Epik CEO attempts to hit back on breach rumors

cybersecurity
(Image credit: Future)

Rob Monster, the CEO of web hosting company Epik, engaged with journalists, hackers, and members of the public to address reports of hacktivists leaking decades worth of Epik’s data, in a video conference call that’s been described as “bizarre and chaotic.”

Last week, hacktivist group Anonymous claimed to have obtained and leaked 180 GB of data on Epik's business and customers, for its position of welcoming clients who would have trouble finding web hosts due to the nature of their content.

According to reports, Monster acknowledged the breach in the meeting, alleging that the attackers not only hacked a backup of the company’s data, but also made away with $100,000 from his Coinbase account using information obtained from the breach.

However, the call went off-canter when other journalists and hackers who had been affected by the breach, joined the call, leading to Monster breaking out into prayer several times, even calling upon Jesus to rebuke demons present in the call.

Ghost rider

Epik has provided services to alternative social media sites such as Parler, and to various other controversial organizations such as the Texas Right to Life group's whistleblower website.

Last week, Anonymous shared all kinds of confidential information about Epik’s clients including their names, addresses, and phone numbers.

Epik initially denied reports of the breach, before Monster first emailing customers saying that the company was looking into “an alleged security incident,” and then inviting members of the public to a live Q&A on his video-conferencing website PrayerMeeting.com.

Monster reportedly leaned on his religious beliefs all through the hours-long call as he was confronted by several individuals who were doxxed by websites hosted by Epik, including Aubrey Cottle, who was outed as the founder of Anonymous. 

However, his supporters applauded Monster for speaking candidly, apparently against the advice of his lawyers.

Via Daily Dot

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
Dark web scanning on a laptop
Hostinger integrates dark web scanning into hPanel
Illustration of a thief escaping with a white fingerprint
5 massive privacy scandals that rocked the world – and made millions of victims
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
Twitter social media application change logo to X. Elon Musk CEO of twitter rebranded Twitter to 'X'. Social media application technology concept.
X is back – here's what we know about the 'massive cyberattack' that caused Twitter to go down multiple times
The X logo next to a silhouette of Elon Musk
Who was really behind the massive X cyberattack? Here’s what experts say about Elon Musk’s claims
Representational image of a cybercriminal
US, UK crack down on Russian bulletproof hosting service ZServers for LockBit partnership
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras