Feeds

Hacked flight sim site in catastrophic crash and burn

Avsim, RIP

Secure remote control for conventional and virtual desktops

A popular website for users of flight simulation gear has been felled, most likely fatally, after malicious hackers attacked both of the servers housing more than 12 years worth of content supplied by its 60,000 members.

Tom Allensworth, the founder of Avsim.com, said in a statement that that an attack on Tuesday left the site "effectively destroyed." He added: "The method of the hack makes recovery difficult, if not impossible, to recover from. We are not able to predict when we will be back online, if we can come back at all."

The news sent an outpouring of sympathy and rage on temporary forum boards set up in the aftermath. "I just read a post in the SimV forums about the veritable catastrophe that has struck Avsim, and along with it, the flightsimming community as a whole, and was shocked, furious and saddened all at the same time," one participant wrote.

But the debacle has also led to criticism that Avsim operators didn't take steps to better protect the site's rich store of content. According to Allensworth, data from the library and email server was backed up on a separate server for the website and forums and vice versa. Alas, it would appear there was never a master copy stored offsite and offline, so when both servers were attacked, more than a decade of links, software modifications, and exchanges were permanently destroyed.

"Who would have predicted the simultaneous successful attacks on our system?" Allensworth wrote in one message. "Over 12 years of very secure operation and no successful attacks kind of indicated to me that our approach was at least working. On Tuesday, the 12th of May at about 10:00 p.m. EDT, we found out otherwise."

The trouble started earlier that evening, when parts of the site stopped working, according to this account. First, FTP and SSH access to the site stopped working, and later, the web and forum server was knocked offline. Soon, the email and library server also showed signs of problems. It wasn't until the servers were rebooted that the admins discovered that "the partitions on both servers had been removed."

It remains unclear who is responsible or exactly how the attacks were carried out. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.