Got $500? You can buy a hacked U.S. military website
IDG News Service - If you're a criminal looking for full control of the Web used by the U.S. Army's Communications-Electronics Command (CECOM), you can get it for just under US$500.
At least that's what one hacker is offering in underground forums. Security vendor Imperva found the black market sales pitch Thursday and posted details of the incident on Friday.
The hacker says he has control over a number of websites, including other military sites, government sites, and those belonging to universities, said Noa Bar-Yosef, Imperva senior security strategist. Prices range from $33 to $499, depending on how important or widely used the website is. "You can actually buy the capability of being the administrator of the website," she said.
The hacker is also selling databases of personal information he's stolen from the websites for $20 per thousand records, she said. That data could be used by spammers, or by fraudsters to break into online accounts.
Bar-Yosef saw evidence that administrative privileges for 16 sites were for sale. In one case, the hacker is selling data on 300,000 people, taken from the site.
Whoever is selling this stuff probably broke into these websites using a common Web attack called SQL injection, Bar-Yosef said. For years now, hackers have been scanning the Web looking for poorly written Web pages, specifically ones with search boxes or data-entry forms that connect with back-end databases. Then, they try to sneak database commands in through those pages.
With automated tools it's easy for even non-technical hackers -- sometimes called "script kiddies" -- to pull off this type of attack.
When SQL injection works, the results can be devastating. It's what notorious hacker Albert Gonzalez used to break into companies such as Heartland Payment Systems and 7-Eleven.
Imperva redacted the names of the victims from its blog post, but security blogger Brian Krebs has posted more details of the incident, including the names of many of the hacked sites. They include the U.S. states of Utah and Michigan, the government of Italy and the Department of Defense Pharmacoeconomic Center, which analyzes the military's use of drugs and helps the Department of Veterans Affairs procure drug contracts.
"Amid all of the media and public fascination with threats like Stuxnet and weighty terms such as 'cyberwar,' it's easy to overlook the more humdrum and persistent security threats, such as Web site vulnerabilities," Krebs wrote on his blog Friday. "But none of these distractions should excuse U.S. military leaders from making sure their Web sites aren't trivially hackable by script kiddies."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- HP HAVEn: See the big picture in Big Data
- HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard
- This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting
- This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle
- This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle. All Government IT White Papers
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- All Government IT Webcasts