The first global cyber war has begun

Moderators: Elvis, DrVolin, Jeff

Re: The first global cyber war has begun

Postby wintler2 » Mon Feb 14, 2011 1:06 am

Joe Hillshoist wrote:
wintler2 wrote:
Guardian wrote:..In a separate development, an attack which exposed the email addresses and passwords of 1.3 million Gawker users was also today linked with the thousand-strong Anonymous group.

Interesting, interesting. How long before social media becomes a front too, and not just for snark&lulz.

Not very long it turns out (you wrote that 2 months ago tomorrow.)

Ha, and i was already behind the times! Thankfully i didn't spend any time worrying about it, cos these cybercops are not at all scary. Seems like they have lots and lots of data, but v.little information, zero solid knowledge, and a wisdom vacuum.

Thanks Plutonia and all for the coverage, saves alot of trawling. :lovehearts:
"Wintler2, you are a disgusting example of a human being, the worst kind in existence on God's Earth. This is not just my personal judgement.." BenD

Research question: are all god botherers authoritarians?
User avatar
wintler2
 
Posts: 2884
Joined: Sun Nov 12, 2006 3:43 am
Location: Inland SE Aus.
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Joe Hillshoist » Mon Feb 14, 2011 3:14 am

wintler2 wrote:Ha, and i was already behind the times! Thankfully i didn't spend any time worrying about it, cos these cybercops are not at all scary. Seems like they have lots and lots of data, but v.little information, zero solid knowledge, and a wisdom vacuum.

Thanks Plutonia and all for the coverage, saves alot of trawling. :lovehearts:



Yeah I second that, thanks.

Yeah you were a bit, thats the thing about noticing stuff. Its already happened. Marshall Macluhan said something about walking backwards into the future using perfect hindsight. You're right about their level of scary too, there are far more important things to worry about.

Although the astroturfing thing is worth some worry generally. It'd be this same group of arseholes generally that are responsible for all the shit thats been poured on AGW, taxing mining cos.. I mean charging them a fair fucking price for the resources they buy (effectively steal) off us, selling public resources and "bailing out" companies etc etc etc
Joe Hillshoist
 
Posts: 10616
Joined: Mon Jun 12, 2006 10:45 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Plutonia » Mon Feb 14, 2011 4:01 am

Joe, searchable database alternate at Crowdleaks: http://hbgary.crowdleaks.org/

wintler2 wrote: cybercops are not at all scary. Seems like they have lots and lots of data, but v.little information, zero solid knowledge, and a wisdom vacuum.

There guys are dangerous because they are so stupid. Aaron Barr was about to sell a bunch of names he got from trolling IRC and Facebook to the FBI. These guys are dangerous because they have a financial incentive to believe their own bullshit and sell other people on it. They need and enemy be acting against in order to justify their existence and profit. To them, that's us.

wintler2 wrote:Thanks Plutonia and all for the coverage, saves alot of trawling. :lovehearts:
There is so much, I know I haven't covered it all. I have barely even glanced at the source emails.

And in answer to you earlier Q, "Could a public prosecutor step up and give the privatised spooks the haircut they deserve, using the hacked emails?", three things: One, the information was illegally obtained so not admissible in a court of law and Two, they pretty much show that the rule of law is joke and Three, if anyone is well placed to kick ass through legal action, it's Glenn Greenwald.
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby JackRiddler » Mon Feb 14, 2011 12:00 pm

Plutonia wrote:Joe, searchable database alternate at Crowdleaks: http://hbgary.crowdleaks.org/

wintler2 wrote: cybercops are not at all scary. Seems like they have lots and lots of data, but v.little information, zero solid knowledge, and a wisdom vacuum.

There guys are dangerous because they are so stupid. Aaron Barr was about to sell a bunch of names he got from trolling IRC and Facebook to the FBI. These guys are dangerous because they have a financial incentive to believe their own bullshit and sell other people on it. They need and enemy be acting against in order to justify their existence and profit. To them, that's us.


