Skip the navigation

Researcher finds evidence of massive site compromise

Digs up cache of 200,000 site credentials for Fortune 500 firms, weapons makers, governments

October 3, 2008 12:00 PM ET

Computerworld - Several criminal gangs have acquired administrative log-in credentials for more than 200,000 Web sites -- including the one used by the U.S. Postal Service -- and have used the compromised domains to attack unsuspecting users' PCs with a notorious hacker exploit kit, a researcher said today.

More than a month ago, Ian Amit, director of security research at Aladdin Knowledge Systems Inc., found and infiltrated a server belonging to a longtime customer of Neosploit, a hacker tool kit used by cybercriminals to launch exploits against browsers and popular Web software such as Apple Inc.'s QuickTime or Adobe Systems Inc.'s Adobe Reader.

On that server, Amit uncovered logs showing that two or three hacker gangs had contributed to a massive pool of Web site usernames and passwords. "We have counted more than 208,000 unique site credentials on the server," said Amit, "and over 80,000 had been modified with malicious content."

The site credentials were only the means to an end: The 80,000 modified sites were used as attack launchpads. Each served up exploit code provided by the Neosploit kit to any visitor running a Windows system that had not been fully patched.

By examining the server logs, Amit was able to identify the sites whose log-ins had been compromised; he is now working with law enforcement agencies in both the U.S. and overseas, as well as with organizations like the CERT Coordination Center, to tell site operators they need to change their administrative passwords, purge the malicious code and secure their sites.

The only compromised site he would name was the U.S. Postal Service's at www.usps.gov. That site and others have been cleaned of the code that calls Neosploit down on unsuspecting visitors. Also on the list were sites for governments and Fortune 500 companies, universities and other businesses, including several unnamed weapons manufacturers. More than half of the affected sites belong to European companies and organizations.

Other evidence that Amit gathered ranged from the way the criminals processed the site log-ins to the number of IP addresses authorized to access the credentials.

"The server-based application that validated the credentials and then modified the sites was completely automated," said Amit. "Access to that application was restricted to about six or seven IP addresses, [so] it's clear that that access was intended only for the use of the criminals using the server." Based on the number of IP addresses and their distribution, he estimated that two or three separate groups were involved.

More than half of the site credentials -- approximately 107,000 -- had been validated by the cybercrooks' custom application as providing administrative access to the sites.



Our Commenting Policies