Concerning latest cyber attack on espiv.net

Hello to everyone, Over the past 3 weeks one of our servers is experiencing a large-scale cyber attack (DDoS). Multiple infected hosts from different parts of the world are participating in the attack, so we can’t really know who’s behind it. No user data has been compromised; however, the attackers have caused network congestion. As a result, the blogs, websites and fora hosted on espiv are hardly accessible or entirely unavailable. Unfortunately there are very few things we can do to mitigate this type of attack. Nevertheless, we are considering possible alternatives to improve the accessibility of our services. espiv.net...

Newsletter, September 2014

Hello to all of you! We want to let you know about a series of important changes in various espiv.net services. Please read below. Web file repository files.espiv.net to be replaced by file.espiv.net https://files.espiv.net is a file-sharing service using outdated/deprecated software. That’s why we are about to retire it. We strongly recommend you make your own local backup of any files you had uploaded on files.espiv.net, as everything will be permanently deleted one month after you receive this newsletter — on October 15th, 2014. Then we will configure https://files.espiv.net to direct to new software. For uploading and sharing files, you...

About yesterday’s server shutdown

On July 8th, 2014, members of the Cybrigade admin crew, as well as representatives of the Proledialers (call-centre workers, whose blog is hosted on espiv), went to the Panteion university premises. Their presence was enough to put the server back in operation. The attempted silencing of hundreds of collectives that use the espiv infrastructure was averted. Certainly, this does not mean that similar attempts by either the authorities or private individuals cannot occur in the future. Espiv is not owned by one administrative group, but rather is an infrastructure already used by a big part of the movement. Therefore, the...

About espiv.net server shutdown on 7/7/14

There is an urgent situation regarding espiv’s infrastructure inside the Panteion University (in Athens, where espiv server is located). Below is a first announcement by Cybrigade, espiv’s administrative collective, about the current shutdown of the server: Today, Monday, July 7th, 2014, the rector of the Panteion University ordered that the espiv server be unplugged and put out of service. The pretext was an extrajudicial notice which was served to the university administration by the owner of the call-centre company OnLine Sales, by which the boss asks that a blog post which is allegedly defaming him be deleted and that the...

Οι σκληροί δίσκοι του server της ομάδας Saravá κατασχέθηκαν και ερευνώνται από τον Ομοσπονδιακό Δημόσιο Κατήγορο

On April 28th 2014 a representative of the brazilian Federal Public Prosecutor (the “Ministério Público Federal” — or just “MPF”) removed the hard disks from Saravá Group’s main server, taking down many services hosted by the group. In the negotiation with the Saravá Group, it was agreed that the MPF would only take the disks and leave the machine untouched. In accordance with its letter of principles, Saravá Group protects all the data in its servers using cryptography. There is no access key in power of the State University of Campinas (Unicamp), so there is no way that the university...

Heartbleed bug και αλλαγή πιστοποιητικών

Last week, a serious security hole was discovered and corrected in the OpenSSL, the open-source cryptography library which is used to secure encrypted internet connections. Ever since, the various different operating systems and software have issued security updates. (See more: heartbleed, eff) The said security hole existed for over two years and affected a very large number of systems and services on the internet. All this time, it is possible that malicious hackers (see e-cops) knew of the vulnerability and took advantage of the situation. This is why we upgraded to the latest version of the OpenSSL and we changed...

Newsletter #07

1) Phishing Emails / Spam Lately some emails may show up in your Inbox, supposedly coming from the Espiv crew, asking the users to enter a webpage and put their passwords there… We repeat it one more time: DO NOT GIVE OUT YOUR PASSWORDS TO ANYONE! You must not reveal your email passwords under any circumstances; not even to the espiv.net group. The only fields where you should fill in the passwords to your email account are just the two webmail of espiv.net: https://mail.espiv.net & https://webmail.espiv.net — both are found on exclusively secure pages (https), and do NOT generate a...

Phishing E-mails / SPAM

Lately some emails may show up in your Inbox, supposedly coming from the Espiv crew, asking the users to enter a webpage and put their passwords there… We repeat it one more time: DO NOT GIVE OUT YOUR PASSWORDS TO ANYONE! You must not reveal your email passwords under any circumstances; not even to the espiv.net group. The only fields where you should fill in the passwords to your email account are just the two webmail of espiv.net: https://mail.espiv.net & https://webmail.espiv.net — both are found on exclusively secure pages (https), and do NOT generate a notification pop-up of your browser...