Oh, yes, exactly. Being stupid doesn't mean merely that they fail to locate the "real" enemy, who may or may not exist. It means that they will fashion enemies out of convenient targets (people from the lower classes, out-castes or unpopular causes). It's the same mentality that, given the world shortage of real terrorist masterminds, filled up Guantanamo with a random selection of shepherds, taxi drivers and a few Anglo-Pakistani tourists kidnapped by militias and sold to the Americans for cash bounties.

It's also true in a deeper sense that these people are dangerous because they are stupid. If they weren't so fucking stupid, they'd have other priorities and preferences in life than to play the role of Nixonian plumbers for corporate mobsters, regardless of how well it pays to be a thug. This is also true at the highest levels, by the way. I gag when I hear ruthless cunning misanthropes like Rove or Kissinger called geniuses. If they were geniuses, they would be writing novels or surfing in Australia while earning annuities on their old hit singles, not conniving plots to destroy lives and nations by exploiting the trusting nature of real human beings.

And just look at this guy, he looks about as smart as George Clooney in Burn After Reading:
Image

.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Luther Blissett » Mon Feb 14, 2011 12:18 pm

Aaron Barr is 100% Clooney in Burn After Reading.
The Rich and the Corporate remain in their hundred-year fever visions of Bolsheviks taking their stuff - JackRiddler
User avatar
Luther Blissett
 
Posts: 4991
Joined: Fri Jan 02, 2009 1:31 pm
Location: Philadelphia
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Plutonia » Mon Feb 14, 2011 10:37 pm

Luther Blissett wrote:Aaron Barr is 100% Clooney in Burn After Reading.

So what does that make this guy?

From:Greg Hoglund <greg@hbgary.com>
To:"Penny C. Hoglund" <penny@hbgary.com>

Subject: Here is what I feel like sending to Jeff [Moss, founder of Black Hat]

>snip<

Maybe you don't know or don't think about this, but I
have really advanced in my career since I gave that first talk at BH [Black Hat] so many
years ago [Lol] - I am only one removed from the President of the United States,

I know multiple decision makers in both major intelligence community
organizations, and my company has software installed in about 1/4 of all
fortune 500 companies. The FBI and Secret Service have both standardized on
my software for physical memory.... I am a
serious bad ass right now and I'm not sure you realize that.

http://hbgary.operationfreedom.ru/greg_ ... 16838.html


Image

:roll:
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Plutonia » Mon Feb 14, 2011 10:52 pm

From: Greg Hoglund <greg@hbgary.com>
To: Aaron Barr <aaron@hbgary.com>
Date: Fri, 4 Feb 2011 22:03:55 -0800
Subject: Re: Story is really taking shape

HBGary Federal flexes private intelligence muscle.
--
HBGary Federal, the specialized and classified services arm of HBGary,
flexes it's muscle today by revealing the identities of all the top
management within the group Anonymous, the group behind the DDOS
attacks associated with Wikileaks. HBGary Federal constructed and
maintained multiple digital identities and penetrated the trust upper
management of Anonymous, and was subsequently able to learn actual
identities of the primary management team. This information was
critical for law enforcement, yet all the intelligence work was done
without law enforcement or government involvement. Only after
achieving the mission did Aaron Barr, the CEO of HBGary Federal,
reveal this information to the Feds. This underscores the need for
new blood in the intelligence community and the abilities of small
agile teams that are unhindered by the bureaucratic machine.

wording?
-G

On 2/4/11, Greg Hoglund <greg@hbgary.com> wrote:
> We should post this on front page, throw out some tweets. "HBGary
> Federal sets a new bar as private intelligence agency." - the pun on
> bar is intended lol.
>
> -G
>
> On 2/4/11, Aaron Barr <aaron@hbgary.com> wrote:
>> http://www.ft.com/cms/s/0/87dc140e-3099 ... z1D3oZIcTk
>>

http://hbgary.operationfreedom.ru/greg_ ... 26786.html
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Plutonia » Mon Feb 14, 2011 11:30 pm

kaepora Nadim Kobeissi
Nick Peach, VP Of Cyber Forensics Investigations at Bank of America, was the bank's contact with HBGary: http://uiu.me/o.txt


kaepora Nadim Kobeissi
Hey everyone (and @ggreenwald)! Here's all communications between HBGary and Hunton & Williams! http://uiu.me/hunton.zip
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Luther Blissett » Tue Feb 15, 2011 12:57 am

Plutonia wrote:
Luther Blissett wrote:Aaron Barr is 100% Clooney in Burn After Reading.

