Close Menu
Digpu News  Agency Feed
    Facebook X (Twitter) Instagram
    • Home
    • Technology
    • USA
    • Business
    • Education
    • Startups and Entrepreneurs
    • Health
    Facebook X (Twitter) Instagram
    Digpu News  Agency Feed
    Subscribe
    Friday, January 2
    • Home
    • Technology
    • USA
    • Business
    • Education
    • Startups and Entrepreneurs
    • Health
    Digpu News  Agency Feed
    Home»Research & Reports»4chan Breach Exposes Moderator Emails, Passwords via Outdated Software
    Research & Reports

    4chan Breach Exposes Moderator Emails, Passwords via Outdated Software

    DeskBy DeskAugust 12, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
    Share
    Facebook Twitter Pinterest Email Copy Link

    Online imageboard 4chan experienced a substantial security breach in mid-April 2025, with individuals linked to the rival forum Soyjak.party claiming responsibility. Attackers reportedly leveraged severe vulnerabilities in outdated server software to gain administrative privileges, leak moderator credentials including personal emails and passwords, and temporarily reinstate the previously deleted /QA/ discussion board.

    The incident throws a harsh light on the platform’s aging technical infrastructure, with the attacker allegedly using the handle “Chud” claiming on Soyjak.party to have maintained access for over a year before executing “operation soyclipse” around April 14th.

    Exploiting Decade-Old Vulnerabilities

    Multiple reports and analyses suggest the attackers employed at least two distinct methods exploiting decade-old software. One significant vector, initially detailed in Know Your Meme’s reporting and user analysis, involved manipulating the PDF upload feature available on boards such as /sci/ and /tg/.

    According to these accounts, 4chan’s system failed to properly validate uploaded file types, allowing attackers to submit malicious PostScript files disguised with a .pdf extension. PostScript is a page description language known for its programming capabilities. These files were then allegedly processed by a Ghostscript interpreter version from 2012 to create image thumbnails.

    Ghostscript is a common tool for handling PostScript and PDF files. Attackers apparently leveraged known, critical vulnerabilities in this antiquated version, possibly using a “translation boundary break” technique, to execute commands directly on the server, achieving shell access. These specific Ghostscript flaws have long been addressed in modern, patched versions.

    A second reported vulnerability pathway involved 4chan’s core PHP codebase. Analysis of leaked source code, including the extensive yotsuba.php script responsible for posting and moderation, indicated the use of outdated PHP versions alongside deprecated MySQL functions.

    Further compounding the issue, evidence emerged showing at least one server running FreeBSD 10.1, an operating system version initially released in late 2014 that reached its official end-of-life for security support in 2016. Running critical web infrastructure on unpatched, unsupported operating systems and decade-old components presents obvious and substantial security risks, leaving systems exposed to well-documented exploits.

    Systemic Issues and Compromised Data

    This reliance on obsolete technology reflects a pattern of neglected maintenance and technical debt accumulation, potentially worsening after current owner Hiroyuki Nishimura acquired the site in 2015.

    The immediate fallout from this latest breach includes the exposure of sensitive data belonging to approximately 218 volunteer moderators (“janitors”). Leaked information reportedly includes email addresses, passwords, and IRC logs.

    The presence of several .edu email addresses in the leak was confirmed, although initial social media rumors mentioning .gov emails have not been verified by reputable sources. Cybersecurity researcher Kevin Beaumont assessed the situation for The Register, stating it was a “pretty comprehensive [compromise] including SQL databases, source and shell access”. Corroborating the severity, an anonymous 4chan moderator apparently confirmed to TechCrunch that the leaked moderator data seemed “all real”.

    Attribution and Lingering Questions

    The restoration of the /qa/ board, a community banned in 2021 whose users largely formed Soyjak.party, points towards a potential retaliatory motive for the attack. The incident follows previous security issues, like a 2014 hack involving compromised moderator credentials confirmed by founder Christopher Poole.

    The current breach leaves questions about the platform’s recovery capability and the potential long-term risks stemming from the exposure of moderator information and internal data, despite the alleged hacker stating user data was not a target. Following the disclosure, 4chan experienced extended downtime before slowly returning to partial service.

     

    Source: Winbuzzer / Digpu NewsTex

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
    Previous ArticleThe Top 5 Most Common Mistakes First-Time Pet Owners Make
    Next Article ChatGPT Users Report Cache Loops, Memory Loss, Stability Issues

    Related Posts

    Business

    Sportswear Fabrics and India’s Challenge

    September 26, 2025
    Read more
    Auto Tech

    Oura Ring vs Apple Watch (2025): Features, Accuracy, & Value Compared

    September 26, 2025
    Read more
    Cricket

    India vs Sri Lanka Playing 11: Will Rinku Singh replace Tilak Varma in Asia Cup 2025 Super 4 clash?

    September 26, 2025
    Read more
    Asia

    ‘The only match that really counts…’: Mike Hesson’s SHOCKING verdicts on Ind vs Pak Asia Cup 2025 final clash

    September 26, 2025
    Read more
    Culture

    American Black Film Festival Returns for Milestone 30th Anniversary

    September 26, 2025
    Read more
    Auto Tech

    Uber partner Momenta pursues fresh capital, targets over $5B valuation

    September 26, 2025
    Read more
    © 2026 ThemeSphere. Designed by ThemeSphere.
    • Home
    • About
    • Team
    • World
    • Buy now!

    Type above and press Enter to search. Press Esc to cancel.