So during the DDOS attack that was previously mentioned, I saw this post on the Readymag reddit with this image of a twitter thread.
During the readymag DDOS attack, a user on twitter replied to the post saying that they had hacked Readymag servers and collected tons of sensitive data from all users, and that they will leak it if they aren’t paid off. Accompanied with a screenshot of readymag users personal information…
The day before the attack, I saw this post / site posted to the Readymag subreddit…
A one page displaying “Well it turns out, readymag isn’t F***ing ready”
(Not sure if this is related to the hacker or just someone else unhappy with Readymag’s services).
Since then , Readymag announced the site is back up, and has not released a single statement on this since.
I tried to @ / mention the moderator of the readymag subreddit and got silence.
So i’m basically just looking for some type of conclusion / closure here.
Did the hacker actually scrape all of our personal information?
Has our personal information been leaked due to readymag’s security?
Was the hacker paid out?
What happened?
I am genuinely worried about the lack of transparency here as we all seemingly continue to beta test Readymag.
(Also why hasn’t this form post feature / function been turned into a blog feature for websites it would be useful…)
Thanks.
1 Like
also wanna here something about this!
@readymag @Mike @Misha
1 Like
@Benjamin_Means @neueMeta
Hello, and thank you for reaching out.
On October 31, 2024, our team became aware that some Readymag users may have been affected by malware on their personal devices. To clarify, this incident did not involve a breach of Readymag’s systems—our servers and data remain secure and uncompromised. This malware was external, affecting individual devices and was unrelated to our platform or the recent DDoS attack.
Regarding the individual on Twitter, we want to clarify that this person did not actually hack Readymag’s servers. Instead, they may have leveraged external malware affecting personal devices. Our platform remains secure and unaffected.
On the same day, we quickly identified and contacted all users affected by this malware. Our technical team immediately reset their passwords to protect accounts and provided instructions for restoring access and securing their devices. We continue to closely monitor platform security and are enhancing our protective measures to guard against future incidents.
We apologize for any inconvenience this may have caused. To help keep your devices and data safer, we recommend enabling two-factor authentication (2FA) and being cautious online. Avoid clicking on suspicious links or downloading files from unfamiliar sources to minimize the risk of malware.
Thank you for your understanding. Please feel free to reach out to us at [email protected] if you have further questions.
3 Likes
Thank you for this clarification.
1 Like