So what does that make this guy?

From:Greg Hoglund <greg@hbgary.com>
To:"Penny C. Hoglund" <penny@hbgary.com>

Subject: Here is what I feel like sending to Jeff [Moss, founder of Black Hat]

>snip<

Maybe you don't know or don't think about this, but I
have really advanced in my career since I gave that first talk at BH [Black Hat] so many
years ago [Lol] - I am only one removed from the President of the United States,

I know multiple decision makers in both major intelligence community
organizations, and my company has software installed in about 1/4 of all
fortune 500 companies. The FBI and Secret Service have both standardized on
my software for physical memory.... I am a
serious bad ass right now and I'm not sure you realize that.

http://hbgary.operationfreedom.ru/greg_ ... 16838.html


Image

:roll:


Tilda Swinton?
The Rich and the Corporate remain in their hundred-year fever visions of Bolsheviks taking their stuff - JackRiddler
User avatar
Luther Blissett
 
Posts: 4991
Joined: Fri Jan 02, 2009 1:31 pm
Location: Philadelphia
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Plutonia » Tue Feb 15, 2011 3:37 am

Luther Blissett wrote:Tilda Swinton?

:lol2:

I dunno, Tilda is an androgyne...
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Luther Blissett » Tue Feb 15, 2011 4:04 pm

Did you guys see this? From the RSA conference:

Image
The Rich and the Corporate remain in their hundred-year fever visions of Bolsheviks taking their stuff - JackRiddler
User avatar
Luther Blissett
 
Posts: 4991
Joined: Fri Jan 02, 2009 1:31 pm
Location: Philadelphia
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Luther Blissett » Tue Feb 15, 2011 4:12 pm

Sweet Forbes piece:

http://blogs.forbes.com/andygreenberg/2 ... escalates/
HBGary Execs Run For Cover As Hacking Scandal Escalates

Rarely in the history of the cybersecurity industry has a company become so toxic so quickly as HBGary Federal. Over the last week, many of the firm’s closest partners and largest clients have cut ties with the Sacramento startup. And now it’s cancelled all public appearances by its executives at the industry’s biggest conference in the hopes of ducking a scandal that seems to grow daily as more of its questionable practices come to light.

Last week, the hacker group Anonymous released more than 40,000 of HBGary Federal’s emails, followed by another 27,000 from its sister company, HBGary, over the weekend. Those files, stolen in retaliation for an attempt by HBGary Federal CEO Aaron Barr to penetrate Anonymous and identify its members, revealed a long list of borderline illegal tactics. Ars Technica has posted a well-constructed narrative of the firm’s bad behavior. The short version: It proposed services to clients like Bank of America and the U.S. Chamber of Commerce that included cyberattacks and misinformation campaigns, phishing emails and fake social networking profiles, pressuring journalists and intimidating the financial donors to clients’ enemies including WikiLeaks, unions and non-profits that opposed the Chamber.

HBGary responded Monday with a statement on its website that it’s “continuing to work intensely with law enforcement on this matter and hopes to bring those responsible to justice.” In the mean time, the firm is canceling all its executives’ talks at the RSA conference, the largest cybersecurity industry confab of the year, taking place this week in San Francisco. HBGary chief executive Greg Hoglund had planned to give two presentations at the conference. HBGary Federal CEO Barr last week canceled his talk at the simultaneous B-Sides conference, which would have focused on his expose on Anonymous. The company said in its statement that it had been subject to numerous threats of violence, including some received at its RSA marketing booth.

I’ve written earlier about HBGary’s proposal to Bank of America, in partnership with fellow security firms Palantir and Berico Technologies, to weaken WikiLeaks with cyberattacks and false documents as well as tracing and threatening its donors and supporters. But new information surfaced Monday about other shady approaches the firm suggested. As part of the company’s pitch to the U.S. Chamber of Commerce, HBGary Federal’s Barr offered tactics like mining Classmates.com for information about a target individual’s friends, then building fake Facebook pages to gain access to subject’s personal details. He and Hoglund also discussed using spear phishing, a technique that typically plants malicious software on a user’s machine with a carefully spoofed email message.

Bank of America, the Chamber of Commerce, Palantir and Berico have all since released statements that say they’ve ended their relationship with the company.

Barr spoke with Forbes reporter Parmy Olson last week, when the scandal had only reached a small fraction of its eventual size. “I had expected some potential retribution,” Barr said then. “I knew some folks would take my research as some kind of personal attack which it absolutely was not. I thought they might take down our Web site with a DDoS attack. I did not prepare for them to do what they did.”

“I’m going to contact people I’ve exchanged e-mails with and just tell them what’s going on,” he added with regard to his tens of thousands of spilled emails. “The rest I’ll deal with as it comes.”
The Rich and the Corporate remain in their hundred-year fever visions of Bolsheviks taking their stuff - JackRiddler
User avatar
Luther Blissett
 
Posts: 4991
Joined: Fri Jan 02, 2009 1:31 pm
Location: Philadelphia
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Pazdispenser » Wed Feb 16, 2011 12:09 am

JackRiddler wrote:Oh, yes, exactly. Being stupid doesn't mean merely that they fail to locate the "real" enemy, who may or may not exist. It means that they will fashion enemies out of convenient targets (people from the lower classes, out-castes or unpopular causes). It's the same mentality that, given the world shortage of real terrorist masterminds, filled up Guantanamo with a random selection of shepherds, taxi drivers and a few Anglo-Pakistani tourists kidnapped by militias and sold to the Americans for cash bounties.

It's also true in a deeper sense that these people are dangerous because they are stupid. If they weren't so fucking stupid, they'd have other priorities and preferences in life than to play the role of Nixonian plumbers for corporate mobsters, regardless of how well it pays to be a thug. This is also true at the highest levels, by the way. I gag when I hear ruthless cunning misanthropes like Rove or Kissinger called geniuses. If they were geniuses, they would be writing novels or surfing in Australia while earning annuities on their old hit singles, not conniving plots to destroy lives and nations by exploiting the trusting nature of real human beings.


Thanks for that Jack. It puts into succinct, decisive words thoughts Ive had inchoately rolling around my head.
Pazdispenser
 
Posts: 164
Joined: Sat Dec 09, 2006 3:03 am
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Plutonia » Wed Feb 16, 2011 12:47 am

This story has hit the MSM now:

The Guardian

WaPo

Wired (Recommended by Glenn Greenwald)

MSNBC Interview with Greenwald (Glenn posits civil case by affected parties)

Digging more deeply - Marcy Wheeler @ Firedoglake Plus an interactive relationship chart of the players:

Image


And finally this:
Palantir was founded in 2004 by PayPal alumni. Former PayPal CEO Peter Thiel is its chairman of the board. Thiel is also managing partner at Founders Fund, a San Francisco venture capital firm that focuses on early-stage technology investments. He's also the “angel investor” for Facebook, a member of that company's board of directors, as well as a steering director of the Bilderburg Group.

Awkward: A key service that attracted the Chamber’s lawyers to the corporate spies was the ability of HBGary’s CEO Aaron Barr to use computer programs and false “personas” to “scrape” personal information from the websites of Facebook and other social media sites. Such acts are in explicit contravention of the legal terms of service of Facebook.

Palantir's chief rival is I2 Inc., which is suing it for patent infringement.
http://www.scribd.com/doc/36371667/i2-v-palantir-080910


http://11oclocknews.typepad.com/the_11_ ... bbits.html

Which brings me back to this Churchill Club panel discussion on Wikileaks with Peter Thiel, from January. Considering the timing, it's worthwhile going back and looking closely at just what Thiel said about Wikileaks.




