Novell server hacked, used to scan for vulnerable computers
It was apparently set up by employees for gaming purposes
Computerworld - A company server that some workers at Novell Inc. apparently used for gaming purposes was hacked into and then used to scan for vulnerable ports on potentially millions of computers worldwide, according to an Internet security consultant.
The scans, which have been going on since Sept. 21, are targeted at TCP Port 22 -- the default port for Secure Shell (SSH) services. SSH programs are used to log into other computers over a network or to execute remote commands and move files between machines in a secure fashion. Scans against the port are often an indication that hackers are looking for vulnerable SSH systems that they can break into and take control of.
Kevan Barney, a Novell spokesman, today confirmed that one of the company's systems had been compromised. But he added that the server was not part of the company's corporate network nor was it a production server.
Chris Brandon, president of Brandon Internet Security, an Alexandria, Va.-based firm that reported the problem to Novell yesterday, said he was first alerted to the hack when a client reported scanning activity several days ago.
According to Brandon, the scans were traced back to a server with an IP address assigned to Novell. The hacked system appeared to be running a mail server for a gaming site called Neticus.com, and the main game Web page for Neticus.com was hosted on a separate server that also belonged to Novell.
Going by the large number of IP blocks scanned by the attacking server, it is safe to assume that "millions" of computers may have been probed for SSH-related weaknesses, he said.
"The employees that set it up apparently had no idea of security," Brandon said. "But what is really surprising is that Novell would allow employees to set up game servers on their corporate network and then allow the public to access it."
Logs documenting the scans from the Novell-owned computer were made available to Computerworld by Brandon. One of them is available online at www.mynetwatchman.com/LID.asp?IID=178119669. The source IP address listed in the incident report at that site belongs to Novell, based on Network WhoIS records, he said.
Barney said that both servers -- the one hosting the gaming Web site and the server that scanned for vulnerable ports on other machines -- were test systems outside the company's firewalls. He also denied that the server hosting the main game Web page was actually being used by gamers. Instead, it appears to have been used only to host game-related information, he said.
"There was no major breach of security here," Barney said.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Infographic: Converged Infrastructure Benefits This Infographic quantifies the savings organizations are realizing from increased deployment speed, higher availability, and lower annual costs.
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- Going Paperless? Here's What You Need to Think About As makers of some of the world's most popular PDF solutions, we often consult with businesses & governmental agencies that have the goal...
- The Big Data Opportunity for HR and Finance If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Cybercrime and Hacking White Papers | Webcasts