The "No Network is 100% Secure" series
- High Value Site Hacks, 2009 edition -
- In the news -
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
Contact Us
Vulnerability test: There is no malware on this page.
Click on the "How vulnerable am I?" button above to run a (completely safe) test to
see if you are vulnerable to drive-by explots.
If a new window does NOT open, you are about as safe as you can be, at least until
these hackers come up with some new exploit. Note that you still need to have ALL
of your software (not just the operating system) patched to the latest level
since there are lots of other ways to pick up trojans and viruses besides visiting
a compromised, infected drive-by web site.
A recent study revealed that the average PC in the USA (including computers in a
corporate environment) have over a dozen current vulnerabilities. And remember,
these hackers only have to exploit one vulnerability and you're hacked! The same
study confirmed that there is an over-dependance on anti-virus software to keep
computers safe. This is an absolute fallacy! AV software is a 1999 solution to a
2009 problem. The drive-by attacks described in this white paper go largely
unnoticed by AV software. If your computer failed our vulnerability
test, it's just a matter of when, not if, you get hacked.
Feedback: We value the opinion of IT professionals. If you have comments
about this series of white papers (too detailed, not detailed enough, helful,
boring, or whatever) we would appreciate hearing from you. The information
contained in these white papers is intended to help IT Managers better
secure their networks. The more on-point our white papers are, the more useful
the information will be to our target audience. Thanks in advance!
Not all hackers attack using the Internet: June 30, 2009. DALLAS (AP) -
Federal prosecutors say a 25-year-old contract security guard accused of hacking into
computers at the clinic where he worked has been arrested. Jesse William McGraw, of
Arlington, is being detained following his arrest Monday afternoon. The U.S. Attorney's
Office says McGraw is the leader of the "Electronik Tribulation Army" hacker group. He
worked for United Protection Services as an overnight shift security guard at the
Carrell Clinic in Dallas. The affidavit alleges McGraw intruded into the clinic
computers that controlled climate and ventilation and those that contained confidential
patient information. Investigators say McGraw planned a massive computer attack for
July 4.
It's not enough to secure your network from an outside intrusion. Current or former
employees, security guards, cleaning people and anyone else who has physical access
to your computers can cause problems too! What does your IT department do to prevent
this and what sort of best practices do you have in place? Do your users use locking
screensavers, BIOS passwords and things of this nature? Are server terminals always
logged in as root? This guy obviously had no difficulty running amok inside the
network although as a contract guard, it's unlikely that he was given his own account
on any of the clinic's computing systems. The time to do a security audit to check on
physical access vulnerabilities is now!
More on being hacked from the inside: July 1, 2009 TENAFLY, N.J. (AP) -- Three
students in New Jersey are accused of hacking into their school's computer system to
access final exams. The Tenafly High School sophomores are charged with theft by
accessing a computer system without authorization. Police say a 16-year-old and a
15-year-old tracked keystrokes to obtain passwords and obtained the geometry, algebra
and humanities exams. Officials say another 15-year-old obtained a teacher's password
from one of the other boys to change his grades.
If any of your users leave their computers turned on over night and don't use
password protected screensavers, they make very attractive targets for miscreants
wishing to install keyloggers.
Search engine hacked!: July 1, 2009 - Torrentreactor, one of the oldest and most
reliable torrent search engines on the Web, has been compromised and injected with
malicious code. The site has been injected with an IFrame leading to a site laden with
exploits. The exploits on the payload site include Internet Explorer (MDAC) and
Microsoft Office Snapshot Viewer, as well as Adobe Acrobat Reader and Adobe Shockwave.
If the user's browser is successfully exploited, a malicious file is downloaded and
run from the exploit site. The malicious file has an extremely low AV detection rate.
The file (MD5: 24bd24f8673e3985fc82edb00b24ba73) is a Trojan Downloader and connects to
a Bot C&C server at IP 78.109.29.116. After connecting to the IP, the file downloads a
Rootkit installer from the same IP.
More on the nine-ball attack: A Trojan, dubbed FFsearcher, was among the pieces
of malware installed by sites hacked with the Nine-Ball mass compromise, which attacked
some 40,000 Web sites in June, 2009. The Trojan takes advantage of Google's "AdSense
for Search" API, which allows Web sites to embed Google search results alongside the
usual Google AdSense ads. While most search hijackers give themselves away on the
victim's machine by redirecting the browser through some no-name search engine,
FFsearcher does the following: FFsearcher converts every search a victim makes through
Google.com, so that each query is invisibly redirected through the attackers' own Web
sites, via Google's Custom Search API. Meanwhile, the Trojan manipulates the victim's
PC and browser so that the victim never actually sees the attacker-controlled Web site
that is hijacking the search, but instead sees the search results as though they were
returned directly from Google.com (and with Google.com in the victim browser's address
bar, not the address of the attacker controlled site). Adding to the stealth is the
fact that search results themselves aren't altered by the attackers, who are merely
going after the referral payments should victims click on any of the displayed ads.
