Got $500? You can buy a hacked U.S. military website
IDG News Service - If you're a criminal looking for full control of the Web used by the U.S. Army's Communications-Electronics Command (CECOM), you can get it for just under US$500.
At least that's what one hacker is offering in underground forums. Security vendor Imperva found the black market sales pitch Thursday and posted details of the incident on Friday.
The hacker says he has control over a number of websites, including other military sites, government sites, and those belonging to universities, said Noa Bar-Yosef, Imperva senior security strategist. Prices range from $33 to $499, depending on how important or widely used the website is. "You can actually buy the capability of being the administrator of the website," she said.
The hacker is also selling databases of personal information he's stolen from the websites for $20 per thousand records, she said. That data could be used by spammers, or by fraudsters to break into online accounts.
Bar-Yosef saw evidence that administrative privileges for 16 sites were for sale. In one case, the hacker is selling data on 300,000 people, taken from the site.
Whoever is selling this stuff probably broke into these websites using a common Web attack called SQL injection, Bar-Yosef said. For years now, hackers have been scanning the Web looking for poorly written Web pages, specifically ones with search boxes or data-entry forms that connect with back-end databases. Then, they try to sneak database commands in through those pages.
With automated tools it's easy for even non-technical hackers -- sometimes called "script kiddies" -- to pull off this type of attack.
When SQL injection works, the results can be devastating. It's what notorious hacker Albert Gonzalez used to break into companies such as Heartland Payment Systems and 7-Eleven.
Imperva redacted the names of the victims from its blog post, but security blogger Brian Krebs has posted more details of the incident, including the names of many of the hacked sites. They include the U.S. states of Utah and Michigan, the government of Italy and the Department of Defense Pharmacoeconomic Center, which analyzes the military's use of drugs and helps the Department of Veterans Affairs procure drug contracts.
"Amid all of the media and public fascination with threats like Stuxnet and weighty terms such as 'cyberwar,' it's easy to overlook the more humdrum and persistent security threats, such as Web site vulnerabilities," Krebs wrote on his blog Friday. "But none of these distractions should excuse U.S. military leaders from making sure their Web sites aren't trivially hackable by script kiddies."
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Logicalis eBook: SAP HANA: The Need for Speed
- Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report
- For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study
- This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data
- With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate... All Government IT White Papers
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control.
Enhance Your Virtualization Infrastructure With IBM and Vmware
Date: Wednesday, May 14, 2014, 1:00 PM EDT
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage...
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- All Government IT Webcasts