Copy of letter sent to Playboy.com customers by ingreslock 1524 hacker group

[This is a copy of the email sent out to Playboy.com customers by a hacker group that compromised the site. Note: The customer's name and credit card information have been removed. -jak]

From: Hugh Hefner <hef@playboy.com>
Subject: ingreslock 1524 security announcement

dear user,

since the summer of 1998, a shady hacker group known as 'ingreslock 1524' have maintained full access to the playboy enterprises inc. (pei) corporate network. even when the pei websites were defaced by BoW/H4G1S and were 'secured', we retained our full access (no, installing ssh doesn't make you secure).

we did have some very big plans to use the hundreds of thousands of customer details (names, addresses, order history & credit card information) harvested to automatically purchase hundreds of different products from different online companies (amazon, barnesandnoble, qvc, yahoo, even playboy) to be sent to each playboy customer, thus resulting in over 10 million dollars worth of fraud claims being made to credit card and in turn, insurance companies globally.

incase you think this is some kind of hoax, we have included your personal details below -

Name - ****************
Credit Card Number & Expiry - *********************

your details are currently circulating the underworld of anarchists and credit card fraudsters, so we highly recommend that you contact your bank before much fraud is committed. we have also distributed over a million e-mail addresses to marketing and 'spam' organisations, so you will certainly have a lot of fun deleting unwanted e-mail into the future!

online companies can learn many lessons from this compromise -

1. do not use the same root or administrative (oracle, webserv, etc.) user passwords across different hosts on the same network.
2. never assume that by installing the latest security patches and installing ssh, that you are secure.
3. do not use insecure authentication methods, including nis, nis+ or .rhosts.
4. do not protect your passwords with des in your shadow files, use md5.

end users can learn an important lesson from this compromise -

1. do not trust companies with your details online.

its been emotional. we'd like to thank the playboy systems team for providing us with an interesting and challenging target. i'm sure that a big security company will make easy money auditing their systems and hopefully deploying a more secure network - although we'll be back to test it again.

- m4rty

martyn luther ping
minister of information
ingreslock 1524