What's more, the attackers aren't diverting clicks or ad revenue away from advertisers
or publishers, as in traditional click fraud: They are simply forcing Google to pay
commissions that it wouldn't otherwise have to pay. Pretty crafty...
Another unpatched Internet Explorer vulnerability: July 6,2009.
Malicious hackers are currently launching code execution exploits against an
unpatched vulnerability in the Microsoft Video ActiveX Control - msvidctl.dll. The
attacks are currently targeting users of Microsoft's Internet Explorer browser. An
attacker who successfully exploits this vulnerability could gain the same user rights
as the local user. One more reason to not let your Corporate Users operate with
Administrator or Power User rights. When using Internet Explorer, malicious code
execution is remote and may not require any user intervention or participation.
Microsoft says that this buggy ActiveX Control can be safely removed without any
compatibility issues. We would strongly advise doing exactly that. This critical
ActiveX vulnerability is (in our opinion) a prime candidate for another
Conficker-scale attack
SEOUL, South Korea : July 7, 2009. Suspected cyber attacks paralyzed Web sites
of major South Korean government agencies, banks and Internet sites in a barrage that
appeared linked to similar attacks in the U.S., South Korean officials said Tuesday.
The sites of the presidential Blue House, the Defense Ministry, the National Assembly,
Shinhan Bank, Korea Exchange Bank and top Internet portal Naver went down or had access
problems since late Tuesday. The alleged attacks appeared to be linked to the knockout
of service of Web sites of several government agencies in the United States. The U.S.
sites were hit by a widespread and unusually resilient computer attack that began
July 4. In the United States, the Treasury Department, Secret Service, Federal Trade
Commission and Transportation Department Web sites were all down at varying points over
the holiday weekend and into this week, according to officials inside and outside the
government. Some of the sites were still experiencing problems Tuesday evening. Some
of the South Korea sites remained unstable or inaccessible on Wednesday morning. The
paralysis took place because of denial of service attacks, in which floods of computers
all try to connect to a single site at the same time, overwhelming the server that
handles the traffic. There have been no immediate reports of financial damage or
leaking of confidential national information from the alleged cyber attack, which
appeared aimed only at paralyzing Web sites.
The Homeland Security Department, says there were 5,499 known breaches of U.S.
government computers in 2008, up from 3,928 the previous year, and just 2,172 in 2006.
July 16, 2009 update: The master server used to launch cyber attacks on leading websites i
in Korea and the U.S. last week has been traced to a TV contents provider based in
Miami, Florida. A master server is a high-capacity computer that can serve as the
command center when hackers launch cyber attacks. U.K. Internet TV company Global
Digital Broadcasting in a statement Tuesday said, "The master server is located in a
partner company in Miami, Florida, which shares contents with us through a connected
system." In other words, the IP address used to orchestrate the attacks was that of
GDP in Britain, as a Vietnamese computer security company claimed, but the actual
server computer was in the data center of Miami-based Digital Latin America.
Still think you don't need a professional security audit?
Alberta Health Services computer system hack in Edmonton: Electronic medical
records were exposed from May 14-29, 2009 after an attack by new variations of a
Trojan-horse-style virus called Coreflood and Coreflood.C that could have come in via
an e-mail, a laptop or other device, says Bill Trafford, AHS senior VP and CIO. He
adds that Coreflood infected only the Edmonton network, but patient files from anywhere
in Alberta may have been affected. The virus worked by taking sporadic screen shots of
infected computers. "So say somebody was looking at a Word document, it might have
taken a screen shot of that and then that data would be uploaded to a server outside
the AHS network," he said.
HIPPA compliance certification testing and claims of patient records confidentility
are meaningless if the servers that store this information get hacked! "Oh gee...
we're really sorry" just isn't going to cut it.
Network Solutions web site hack: July 25, 2009.
Hackers have broken into Web servers owned by domain registrar and hosting provider
Network Solutions, planting rogue code that resulted in the compromise of more than
573,000 debit and credit card accounts over the past three months. Herndon, Va. based
Network Solutions discovered in early June that attackers had hacked into Web servers
the company uses to provide e-commerce services - a package that includes everything
from Web hosting to payment processing -- to at least 4,343 customers, mostly
mom-and-pop online stores. The malicious code left behind by the attackers allowed them
to intercept personal and financial information for customers who purchased from those
stores. The payment data stolen was
captured from transactions made between March 12, 2009 and June 8, 2009. Network
Solutions is offering to pay for 12 months of credit monitoring service through Trans
Union for each consumer whose financial and personal data was compromised.
Some International cyber attacks in recent years: April, 2009. The Aurora
vulnerability - A former U.S. government official said that
spies had hacked into the U.S. electric grid and left behind computer programs that
would let them disrupt service, though it was not clear when the breach occurred. The
official said the intrusion was "almost without a doubt" done by state sponsors.
March, 2009. Ghostnet - A Canadian research group concluded that hackers likely based
in China stole sensitive information from thousands of hard drives worldwide and hacked
into the computer system of the Dalai Lama, the spiritual leader of Tibet. China denied
any involvement.