In a just world, Peter Thiel would now be about as popular as cancer.
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Plutonia » Wed Feb 16, 2011 12:54 am

Details on how the hackwas done - which vulnerabilities were exploited etc

Anonymous speaks: the inside story of the HBGary hack
By Peter Bright | Last updated about 3 hours ago

Image

It has been an embarrassing week for security firm HBGary and its HBGary Federal offshoot. HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year.

When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. HBGary's servers were broken into, its e-mails pillaged and published to the world, its data destroyed, and its website defaced. As an added bonus, a second site owned and operated by Greg Hoglund, owner of HBGary, was taken offline and the user registration database published.

Over the last week, I've talked to some of those who participated in the HBGary hack to learn in detail how they penetrated HBGary's defenses and gave the company such a stunning black eye—and what the HBGary example means for the rest of us mere mortals who use the Internet.
Anonymous: more than kids

HBGary and HBGary Federal position themselves as experts in computer security. The companies offer both software and services to both the public and private sectors. On the software side, HBGary has a range of computer forensics and malware analysis tools to enable the detection, isolation, and analysis of worms, viruses, and trojans. On the services side, it offers expertise in implementing intrusion detection systems and secure networking, and performs vulnerability assessment and penetration testing of systems and software. A variety of three letter agencies, including the NSA, appeared to be in regular contact with the HBGary companies, as did Interpol, and HBGary also worked with well-known security firm McAfee. At one time, even Apple expressed an interest in the company's products or services.

Greg Hoglund's rootkit.com is a respected resource for discussion and analysis of rootkits (software that tampers with operating systems at a low level to evade detection) and related technology; over the years, his site has been targeted by disgruntled hackers aggrieved that their wares have been discussed, dissected, and often disparaged as badly written bits of code.

One might think that such an esteemed organization would prove an insurmountable challenge for a bunch of disaffected kids to hack. World-renowned, government-recognized experts against Anonymous? HBGary should be able to take their efforts in stride.

Unfortunately for HBGary, neither the characterization of Anonymous nor the assumption of competence on the security company's part are accurate, as the story of how HBGary was hacked will make clear.

Anonymous is a diverse bunch: though they tend to be younger rather than older, their age group spans decades. Some may still be in school, but many others are gainfully employed office-workers, software developers, or IT support technicians, among other things. With that diversity in age and experience comes a diversity of expertise and ability.

It's true that most of the operations performed under the Anonymous branding have been relatively unsophisticated, albeit effective: the attacks made on MasterCard and others were distributed denial-of-service attacks using a modified version of the Low Orbit Ion Cannon (LOIC) load-testing tool. The modified LOIC enables the creation of large botnets that each user opts into: the software can be configured to take its instructions from connections to Internet relay chat (IRC) chat servers, allowing attack organizers to remotely control hundreds of slave machines and hence control large-scale attacks that can readily knock websites offline.

According to the leaked e-mails, Aaron Barr believed that HBGary's website was itself subject to a denial-of-service attack shortly after he exposed himself to someone he believed to be a top Anonymous leader. But the person I spoke about this denied any involvement in such an attack. Which is not to say that the attack didn't happen—simply that this person didn't know about or participate in it. In any case, the Anonymous plans were more advanced than a brute force DDoS.

Time for an injection

HBGary Federal's website, hbgaryfederal.com, was powered by a content management system (CMS). CMSes are a common component of content-driven sites; they make it easy to add and update content to the site without having to mess about with HTML and making sure everything gets linked up and so on and so forth. Rather than using an off-the-shelf CMS (of which there are many, used in the many blogs and news sites that exist on the Web), HBGary—for reasons best known to its staff—decided to commission a custom CMS system from a third-party developer.

Unfortunately for HBGary, this third-party CMS was poorly written. In fact, it had what can only be described as a pretty gaping bug in it. A standard, off-the-shelf CMS would be no panacea in this regard—security flaws crop up in all of them from time to time—but it would have the advantage of many thousands of users and regular bugfixes, resulting in a much lesser chance of extant security flaws.

