Computerworld - When a group of Web vandals hacked into the Web site of USA Today on July 11 and inserted fraudulent news stories, the Internet security community got a taste of just how serious Web page defacements can be.
Most security professionals consider Web page defacement as little more than a nuisance. However, in interviews with Computerworld, analysts, hackers and members of some of the most infamous Web site defacement groups said newspaper officials at the subsidiary of McLean, Va.-based Gannett Co. got off easy.
Subtle changes could have been much more damaging, hackers and analysts said. In addition, the hack demonstrates the continued vulnerability of Web sites resulting from poor administration.
Although the USA Today defacement led to only minor downtime for the Web site, Peggy Weigle, CEO of Sanctum Inc., a security consulting firm in Santa Clara, Calif., said companies should fear the real economic ramifications of such hacks.
"Imagine a press release being posted that says the CEO and CFO are resigning due to undisclosed ethical or financial concerns," Weigle said. "The stock price would likely plummet immediately." Companies should always audit Web applications before "taking them live" on the Internet, she said.
"We found in our auditing that 90% of all attacks stem from poor configuration and administrators that do not consistently update the software they use," said EPiC, the leader of a "white hat" hacker group known as Hack3r.com.
A hacker who goes by the handle Hackah Jak said he agrees. "I can in minutes code a scanner to scan the Internet for two year-old, known vulnerabilities," said Hackah Jak, a former member of the Web page defacement group Hackweiser. "I've hit a lot of workstations this way and then worked my way through the network to the server."
Although he no longer hacks, Jak said he has managed to break through the security of major corporations, including Sony Corp., Anheuser-Busch Cos. and Jenny Craig International Inc.
A hacker nicknamed RaFa is the ex-leader of the now defunct World of Hell defacement group, which racked up thousands of Web site defacements before disbanding last year. He said that in addition to making simple configuration mistakes, most administrators don't keep up with updates and patches released by their software vendors.
"They don't update services running on the system, and they set up permissions and software settings the wrong way on the Web server," said RaFa. "Think about all of the zero-day exploits I've used. The vendors knew about 90% of those."
However, the real problem is not laziness, it's trust, said Genocide, the leader of the Genocide2600 hacker group. Most administrators and corporate managers simply trust that they are secure, he said.
- Advanced Attacks Demand New Defenses Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It's scary stuff, and ignorance is definitely not bliss....
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!