relying upon javascript for authentication is the same thing.

  • Stenvne (unregistered) in reply to CT
    CT:
    ...I was worried about the fact that they insisted on addressing my concerns via phone rather than email (for an easy paper trail)...

    The likely reason for this is -- electronic text based communication for the purposes of exploitation, extortion or fraud are now covered under the same criminal code as mail fraud.

    Cheers.

  • John (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    I guess use of punctuation and paragraphs is not a paramount requirement for doing business with the federal gub'mint.

  • Stenvne (unregistered) in reply to Junkman
    Junkman:
    The FIRST PARAGRAPH of the Computer Misuse Act (UK only - I've not looked into US law - wouldn't know where to start...):

    "A person is guilty of an offence if—

    (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer;

    (b) the access he intends to secure is unauthorised; and

    (c) he knows at the time when he causes the computer to perform the function that that is the case. "

    To make a point for any UK readers thinking this may be fun:

    a. clicking "view source" is to "perform any function" - no matter HOW menial it may appear to an experienced IT specialist. b. the access...is unauthorised - attempts were made to conceal the information, no matter how pathetic. c. "he knows...this is the case" - Pretty self evident from the article.

    All in all, I'd say bad show from the TDWTF, stick to anonymity, or wait until April 1st next time...

    ...but also, if those comments are generally from HSG, grow up and get some professionalism - you're an embarassment.

    Hey, Good on you for doing the research, however you fail to take into account that a web page (code content) being pushed to an individuals computer becomes public domain and is not protected in the manner your research implies.

    Respectfully submitted

  • jtl (unregistered) in reply to Junkman
    Junkman:
    The FIRST PARAGRAPH of the Computer Misuse Act (UK only - I've not looked into US law - wouldn't know where to start...):

    "A person is guilty of an offence if—

    (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer;

    (b) the access he intends to secure is unauthorised; and

    (c) he knows at the time when he causes the computer to perform the function that that is the case. "

    To make a point for any UK readers thinking this may be fun:

    a. clicking "view source" is to "perform any function" - no matter HOW menial it may appear to an experienced IT specialist. b. the access...is unauthorised - attempts were made to conceal the information, no matter how pathetic. c. "he knows...this is the case" - Pretty self evident from the article.

    All in all, I'd say bad show from the TDWTF, stick to anonymity, or wait until April 1st next time...

    ...but also, if those comments are generally from HSG, grow up and get some professionalism - you're an embarassment.

    The below link is unauthorized. Only authorized people can click on it.

    A secure link.

  • jtl (unregistered) in reply to jtl

    *link is authorized

  • jtl (unregistered) in reply to jtl

    Or maybe not. Whatever.

  • Péter (unregistered)

    TRWTF here is that only a few comments have pointed out so far that the real WTF is that what the company is trying to keep secret is advertisements. Stuff that just wants to be as friggin public as possible. It is so funny I feel sad. Guys, I think you just blew my funny-fuse.

  • Samantha Joy (unregistered) in reply to Sys

    Someone DID tell them. They responded to this story, after all, and the information is right there.

    Oh, this made me break something laughing. Thank you so much for sharing.

  • Heh (unregistered)

    What really cracks me up about the "webmaster" changing the password to stop "hackers" is that he's probably also sending out company-wide emails with the new password every time he does it. That means that everyone in the company is getting an email every 3-4 minutes saying, "Sorry, guys, for technical reasons, the new password is: zzzzzzzzzz"

  • Dron (unregistered)

    For those who haven't looked at the fax they sent, they included a copy of their privacy policy on page 2:

    "As part of our business relationship we do not sell or share your company info with outside companies. You are carefully protected by a privacy policy where your company information is strictly confidential and we're serious about maintaining it."

    It is just another fun piece of irony.

  • Peter Lombardo (unregistered)

    Has anyone tried a google search of pasuser(form) yet? It seems they're not the only ones to use this. It's more likely that they just copied and pasted this function from one of these links.

  • Intchanter (unregistered)

    Okay, this is getting too hilarious. If you actually look at some of the listings in the Google cache (no access to FSG's wonderful site or any information they could possibly claim was secured), their listing is indexed by state and category.

    But if you look at some of them, you'll see that in many of the sections so indexed, they have companies in Montana in a Utah page and one Nevada page only had a North Dakota and a Colorado company listed.

    I only checked a couple, but it was enough to convince me that there are probably /many/ more examples.

    It does appear to be a scummy operation, and a poorly run one at that. (And for the legally inclined, nothing stated in this post is conveyed to represent fact except those elements that you can independently verify by your own "m4d ski11z" (heh) with publicly available resources.)