The custom solution on HBGary's site, alas, appeared to lack this kind of support. And if HBGary conducted any kind of vulnerability assessment of the software—which is, after all, one of the services the company offers—then its assessment overlooked a substantial flaw.

The hbgaryfederal.com CMS was susceptible to a kind of attack called SQL injection. In common with other CMSes, the hbgaryfederal.com CMS stores its data in an SQL database, retrieving data from that database with suitable queries. Some queries are fixed—an integral part of the CMS application itself. Others, however, need parameters. For example, a query to retrieve an article from the CMS will generally need a parameter corresponding to the article ID number. These parameters are, in turn, generally passed from the Web front-end to the CMS.

SQL injection is possible when the code that deals with these parameters is faulty. Many applications join the parameters from the Web front-end with hard-coded queries, then pass the whole concatenated lot to the database. Often, they do this without verifying the validity of those parameters. This exposes the systems to SQL injection. Attackers can pass in specially crafted parameters that cause the database to execute queries of the attackers' own choosing.

The exact URL used to break into hbgaryfederal.com was http://www.hbgaryfederal.com/pages.php? ... =2&page=27. The URL has two parameters named pageNav and page, set to the values 2 and 27, respectively. One or other or both of these was handled incorrectly by the CMS, allowing the hackers to retrieve data from the database that they shouldn't have been able to get.

Rainbow tables

Specifically, the attackers grabbed the user database from the CMS—the list of usernames, e-mail addresses, and password hashes for the HBGary employees authorized to make changes to the CMS. In spite of the rudimentary SQL injection flaw, the designers of the CMS system were not completely oblivious to security best practices; the user database did not store plain readable passwords. It stored only hashed passwords—passwords that have been mathematically processed with a hash function to yield a number from which the original password can't be deciphered.

The key part is that you can't go backwards—you can't take the hash value and convert it back into a password. With a hash algorithm, traditionally the only way to figure out the original password was to try every single possible password in turn, and see which one matched the hash value you have. So, one would try "a," then "b," then "c"... then "z," then "aa," "ab," and so on and so forth.

To make this more difficult, hash algorithms are often quite slow (deliberately), and users are encouraged to use long passwords which mix lower case, upper case, numbers, and symbols, so that these brute force attacks have to try even more potential passwords until they find the right one. Given the number of passwords to try, and the slowness of hash algorithms, this normally takes a very long time. Password cracking software to perform this kind of brute force attack has long been available, but its success at cracking complex passwords is low.

However, a technique first published in 2003 (itself a refinement of a technique described in 1980) gave password crackers an alternative approach. By pre-computing large sets of data and generating what are known as rainbow tables, the attackers can make a trade-off: they get much faster password cracks in return for using much more space. The rainbow table lets the password cracker pre-compute and store a large number of hash values and the passwords that generated them. An attacker can then look up the hash value that they are interested in and see if it's in the table. If it is, they can then read out the password.

To make cracking harder, good password hash implementations will use a couple of additional techniques. The first is iterative hashing: simply put, the output of the hash function is itself hashed with the hash function, and this process is repeated thousands of times. This makes the hashing process considerably slower, hindering both brute-force attacks and rainbow table generation.

The second technique is salting; a small amount of random data is added to the password before hashing it, greatly expanding the size of rainbow table that would be required to get the password.

In principle, any hash function can be used to generate rainbow tables. However, it takes more time to generate rainbow tables for slow hash functions than it does for fast ones, and hash functions that produce a short hash value require less storage than ones that produce long hash values. So in practice, only a few hash algorithms have widely available rainbow table software available. The best known and most widely supported of these is probably MD5, which is quick to compute and produces an output that is only 128 bits (16 bytes) per hash. These factors together make it particularly vulnerable to rainbow table attacks. A number of software projects exist that allow the generation or downloading of MD5 rainbow tables, and their subsequent use to crack passwords.

As luck would have it, the hbgaryfederal.com CMS used MD5. What's worse is that it used MD5 badly: there was no iterative hashing and no salting. The result was that the downloaded passwords were highly susceptible to rainbow table-based attacks, performed using a rainbow table-based password cracking website. And so this is precisely what the attackers did; they used a rainbow table cracking tool to crack the hbgaryfederal.com CMS passwords.