March, 2009. Ghostnet - U.S. Sen. Bill Nelson, D-Florida, said his office computers
were hacked three times by "cyber-invaders thought to be inside China." Nelson, a
member of the Senate's Intelligence, Armed Services and Finance committees, described
one of the incidents as serious, but said he did not believe any sensitive information
was stolen.
In 2008, Georgian government and corporate Web sites began to see "denial of service"
attacks just ahead of the outbreak of war with Russia. The Kremlin denied involvement,
but a group of independent Western computer experts traced domain names and Web site
registration data to conclude that the Russian top security and military intelligence
agencies were involved.
In 2007, alleged Russian hackers crippled government and corporate computer networks in
Estonia for nearly three weeks following deadly riots that were sparked by the
relocation of a Soviet war memorial.
Twitter, Facebook: This is old news, but... Social networking sites such as
Twitter and Facebook have become feeding grounds for cybercrime. A threat report by
net security firm Sophos warns that Web 2.0 companies are too focused at growing their
user bases, at the possible expense of paying attention towards defending their existing
customers from internet risks. In our opinion, smart IT Managers should prohibit users
from accessing these sites using company computers and should block access on their
proxy servers.
Sophos estimates that a quarter of all business networks have been exposed to spam,
phishing or malware attacks via sites such as Twitter, Facebook, LinkedIn and MySpace.
Web 2.0 companies need to examine their systems and determine how, now they have
gathered a huge number of members. They need to protect their users from virus writers,
identity thieves, spammers and scammers. This is currently not being done. Personally
identifiable information is at risk as a result of constant attacks that the websites
are simply not mature enough to protect against. At a minimun, social engineering sites
like Twitter and Facebook need to scan for links to sites hosting malware or promoted
via spam messages. These sites also need to force users to use stronger (harder to
guess) passwords and do more to prevent cross-site scripting attacks.
Figures from Sophos also point to the growth in scareware scams, where users are
tricked into buying rogue security packages of little or no utility on the basis of
false security scans. Sophos picked up an average of fifteen such scareware sites per
day during the first half of 2009, a three-fold increase over the same period last
year. Sophos now catalogues 22.5 million different samples of malware, almost double
the level it recorded in June 2008. Around 40,000 new suspicious files are examined by
security analysts at Sophos every day. The firm discovers an infected webpage once
every 3.6 seconds, on average, four times faster than in the first half of 2008. Two
years ago, 50 per cent of all web-based malware was hosted in China. This figure
dropped to just 14.7 per cent in the first half of this year, with the USA eclipsing
China as the biggest single locus of drive-by-download threats (39.6 per cent).
Compromised US computers also make the single greatest contribution to spam (15.7 per
cent), which cumulatively makes up nine in 10 (89.7 per cent) of all business email.
About the Author
Frank Saxton is a computer network security engineer and Easyrider LAN Pro principle. Home-based in Portland, Oregon, Frank has been designing remote diagnostic and network enterprise monitoring centers since the late 1970s. Prior to becoming a professional systems engineering consultant in 1990, Frank had a 20 year career in computer systems field engineering and field engineering management. Frank has a BSEE from Northeastern University and holds several certifications including Network General's Certified Network Expert (CNX). As a NOC design engineer and architect, Frank works regularly with enterprise-class monitoring tools such as HP Openview Operations, BMC Patrol and others. In his enterprise security audit work, Frank uses sniffers and other professional grade monitoring tools on a daily basis.
Next in the security white paper series:
How Cyber Criminals will mature over the next ten years
Are you vulnerable to drive-by exploits?
More high value site hacks in the news
Still more 2009 hacks in the news
IT employment challenges of the 21st century
Employment reference checking white paper
Competency Certifications White Paper
ISO/IEC 27005:2008 Standard for Security Risk Management
Firewall White Paper
Password White Paper
Digital Identification Certificates White Paper
Virus White Paper
Ghostnet White Paper
Cryptography White Paper
OpenID White Paper
Intrusion Detection Systems IDS White Paper
Rootkit White Paper
Unnecessary Windows XP Services White Paper
Scareware White Paper
Exaflood Internet Brownout White Paper
Cloud Computing White Paper
Proxy Server White Paper
Personal Computer PC Security White Paper
Phishing White Paper
DNS Poisoning White Paper
Conficker White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Monitoring Basics 101 White Paper
Monitoring Basics 102 White Paper
Monitoring Basics 103 White Paper
Virtual Machine Security White Paper
Aurora vulnerability White Paper
Shelfware White Paper
Outsourcing White Paper
Easyrider LAN Pro Consulting services:
Network Security Audit and PC Tune-up service
Portland, Oregon Network Security Consulting
- Proxy server installation and configuration
- Enterprise security consultations
- Disaster recovery planning
- Disaster recovery services
- Capacity, migration and upgrade planning
- Build and deploy central syslog server
- Build trouble ticket systems
- Design and build monitoring environments
- Design and build Network Operations Centers (NOC)
- HP Openview, BMC Patrol consulting
Last modified June 25, 2009
Copyright 1990-2009 Easyrider LAN Pro