Elias Griffin<p>Election Day QHE Hacking Update: </p><p>My fully patched OpenBSD OpenSMTPd Email Server for quadhelion.engineering was un-attackable, so it got MITM from inside the <a href="https://infosec.space/tags/Vultr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vultr</span></a> <a href="https://infosec.space/tags/Hetzner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hetzner</span></a> Dallas Datacenter resulting in my CVSS-SIG FIRST.org memembership List subscription <span class="h-card" translate="no"><a href="https://infosec.exchange/@firstdotorg" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>firstdotorg</span></a></span> to have the "FROM" field tampered/injected.</p><p>## Cyberattack today: www.quadhelion.engineering also on <a href="https://infosec.space/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> HTTPd, Vultr, got attacked this morning resulting in an outage of 16 mins.</p><p>Later I was informed the hardware of my instance was compromised.</p><p>> Dear Customer,</p><p>Regarding the following subscriptions: <br>1024.00 MB AMD High Performance - 149.28.252.170 (quadhelion.engineering) in Dallas</p><p>Our monitoring system indicated an issue with the hardware node hosting the instances listed in this email. A sudden reboot has been detected. Our engineering team is currently investigating the issue that caused this, but we expect no impact on data and/or configurations.</p><p>If you do experience issues, please contact support as soon as possible.</p><p>Thank you,<br>> Vultr.com Support</p><p>I've temporarily moved the MX to Startmail as to get off the bad ToS, data scraping <a href="https://infosec.space/tags/Vultr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vultr</span></a> platform. I may end up moving to <a href="https://infosec.space/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> or <a href="https://infosec.space/tags/DragonflyBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DragonflyBSD</span></a> instead of Open. It will probably not be hosted in the United States.</p><p>I'm your warning canary in the coal mine, be on alert. I've proven the scope of what I can do and my threat meter to not us.</p><p>Quadhelion Engineering Cyberscape Alert Status: RED</p><p><a href="https://infosec.space/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.space/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.space/tags/WebDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebDev</span></a></p>