4chan Breach Exposes Moderator Emails, Passwords via Outdated Software

The recent hack of 4chan was allegedly eecuted by Soyjak.party users, exploiting outdated software like Ghostscript and PHP to leak moderator emails and passwords.

Online imageboard 4chan experienced a substantial security breach in mid-April 2025, with individuals linked to the rival forum Soyjak.party claiming responsibility. Attackers reportedly leveraged severe vulnerabilities in outdated server software to gain administrative privileges, leak moderator credentials including personal emails and passwords, and temporarily reinstate the previously deleted /QA/ discussion board.

The incident throws a harsh light on the platform’s aging technical infrastructure, with the attacker allegedly using the handle “Chud” claiming on Soyjak.party to have maintained access for over a year before executing “operation soyclipse” around April 14th.

Exploiting Decade-Old Vulnerabilities

Multiple reports and analyses suggest the attackers employed at least two distinct methods exploiting decade-old software. One significant vector, initially detailed in Know Your Meme’s reporting and user analysis, involved manipulating the PDF upload feature available on boards such as /sci/ and /tg/.

According to these accounts, 4chan’s system failed to properly validate uploaded file types, allowing attackers to submit malicious PostScript files disguised with a .pdf extension. PostScript is a page description language known for its programming capabilities. These files were then allegedly processed by a Ghostscript interpreter version from 2012 to create image thumbnails.

Ghostscript is a common tool for handling PostScript and PDF files. Attackers apparently leveraged known, critical vulnerabilities in this antiquated version, possibly using a “translation boundary break” technique, to execute commands directly on the server, achieving shell access. These specific Ghostscript flaws have long been addressed in modern, patched versions.

A second reported vulnerability pathway involved 4chan’s core PHP codebase. Analysis of leaked source code, including the extensive yotsuba.php script responsible for posting and moderation, indicated the use of outdated PHP versions alongside deprecated MySQL functions.

Further compounding the issue, evidence emerged showing at least one server running FreeBSD 10.1, an operating system version initially released in late 2014 that reached its official end-of-life for security support in 2016. Running critical web infrastructure on unpatched, unsupported operating systems and decade-old components presents obvious and substantial security risks, leaving systems exposed to well-documented exploits.

Systemic Issues and Compromised Data

This reliance on obsolete technology reflects a pattern of neglected maintenance and technical debt accumulation, potentially worsening after current owner Hiroyuki Nishimura acquired the site in 2015.

The immediate fallout from this latest breach includes the exposure of sensitive data belonging to approximately 218 volunteer moderators (“janitors”). Leaked information reportedly includes email addresses, passwords, and IRC logs.

The presence of several .edu email addresses in the leak was confirmed, although initial social media rumors mentioning .gov emails have not been verified by reputable sources. Cybersecurity researcher Kevin Beaumont assessed the situation for The Register, stating it was a “pretty comprehensive [compromise] including SQL databases, source and shell access”. Corroborating the severity, an anonymous 4chan moderator apparently confirmed to TechCrunch that the leaked moderator data seemed “all real”.

Attribution and Lingering Questions

The restoration of the /qa/ board, a community banned in 2021 whose users largely formed Soyjak.party, points towards a potential retaliatory motive for the attack. The incident follows previous security issues, like a 2014 hack involving compromised moderator credentials confirmed by founder Christopher Poole.

The current breach leaves questions about the platform’s recovery capability and the potential long-term risks stemming from the exposure of moderator information and internal data, despite the alleged hacker stating user data was not a target. Following the disclosure, 4chan experienced extended downtime before slowly returning to partial service.

Markus Kasanmascheff
Markus Kasanmascheff
Markus has been covering the tech industry for more than 15 years. He is holding a Master´s degree in International Economics and is the founder and managing editor of Winbuzzer.com.
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
0
We would love to hear your opinion! Please comment below.x
()
x