ISS warns of coordinated hacker attack on July 6
Hackers in the Defacers Challenge get points for defacing Web sites
IDG News Service - An international hacking contest scheduled to begin this weekend could cause headaches for organizations worldwide and disrupt the Internet, according to a warning from Internet Security Systems Inc. (ISS).
The contest, known as the Defacers Challenge, awards points to malicious hackers who successfully compromise an organization's Web server and deface its Web pages.
ISS first became aware of the contest last week by monitoring Web sites and Internet Relay Chat channels frequented by malicious hackers who specialize in defacements, according to Peter Allor, manager of X-Force Threat Intelligence Services at Atlanta-based ISS.
Rather than focusing on the volume of defacements, the Defacers Challenge is set up to reward the skill of malicious hackers who can compromise systems running less prominent operating systems, including Apple Computer Inc.'s Mac OS and Unix variants such as IBM's AIX and Hewlett-Packard Co.'s HP-UX.
Contest organizers even set up a Web page (www.defacers-challenge.com) that outlines the rules of the game, including a point system for compromised machines -- one point for Windows, five for HP-UX and Macintosh -- and guidelines for what counts as a valid defacement.
The target is to deface 6,000 Web sites. A prize of free Web site hosting is offered to the malicious hacker who can reach that goal first or accumulate the most Web sites in trying to do so, according to information posted on the site.
The challenge is scheduled to begin Sunday and last for six hours, though information on the exact time hasn't been released, Allor said.
ISS doesn't know which hacker or group of malicious hackers is responsible for organizing the challenge.
Although the contest and Web page may be a joke, ISS noticed an increase in reconnaissance and probing scans of Web sites that may be connected to the contest, Allor said. Malicious hackers may be scouting out high-value systems, or even compromising them in advance so that they can quickly be defaced once the contest begins, he said.
ISS recommends that organizations deactivate unneeded public-facing Web servers and turn off unnecessary services on Web servers that are needed, in addition to applying any necessary software patches to potentially vulnerable machines, Allor said.
Recently disclosed software vulnerabilities that haven't yet been patched are attractive targets for hackers, he said.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts