Denise (
denise) wrote in
dw_maintenance2020-05-08 06:31 pm
![[staff profile]](https://www.dreamwidth.org/img/silk/identity/user_staff.png)
![[site community profile]](https://www.dreamwidth.org/img/comm_staff.png)
(no subject)
In March, we posted several entries about an increase in people breaking into old accounts and using them for spam purposes.
Today has seen another wave of zombie accounts having their profile edited to link to spam and then subscribing to many people. If you see this happen, you don't need to report it to us: we're identifying them automatically and suspending them until their owners can resecure them. If your account is one of the ones suspended, please change your password and edit the profile to remove the spam link from the Website field, then open a support request in the Terms of Service category and we'll get back to you ASAP to unsuspend your account.
We continue to believe the source of the password information is another social media site that many Dreamwidth users also have accounts on. The site in question has declined to investigate the reports we've made to them or to investigate whether the information we've found is legitimate. We will continue not to publicly name them in top-level posts until we're positive we've done everything we can to protect Dreamwidth users who may also have accounts on the site in question, after which point we'll let you know what we know. We're trying to avoid doing that until we think we've caught the vast majority of vulnerable accounts, however.
If you have not changed your Dreamwidth password since May of 2014, we strongly recommend that you change your password. Again: We have no evidence that our servers were compromised, and we have strong evidence that the source of account breakins is another social media site's as-yet-undisclosed breach. However, today's wave of breakins has included a number of accounts that our available methods of figuring out who may be vulnerable didn't catch, so we may need to look more widely for potentially vulnerable accounts.
To verify any email from us about your Dreamwidth password is actually from us, log into your Dreamwidth account and visit the homepage or the
dw_news journal. Every email we send you about your account password from here on out will repeat these instructions.
Today has seen another wave of zombie accounts having their profile edited to link to spam and then subscribing to many people. If you see this happen, you don't need to report it to us: we're identifying them automatically and suspending them until their owners can resecure them. If your account is one of the ones suspended, please change your password and edit the profile to remove the spam link from the Website field, then open a support request in the Terms of Service category and we'll get back to you ASAP to unsuspend your account.
We continue to believe the source of the password information is another social media site that many Dreamwidth users also have accounts on. The site in question has declined to investigate the reports we've made to them or to investigate whether the information we've found is legitimate. We will continue not to publicly name them in top-level posts until we're positive we've done everything we can to protect Dreamwidth users who may also have accounts on the site in question, after which point we'll let you know what we know. We're trying to avoid doing that until we think we've caught the vast majority of vulnerable accounts, however.
If you have not changed your Dreamwidth password since May of 2014, we strongly recommend that you change your password. Again: We have no evidence that our servers were compromised, and we have strong evidence that the source of account breakins is another social media site's as-yet-undisclosed breach. However, today's wave of breakins has included a number of accounts that our available methods of figuring out who may be vulnerable didn't catch, so we may need to look more widely for potentially vulnerable accounts.
To verify any email from us about your Dreamwidth password is actually from us, log into your Dreamwidth account and visit the homepage or the
![[site community profile]](https://www.dreamwidth.org/img/comm_staff.png)
no subject
no subject
no subject
no subject
no subject
no subject
no subject
no subject
no subject
no subject
no subject
Is there a reason this might have happened? (I had to use mobile to post this, which I hate doing, and the same password logged in just fine?)
no subject
Have you updated your LJ Juggler to use an API key instead of your password? The steps described here for Semagic should also work for LJ Juggler: https://dw-dev.dreamwidth.org/221358.html
(no subject)
(no subject)
(no subject)
(no subject)
no subject
no subject
no subject
no subject
no subject
Seriously, though, I'm glad you're staying ahead of the spammers.
no subject
(no subject)
(no subject)
no subject
no subject
no subject
no subject
<_< I couldn't *possibly* confirm that.
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
no subject
no subject
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
no subject
no subject
Any recommendations of anything I should do? Is it worth opening a support request so y'all know that at this point it's basically just a memorial account?
no subject
no subject
no subject
no subject
(no subject)
(no subject)
A crossposting tip