It looks like he's a problem child.  Do a search on the Steam Community for:

ŠŦΣǺП−ƤΘζĨČĒ

Either he/she really likes to cheat or he/she is stealing accounts.  Judging
by the choice of name, I'd guess a phisher.

                                                    -Richard Eid


On Sun, Dec 7, 2008 at 3:24 PM, Tony Paloma <[EMAIL PROTECTED]> wrote:

> On a more serious note, I got the attacker's SteamID in case anyone would
> like to ban him.
> STEAM_0:0:16496340
> http://steamcommunity.com/profiles/76561197993258408
>
> Anyone seen this before or know what he may have done? I block achievement
> command spam as well as joinclass/team spam, so it's not that. The people
> that were playing didn't notice anything strange before it crashed either. I
> don't run SourceMod, so it's not a SourceMod exploit.
>
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:
> [EMAIL PROTECTED] On Behalf Of Dave Reid
> Sent: Sunday, December 07, 2008 6:36 AM
> To: Half-Life dedicated Win32 server mailing list
> Subject: Re: [hlds] TF2 Server Lag Caused By Possible Exploit
>
> Better call the feds.  The terrorist kiddies are threating national
> security again.
>
> Tony Paloma wrote:
> > A player sent a message on my server early this morning just before it
> crashed:
> >
> > ŠŦΣǺП−ƤΘζĨČĒ>ŊĬ� :  : /me SERVER H4CK3D BY TEAM N2o-->steam police!!!
> MORE INFO: [EMAIL PROTECTED] ENGINE SOURCE SUCK !!!
> >
> > Probably related.
> >
> > -----Original Message-----
> > From: [EMAIL PROTECTED] [mailto:
> [EMAIL PROTECTED] On Behalf Of GS
> > Sent: Saturday, December 06, 2008 11:12 AM
> > To: Half-Life dedicated Win32 server mailing list
> > Subject: Re: [hlds] TF2 Server Lag Caused By Possible Exploit
> >
> > Wel US-CERT themselves constantly say that they wish more incidents were
> > reported.  We have a person here who has made a cyber threat and acted
> upon
> > it on a distributed system hosted in the United States.  Does it matter
> that
> > the system is used to play a game?  This person has likely conducted
> other
> > attacks in the past, and will most likely move on to "bigger" things in
> the
> > future if left unchecked.
> >
> > We're not expecting an immediate task force to suit up Team America style
> > and go after this guy busting down doors or anything close to that, we're
> > just reporting it to the ISPs involved, and the Gov't Agency that has
> > jurisdiction.  It's the SOP for a cyber attack and should be followed by
> any
> > organization who falls victim to one.
> >
> > In the meantime we value comments and suggestions like those from SakeFox
> > and DontWannaName.  Thank you, we will be implementing those
> > fixes/plugins.   If there are any other suggestions out there on how to
> > tighten security for TF2 servers, please keep them coming.
> >
> > Best Regards
> >
> >
> >
> > On Sat, Dec 6, 2008 at 2:00 AM, Midnight <[EMAIL PROTECTED]> wrote:
> >
> >
> >> Please tell me you didn't waste US-CERT's time on this. I find that hard
> >> to believe and a really bad idea.  Although I bet they would get a huge
> >> laugh out of it.
> >>
> >>
> >> GS wrote:
> >>
> >>> Hi all,
> >>>
> >>> I'm a member of a gaming community that runs a few dozen TF2 and L4D
> >>> servers.  Today one of our most popular TF2 servers was and continues
> to
> >>>
> >> be
> >>
> >>> attacked by someone who holds some unknown grudge against our
> community.
> >>> This person has claimed credit for the attacks through a posting on our
> >>> message board.
> >>>
> >>> It appears that the method which this attacker or group of attackers is
> >>> using is limited to an in game exploit.  No other server instances, or
> >>>
> >> other
> >>
> >>> server services are affected other than a single game server using a
> >>>
> >> single
> >>
> >>> core of a quad core win32 server hosted in a datacenter.  Bandwidth use
> >>>
> >> is
> >>
> >>> normal during attacks.
> >>>
> >>> Are there any unpatched game exploits that anyone in the HLDS list
> >>>
> >> community
> >>
> >>> is aware of that can cause a server to increasingly lag up to the point
> >>>
> >> of
> >>
> >>> unplayability?  The effects are similar to previous exploits that Valve
> >>> patched earlier this year.
> >>>
> >>> We have contacted our ISP, the ISP of the poster who took credit for
> the
> >>> attack (a whois lookup appears to lead to a proxy server in Chicago,
> IL),
> >>> and the US Dept of Homeland Security (US-CERT).  However we would like
> to
> >>>
> >> be
> >>
> >>> able to prevent these attacks as the investigation by the authorities
> >>> progresses.
> >>>
> >>> If there are any suggestions, no matter how unlikely, we would be
> forever
> >>> grateful for any help with this problem.
> >>>
> >>> Best Regards,
> >>> Jason
> >>> _______________________________________________
> >>> To unsubscribe, edit your list preferences, or view the list archives,
> >>>
> >> please visit:
> >>
> >>> http://list.valvesoftware.com/mailman/listinfo/hlds
> >>>
> >>>
> >>>
> >> _______________________________________________
> >> To unsubscribe, edit your list preferences, or view the list archives,
> >> please visit:
> >> http://list.valvesoftware.com/mailman/listinfo/hlds
> >>
> >>
> > _______________________________________________
> > To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> > http://list.valvesoftware.com/mailman/listinfo/hlds
> >
> >
> > _______________________________________________
> > To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> > http://list.valvesoftware.com/mailman/listinfo/hlds
> >
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds
>
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds
>
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to