Hi folks, as promised, i7 PC to round out the 3080 offerings for our EOFYS, 10700F and 10700KF available. Non-LHR cards only are being used.
My statement regarding the site issue earlier today.
Intel Core i7 10700F | RTX 3080 10GB Gaming PC: $2688 after 10700F-3080-EOFYS
- Core i7 10700F 8c/16t processor [10700KF upgrade available]
- 120mm AIO cooler (brand/model may vary)
- RTX 3080 10GB graphics card [brand/model may vary, all non-LHR]
- Gigabyte B560M DS3H (various upgrades available)
- 16GB 3200MHz RAM (brand/model may vary; upgrades available)
- 480GB 2.5" SSD (brand/model may vary; upgrade available)
- 750W 80 Plus Gold PSU (Gigabyte and MSI being used, request preference and we will do our best to facilitate without guaranteeing)
- Lance-V RGB RGB ATX case (MSI MPG Gungnir 111R upgrade pictured, $79)
Other EOFYS deals
3080 PCs
- Ryzen 5 3600 (lower base spec): $2488
- Ryzen 5 5600X (higher base spec): $2888
3070 Ti PCs- Core i5 10400F / Core i7 10700F: $1945 / $2288
- Ryzen 5 3600: $1995
RTX 2060 Budget Gaming PC- Ryzen 5 3500X: $1188
Updates:
- 3070 big batch arrived - overdue systems have been shipping all week and continue to. Thanks for your patience.
- 3070 Ti shipping from this week onwards, on time
- Most 3080 June have shipped and balance will shortly, on time; Pre-order/July cards inbound on time
- 2700X CPUs in-bound - apologies for supplier delay here. Stuck in processing but freed and on the way now.
Cheers
Luke
WHAT YOU NEED TO KNOW:
At 6:21am on 23/06/2021, an unauthorised party leveraged a third-party plugin script on the TechFast website Checkout page and inserted malicious code. This code placed a module on the Checkout page of the website, which appeared when the Pay with Credit Card - SecurePay radial button was clicked.
The malicious module contained fields to enter the credit card number, expiry data, and CVC. If data (including credit card data) was entered into any these fields, the data was immediately sent off the TechFast website. An image of the module as it appeared on the site is here:
ISSUE RESOLUTION:
WHAT YOU SHOULD DO:
IMPORTANT NOTES:
FUTURE RESOLUTION:
To prevent this occuring in future, we have implemented and will continue to implement several security upgrades. In any event, we would always cover any loss that occurred to our customers via a Cyber Security threat.
We have taken this extremely seriously and to address any comment on our approach to this scenario, upon investigation this afternoon, I can confirm that a user posted a comment regarding this on OzBargain at 07:48am on 23/06. As it was on a previous deal post, I didn't see it, as evidenced by me replying on the 24/06 saying that our webmaster was looking into it. We have acted as quickly as we can, notified all relevant authorities, and ensured our customer communication is accurate and consistent.
Affected customers will be contacted via email following this post.
Hey Luke thanks for the clarification. Note the site has warning switch on still see here https://nimb.ws/2h4qla
Thanks. It is unrelated, but the webmaster is onto it. Timing isn't amazing.
Yes, I can see what it is and now warnings have been turned off.. all good better knowing now.
I'm very interested in buying a system but the breach has me very worried. Will you be offering paypal as an alternative payment method?
I can understand your concern. However, the issue was not related to the payment methods themselves, rather the radial buttons on the page prior to that. All payments were and are secure. We're not activating PayPal at this time but I will raise it with senior management at the next review.
Thanks luke,
I'm not as tech savvy so if you could bear with me…is an audit of the website done to look for any malware or anything to that effect? - i.e. is there any chance that there is lingering malicious code?
@Doey21: Yes, we conducted a full sweep, have implemented several significant security enhancements, and will continue to monitor the site with best practice, automated security features in place.
So that is the official statement. Personally and on behalf of TechFast, we sincerely and unreservedly apologise for any and all inconvenience and worry caused. I understand the damage this may have caused, and will work hard to restore any lost faith in what we do. We got screwed over, but are doing everything we can to fix it.
Man don't even sweat it Luke. These people that are busting your balls are the typical internet trolls one expects to see during this kind of incident. They were never going to be customers and are just revelling in the chance to grab a pitch fork and be jerks about it. Bigger companies than Techfast have been hacked and quickly forgiven and ironically these same trolls would be posting their negative nancy bs on the devices of companies that had data breaches.
I don't begrudge anyone's comments here. It's all been pretty reasonable really. It obviously took some time for us to deal with, and respond to, so commentary in between was inevitable.
Shit happens. It's the exact reason why a credit card has an expiry date and can be easily cancelled and re-issued.
I don't see a reason for anyone to seek compensation. If anyone is so entitled that they believe no inconvenience should ever fall upon them in their lives, they need to get off their keyboards and step out the front door.
You have provided tens, if not hundreds of customers with reasonably priced RTX30 machines where they would otherwise have had to rely on scalper pricing.
Shit happen but luckily this has been dealt with.
Give our boy @Homealone the MVP award, dude is a fking legend mate!
To trail off that this website is extremely useful for checking websites and showed the exact malware and it's code which Homealone disclosed at the time.
fortunately im a tightass and did direct deposit because of the 1.5% surcharge on CC.
No true ozb users would have been affected due to this ;)
If you bring back sub 2k 3080 PC's ozb MIGHT forgive u ;)