ISS warns of coordinated hacker attack on July 6
Hackers in the Defacers Challenge get points for defacing Web sites
IDG News Service - An international hacking contest scheduled to begin this weekend could cause headaches for organizations worldwide and disrupt the Internet, according to a warning from Internet Security Systems Inc. (ISS).
The contest, known as the Defacers Challenge, awards points to malicious hackers who successfully compromise an organization's Web server and deface its Web pages.
ISS first became aware of the contest last week by monitoring Web sites and Internet Relay Chat channels frequented by malicious hackers who specialize in defacements, according to Peter Allor, manager of X-Force Threat Intelligence Services at Atlanta-based ISS.
Rather than focusing on the volume of defacements, the Defacers Challenge is set up to reward the skill of malicious hackers who can compromise systems running less prominent operating systems, including Apple Computer Inc.'s Mac OS and Unix variants such as IBM's AIX and Hewlett-Packard Co.'s HP-UX.
Contest organizers even set up a Web page (www.defacers-challenge.com) that outlines the rules of the game, including a point system for compromised machines -- one point for Windows, five for HP-UX and Macintosh -- and guidelines for what counts as a valid defacement.
The target is to deface 6,000 Web sites. A prize of free Web site hosting is offered to the malicious hacker who can reach that goal first or accumulate the most Web sites in trying to do so, according to information posted on the site.
The challenge is scheduled to begin Sunday and last for six hours, though information on the exact time hasn't been released, Allor said.
ISS doesn't know which hacker or group of malicious hackers is responsible for organizing the challenge.
Although the contest and Web page may be a joke, ISS noticed an increase in reconnaissance and probing scans of Web sites that may be connected to the contest, Allor said. Malicious hackers may be scouting out high-value systems, or even compromising them in advance so that they can quickly be defaced once the contest begins, he said.
ISS recommends that organizations deactivate unneeded public-facing Web servers and turn off unnecessary services on Web servers that are needed, in addition to applying any necessary software patches to potentially vulnerable machines, Allor said.
Recently disclosed software vulnerabilities that haven't yet been patched are attractive targets for hackers, he said.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!