  • anonymous (unregistered) in reply to Sys
    Somebody should tell them that changing the password will not help as long as the password is written there...

    Done, in an email. I also explained that viewing the source is not hacking -- hacking requires actively exploiting a vulnerability or cracking passwords.

  • Junkman (unregistered) in reply to jtl
    jtl:
    *link is authorized

    Ok, lets take it step by step:

    (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer

    Yup, got me there, I could easily click the link out of interest.

    (b) the access he intends to secure is unauthorised

    If, you're were linking to a database of your customers personal details, no matter HOW inadequate the protection, there would MOST DEFINITELY be a case for unauthorised access. You're linking to google, hardly unauthorised information.

    (c) he knows at the time when he causes the computer to perform the function that that is the case. "

    This is the point where the case is argued - would I expect you to put a direct link up to your customer base? No... by viewing the source code, discovering addresses and THEN making contact with the unauthorised information...?

    uhhhh.... not good....

  • Anonymous Citizen (unregistered) in reply to Sys

    It appears they moved most of the pages...too bad they can't take them out of Google's cache!

    http://72.14.253.104/search?q=cache:ERN77rvMocoJ:officers.federalsuppliers.com/74/74_pa.htm+agents+site:federalsuppliers.com&hl=en&ct=clnk&cd=10&gl=us&client=firefox-a

  • Thelonious (unregistered) in reply to frosty

    Yes, I had always assumed that the anonymity was there to protect the submitter from retaliation, not to protect the company from ridicule. In this case, there is no need for anonymity. Nothing I've seen so far strikes me as "unfair" to this company - a few of the comments are perhaps a bit unkind, but if the original story is to be believed (not to mention posts by supposed employees), then that's entirely understandable

  • Stephen (unregistered)

    Sounds like these scammers need to be reported to the FTC.

  • David Masover (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT
    FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT:
    thank you hackers for trying to destroy federal suppliers guides reputation.
    You did that yourselves. For what you are charging, you should be able to hire someone who has a basic understanding of how the Internet works.
    FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT:
    i have worked here with my wife for 10 years now and have helped hundreds of clients obtain federal government work.
    Care to list any of them?
    FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT:
    you are hurting the feelings of many good employees and customers by your immature actions.
    Because blaming other people for your own insecurity is very mature.

    Also: Who, exactly, has been hurt by what was exposed? How have they been hurt?

    FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT:
    sorry our site wasn't protected to your standards
    This is not "our standards". This is common sense. You are giving out the username and the password, and hoping people don't realize they have them.
  • jimmy (unregistered) in reply to RxScram

    So sorry. My bad.

    I do believe this will become a legend in the vein of the great Paula.

    Brillant!

  • jtl (unregistered) in reply to Junkman
    Junkman:
    No... by viewing the source code, discovering addresses and THEN making contact with the unauthorised information...?
    (I don't have a 'secure' database to link to, use your imagination and pretend it's not google)

    I guess my point is, by curiosly viewing the source code (legal), he could see the address of the agent page.

    You can not list an html address, and say 'but it is confidential, don't go there'. This is where Alex found himself. (and where I was poorly attempting to replicate with my google link) They did not secure the page whatsoever, they just didn't directly link to it on their page. Thus google was able to cache it, because it's a public page.

    Your web server is on public domain, I am free to explore it even if the files are named 'secret.txt'.

  • Abyssleaper (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    You may or may not be legit. The point of the thing is that your company's sales practices are shady, to say the least. The feelings of the company's employees aren't my concern. The only thing immature here is the poor security of your company's web site. You should be talking to your managers to get it rectified rather than rambling here.

  • jimmy (unregistered) in reply to RxScram
    RxScram:
    jimmy:
    I'm awfully sorry for the operators of the site. They didn't expect the drubbing they're taking.
    But Dang! I have to print this out, put it on a wooden table, take a picture, print it, scan it, and call it Brilliant!
    
    Brilliant! </div></BLOCKQUOTE>
    

    It's not Brilliant... it's Brillant! See... no "i".

    Please, if you are going to use a former WTF, do it correctly!

    So sorry. My bad.

    Brillant!

  • (cs) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT
    FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT:
    thank you hackers for trying to destroy federal suppliers guides reputation.

    The "security" on your site is equivalent to leaving a spare key under your doormat... and then failing to lock the door anyway. If this information is not supposed to be public, then you've failed in your obligations and deserve to be exposed. Anyone with the common sense to click "view source" on the login page could have discovered this issue independently.

    Frankly, if any of this information were actual government secrets, you would be the ones in trouble for not securing it properly. If you want to take out your anger, I suggest you contact the folks you paid to "secure" your site and explain exactly how they've failed in their obligations to you.