Even with the flawed usage of MD5, HBGary could have been safe thanks to a key limitation of rainbow tables: each table only spans a given "pattern" for the password. So for example, some tables may support "passwords of 1-8 characters made of a mix of lower case and numbers," while other can handle only "passwords of 1-12 characters using upper case only."

A password that uses the full range of the standard 95 typeable characters (upper and lower case letters, numbers, and the standard symbols found on a keyboard) and which is unusually long (say, 14 or more characters) is unlikely to be found in a rainbow table, because the rainbow table required for such passwords will be too big and take too long to generate.

Alas, two HBGary Federal employees—CEO Aaron Barr and COO Ted Vera—used passwords that were very simple; each was just six lower case letters and two numbers. Such simple combinations are likely to be found in any respectable rainbow table, and so it was that their passwords were trivially compromised.

For a security company to use a CMS that was so flawed is remarkable. Proper handling of passwords—iterative hashing, using salts and slow algorithms—and protection against SQL injection attacks are basic errors. Their system did not fall prey to some subtle, complex issue: it was broken into with basic, well-known techniques. And though not all the passwords were retrieved through the rainbow tables, two were, because they were so poorly chosen.

HBGary owner Penny Leavy said in a later IRC chat with Anonymous that the company responsible for implementing the CMS has since been fired.
Password problems

Still, badly chosen passwords aren't such a big deal, are they? They might have allowed someone to deface the hbgaryfederal.com website—admittedly embarrassing—but since everybody knows that you shouldn't reuse passwords across different systems, that should have been the extent of the damage, surely?

Unfortunately for HBGary Federal, it was not. Neither Aaron nor Ted followed best practices. Instead, they used the same password in a whole bunch of different places, including e-mail, Twitter accounts, and LinkedIn. For both men, the passwords allowed retrieval of e-mail. However, that was not all they revealed. Let's start with Ted's password first.

Along with its webserver, HBGary had a Linux machine, support.hbgary.com, on which many HBGary employees had shell accounts with ssh access, each with a password used to authenticate the user. One of these employees was Ted Vera, and his ssh password was identical to the cracked password he used in the CMS. This gave the hackers immediate access to the support machine.

ssh doesn't have to use passwords for authentication. Passwords are certainly common, but they're also susceptible to this kind of problem (among others). To combat this, many organizations and users, particularly those with security concerns, do not use passwords for ssh authentication. Instead, they use public key cryptography: each user has a key made up of a private part and a public part. The public part is associated with their account, and the private part is kept, well, private. ssh then uses these two keys to authenticate the user.

Since these private keys are not as easily compromised as passwords—servers don't store them, and in fact they never leave the client machine—and aren't readily re-used (one set of keys might be used to authenticate with several servers, but they can't be used to log in to a website, say), they are a much more secure option. Had they been used for HBGary's server, it would have been safe. But they weren't, so it wasn't.

Although attackers could log on to this machine, the ability to look around and break stuff was curtailed: Ted was only a regular non-superuser. Being restricted to a user account can be enormously confining on a Linux machine. It spoils all your fun; you can't read other users' data, you can't delete files you don't own, you can't cover up the evidence of your own break-in. It's a total downer for hackers.

The only way they can have some fun is to elevate privileges through exploiting a privilege escalation vulnerability. These crop up from time to time and generally exploit flaws in the operating system kernel or its system libraries to trick it into giving the user more access to the system than should be allowed. By a stroke of luck, the HBGary system was vulnerable to just such a flaw. The error was published in October last year, conveniently with a full, working exploit. By November, most distributions had patches available, and there was no good reason to be running the exploitable code in February 2011.

Exploitation of this flaw gave the Anonymous attackers full access to HBGary's system. It was then that they discovered many gigabytes of backups and research data, which they duly purged from the system.

Aaron's password yielded even more fruit. HBGary used Google Apps for its e-mail services, and for both Aaron and Ted, the password cracking provided access to their mail. But Aaron was no mere user of Google Apps: his account was also the administrator of the company's mail. With his higher access, he could reset the passwords of any mailbox and hence gain access to all the company's mail—not just his own. It's this capability that yielded access to Greg Hoglund's mail.

