LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 15th, 2014
Linux Advisory Watch: August 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Large Criminal Hacker Attack on Windows NT E-Banking and E-Commerce Sites [UPDATED] Print E-mail
User Rating:      How can I rate this item?
Source: SANS - Posted by Dave Wreski   
Hacks/Cracks Okay, NT content, but this SANS information can't go unnoticed. In the largest criminal Internet attack to date, a group of Eastern European hackers has spent a year systematically exploiting known Windows NT vulnerabilities to steal customer data. More than a million credit cards have been taken and more than 40 sites have been victimized.. . . Okay, NT content, but this SANS information can't go unnoticed. In the largest criminal Internet attack to date, a group of Eastern European hackers has spent a year systematically exploiting known Windows NT vulnerabilities to steal customer data. More than a million credit cards have been taken and more than 40 sites have been victimized.

The FBI and Secret Service are taking the unprecedented step of releasing detailed forensic information from ongoing investigations because of the importance of the attacks. The information was released to the SANS community a short time before it was made available to the general public so that you can be sure your systems are safe. Within a day or two, the Center for Internet Security will release a small tool that you can use to check your systems for the vulnerabilities and also to look for files the FBI has found present on many compromised systems - indicating your system may have already been compromised by the attacker group. The Center's tools are normally available only to members, but because of the importance of this problem, the Center agreed to make the new tool, built for the Center by Steve Gibson of Gibson Research) available to all who need it. Center members have already received an invitation to the conference call this afternoon to get more data on the attack. If your organization is not a member, we encourage you to join in this important initiative to fight back against computer crime. See www.cisecurity.org for a list of members and how to join. Alan Alan Paller Director of Research The SANS Institute Here's the data available so far. Over the past several months, the National Infrastructure Protection Center (NIPC) has been coordinating investigations into a series of organized hacker activities specifically targeting U.S. computer systems associated with e-commerce or e- banking. Despite previous advisories, many computer owners have not patched their systems, allowing these kinds of attacks to continue, and prompting this updated release of information. More than 40 victims located in 20 states have been identified and notified in ongoing investigations in 14 Federal Bureau of Investigation Field Offices and 7 United States Secret Service Field Offices. These investigations have been closely coordinated with foreign law enforcement authorities, and the private sector. Specially trained prosecutors in the Computer and Telecommunication Coordinator program in U.S. Attorneys' Offices in a variety of districts have participated in the investigation, with the assistance of attorneys in the Computer Crime and Intellectual Property Section at the Department of Justice. The investigations have disclosed several organized hacker groups from Eastern Europe, specifically Russia and the Ukraine, that have penetrated U.S. e-commerce computer systems by exploiting vulnerabilities in unpatched Microsoft Windows NT operating systems. These vulnerabilities were originally reported and addressed in Microsoft Security Bulletins MS98-004 (re-released in MS99-025), MS00-014, and MS00-008. As early as 1998, Microsoft discovered these vulnerabilities and developed and publicized patches to fix them. Computer users can download these patches from Microsoft for free. Once the hackers gain access, they download proprietary information, customer databases, and credit card information. The hackers subsequently contact the victim company through facsimile, email, or telephone. After notifying the company of the intrusion and theft of information, the hackers make a veiled extortion threat by offering Internet security services to patch the system against other hackers. They tell the victim that without their services, they cannot guarantee that other hackers will not access the network and post the credit card information and details about the compromise on the Internet. If the victim company is not cooperative in making payments or hiring the group for their security services, the hackers' correspondence with the victim company has become more threatening. Investigators also believe that in some instances the credit card information is being sold to organized crime groups. There has been evidence that the stolen information is at risk whether or not the victim cooperates with the demands of the intruders. To date, more than one million credit card numbers have been stolen. The NIPC has issued an updated Advisory 01-003 at www.nipc.gov regarding these vulnerabilities being exploited. The update includes specific file names that may indicate whether a system has been compromised. If these files are located on your computer system, the NIPC Watch in Washington D.C. should be contacted at (202) 323-3204/3205/3206. Incidents may also be reported online at www.nipc.gov/incident/cirr.htm. For detailed information on the vulnerabilities that are being exploited, please refer to the NIPC Advisory 00-60, and NIPC Advisory 01- 003. NIPC ADVISORY 01-003 This advisory is an update to the NIPC Advisory 00-060, "E- Commerce Vulnerabilities", dated December 1, 2000. Since the advisory was published, the FBI has continued to observe hacker activity targeting victims associated with e-commerce or e- finance/banking businesses. In many cases, the hacker activity had been ongoing for several months before the victim became aware of the intrusion. The NIPC emphasizes the recommendation that all computer network systems administrators check relevant systems and consider applying the updated patches as necessary, especially for systems related to e-commerce or e- banking/financial businesses. The patches are available on Microsoft=s web site, and users should refer to the URLs listed below. The following vulnerabilities have been previously reported: Unauthorized Access to IIS Servers through Open Database Connectivity (ODBC) Data Access with Remote Data Service (RDS): Systems Affected: Windows NT running IIS with RDS enabled. Details: Microsoft Security Bulletin MS99-025, NIPC CyberNotes 99-22 http://www.microsoft.com/technet/security/bulletin/ms99-025.asp http://www.nipc.gov/warnings/advisories/1999/99-027.htm, http://www.nipc.gov/cybernotes/cybernotes.htm Summary: Allows unauthorized users to execute shell commands on the IIS system as a privileged use; Allows unauthorized access to secured, non-published files on the IIS system; On a multi-homed Internet-connected IIS systems, using Microsoft Data Access Components (MDAC), allows unauthorized users to tunnel Structured Query Language (SQL) and other ODBC data requests through the public connection to a private back-end network. SQL Query Abuse Vulnerability Affected Software Versions: Microsoft SQL Server Version 7.0 and Microsoft Data Engine (MSDE) 1.0 Details: Microsoft Security Bulletin MS00-14, NIPC CyberNotes 20-05 http://www.microsoft.com/technet/security/bulletin/ms00-014.asp http://www.nipc.gov/cybernotes/cybernotes.htm Summary: The vulnerability could allow the remote author of a malicious SQL query to take unauthorized actions on a SQL Server or MSDE database. Registry Permissions Vulnerability Systems Affected: Windows NT 4.0 Workstation, Windows NT 4.0 Server Details: Microsoft Security Bulletin MS00-008, NIPC CyberNotes 20-08 and 20-22 http://www.microsoft.com/technet/security/bulletin/ms00-008.asp http://www.nipc.gov/cybernotes/cybernotes.htm Summary: Users can modify certain registry keys such that: a malicious user could specify code to launch at system crash a malicious user could specify code to launch at next login an unprivileged user could disable security measures Web Server File Request Parsing While they have not been shown to be a vector for the current attacks, Microsoft has advised us that the vulnerabilities addressed by Microsoft bulletin MS00-086 are very serious, and we encourage web site operators to consider applying the patch provided with this bulletin as well as the three that are under active exploitation. http://www.microsoft.com/technet/security/bulletin/ms00-014.asp http://www.nipc.gov/cybernotes/cybernotes.htm Summary: The vulnerability could allow a malicious user to run system commands on a web server. New Information: In addition to the above exploits, several filenames have been identified in connection with the intrusions, specific to Microsoft Windows NT systems. The presence of any of these files on your system should be reviewed carefully because they may indicate that your system has been compromised: ntalert.exe sysloged.exe tapi.exe 20.exe 21.exe 25.exe 80.exe 139.exe 1433.exe 1520.exe 26405.exe i.exe In addition, system administrators may want to check for the unauthorized presence of any of the following executable files, which are often used as hacking tools: lomscan.exe mslom.exe lsaprivs.exe pwdump.exe serv.exe smmsniff.exe Recipients of this Advisory are encouraged to report computer crime to the NIPC Watch at (202) 323-3204/3205/3206. Incidents may also be reported online at www.nipc.gov/incident/cirr.htm.

Update (2001.03.09 08:45): Microsoft has responded to this matter with an email to BUGTRAQ:
 Date: Thu, 8 Mar 2001 18:09:45 -0800 From: Microsoft Security Response Center  To: BUGTRAQ@SECURITYFOCUS.COM Subject: NIPC Advisory Regarding Recent Attacks Against E-commerce Sites  Hi All -  As you may be aware, the FBI's National Infrastructure Protection Center (NIPC) released an advisory today (http://www.nipc.gov/warnings/advisories/2001/01-003.htm) detailing recent attacks against e-commerce and e-banking sites.  Virtually all of these attacks were carried out via known vulnerabilities for which patches have been available for months or, in some cases, years.  Microsoft shares NIPC's concern about these attacks, and would like to ensure that all customers have taken the needed steps to protect their systems.  We have published a companion article to the NIPC advisory, available at http://www.microsoft.com/technet/security/nipc.asp, that details the vulnerabilities involved in these attacks and the steps customers should take to ensure the security of their systems.  If you haven't applied the patches for these vulnerabilities, please take the time to do it immediately.  Regards,  Scott Culp Security Program Manager Microsoft Security Response Center 

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
State-of-the-art spear phishing and defenses
Linux kernel source code repositories get better security
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.