  • Abyssleaper (unregistered) in reply to anonymous
    anonymous:
    Done, in an email. I also explained that viewing the source is not hacking -- hacking requires actively exploiting a vulnerability or cracking passwords.

    You could also argue that once the page is viewed, it's on your system and is now your property, right? :-)

  • bob (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    @FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    If you really are who you say you are, you need to learn a thing or two about the internets and what security is. No one hacked your site, you gave it away, you posted the password publicly. This is pretty sad if you are a government supplier, even a small family business needs to understand a little bit about internet security or hire someone who does to make your website.

  • Abyssleaper (unregistered) in reply to Bob Dobbs
    Bob Dobbs:
    Check this out:

    http://www.google.com/search?hl=en&q=site%3Ahttp%3A%2F%2Fofficers.federalsuppliers.com%2F+&btnG=Search

    Due to their completely inept security google has spidered and cached all of the pages contents!

    Priceless. My guess is that they'll sue Google for "hacking" next.

  • Anon (unregistered)

    I thought they had actually fixed it when I went to try. But then it turns out it was just noscript :D

  • Junkman (unregistered)

    Ok, laying to one side the devil's advocate bit...

    This site appears to be hosted by matemedia

    Classy... I presume they took the $7/month option?

    I suppose they've got their money's worth of SEO now...

  • A Publishing company? (unregistered)

    Domain: federalsuppliers.com Registration provider: MateMedia, Inc.

    Registrant Jim Sprecher Jim Sprecher ***@countrysidepublishing.com PO Box 1735 Oldsmar, FL 34677 US +1.8139250195 (FAX)

    Administrative Countryside Publishing Company Countryside Publishing Company Inc. ***@countrysidepublishing.com 3135 SR 580 Suite 6 Safety Harbor, FL 34695 US +1.7277263400 (FAX)

    Billing Countryside Publishing Company Countryside Publishing Company Inc. ***@countrysidepublishing.com 3135 SR 580 Suite 6 Safety Harbor, FL 34695 US +1.7277263400 (FAX)

    Technical Countryside Publishing Company Countryside Publishing Company Inc. ***@countrysidepublishing.com 3135 SR 580 Suite 6 Safety Harbor, FL 34695 US +1.7277263400 (FAX)

    Record created on May 18, 1997 Record last updated on November 13, 2006 Record expires on May 19, 2008

    Domain Name Servers: NS.RACKSPACE.COM NS2.RACKSPACE.COM

  • Franz Kafka (unregistered) in reply to Stenvne
    Stenvne:
    Hey, Good on you for doing the research, however you fail to take into account that a web page (code content) being pushed to an individuals computer becomes public domain and is not protected in the manner your research implies.

    Respectfully submitted

    Public domain? You're kidding, right?

  • Reality (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    The funny bit is, no one hacked anything. The user name and password are visible with just one mouse click. They are essentially being broadcast for anyone to see. There is no legal recourse in this matter, because your website is actually telling people what the login is in plain view.

    Instead of going after the millions of people that can easily access your "secured" website, you should be more worried about all of the pending lawsuits from people whose information was compromised by a company that is essentially handing out access to their database to anyone with a computer and a right mouse button.

    You have been betrayed by the company you work for by their inexcusable gross negligence.

  • Yep (unregistered)

    This company is enbreastled to run their operation however it pleases them.

  • anon (unregistered) in reply to Junkman

    How dare you provide a reasonable argument in the midst of a flame war? Good show sir, Good show!

  • Jim (unregistered)

    To FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT:

    I feel for you, since I imagine this wasn't your fault, but this isn't "hacking". Anybody with the slightest bit of tech knowledge will figure this out.

    Do your company a favor and secure the page with htaccess, then go look for a real developer. I doubt anyone means your company any real harm, and we aren't slandering it. It's just rather funny how unintelligent that login box is :).

  • mister (unregistered) in reply to jimmy
    jimmy:
    I do believe this will become a legend in the vein of the great Paula.
    Not unless we come up with a short and easy to remember meme such as "Brillant" or "FILE_NOT_FOUND" :(

    Hurry up, guys! The time is running out!

  • anon (unregistered) in reply to A Publishing company?

    Oh you didn't post the DNS!

    Hurry everyone call and report this to Jim.

    I smell a job opening.

  • Anonymous (unregistered)

    TRWTF is all the comments from people thinking that the page was actually password protected in the first place and bothering to copy out and enter the username and "password".

Leave a comment on “So You Hacked Our Site!?”

Log In or post as a guest

Replying to comment #:

« Return to Article