And what was done with Greg's mail?

A little bit of social engineering, that's what.

A little help from my friends

Contained within Greg's mail were two bits of useful information. One: the root password to the machine running Greg's rootkit.com site was either "88j4bb3rw0cky88" or "88Scr3am3r88". Two: Jussi Jaakonaho, "Chief Security Specialist" at Nokia, had root access. Vandalizing the website stored on the machine was now within reach.

The attackers just needed a little bit more information: they needed a regular, non-root user account to log in with, because as a standard security procedure, direct ssh access with the root account is disabled. Armed with the two pieces of knowledge above, and with Greg's e-mail account in their control, the social engineers set about their task. The e-mail correspondence tells the whole story:

From: Greg
To: Jussi
Subject: need to ssh into rootkit
im in europe and need to ssh into the server. can you drop open up
firewall and allow ssh through port 59022 or something vague?
and is our root password still 88j4bb3rw0cky88 or did we change to
88Scr3am3r88 ?
thanks

-------------------------------------

From: Jussi
To: Greg
Subject: Re: need to ssh into rootkit
hi, do you have public ip? or should i just drop fw?
and it is w0cky - tho no remote root access allowed

-------------------------------------

From: Greg
To: Jussi
Subject: Re: need to ssh into rootkit
no i dont have the public ip with me at the moment because im ready
for a small meeting and im in a rush.
if anything just reset my password to changeme123 and give me public
ip and ill ssh in and reset my pw.

-------------------------------------

From: Jussi
To: Greg
Subject: Re: need to ssh into rootkit
ok,
it should now accept from anywhere to 47152 as ssh. i am doing
testing so that it works for sure.
your password is changeme123

i am online so just shoot me if you need something.

in europe, but not in finland? :-)

_jussi

-------------------------------------

From: Greg
To: Jussi
Subject: Re: need to ssh into rootkit
if i can squeeze out time maybe we can catch up.. ill be in germany
for a little bit.

anyway I can't ssh into rootkit. you sure the ips still
65.74.181.141?

thanks

-------------------------------------

From: Jussi
To: Greg
Subject: Re: need to ssh into rootkit
does it work now?

-------------------------------------

From: Greg
To: Jussi
Subject: Re: need to ssh into rootkit
yes jussi thanks

did you reset the user greg or?

-------------------------------------

From: Jussi
To: Greg
Subject: Re: need to ssh into rootkit
nope. your account is named as hoglund

-------------------------------------

From: Greg
To: Jussi
Subject: Re: need to ssh into rootkit
yup im logged in thanks ill email you in a few, im backed up

thanks

Thanks indeed. To be fair to Jussi, the fake Greg appeared to know the root password and, well, the e-mails were coming from Greg's own e-mail address. But over the course of a few e-mails it was clear that "Greg" had forgotten both his username and his password. And Jussi handed them to him on a platter.

Later on, Jussi did appear to notice something was up:

From: Jussi
To: Greg
Subject: Re: need to ssh into rootkit
did you open something running on high port?

As with the HBGary machine, this could have been avoided if keys had been used instead of passwords. But they weren't. Rootkit.com was now compromised.
Standard practice

Once the username and password were known, defacing the site was easy. Log in as Greg, switch to root, and deface away! The attackers went one better than this, however: they dumped the user database for rootkit.com, listing the e-mail addresses and password hashes for everyone who'd ever registered on the site. And, as with the hbgaryfederal.com CMS system, the passwords were hashed with a single naive use of MD5, meaning that once again they were susceptible to rainbow table-based password cracking. So the crackable passwords were cracked, too.

So what do we have in total? A Web application with SQL injection flaws and insecure passwords. Passwords that were badly chosen. Passwords that were reused. Servers that allowed password-based authentication. Systems that weren't patched. And an astonishing willingness to hand out credentials over e-mail, even when the person asking for them should have realized something was up.

The thing is, none of this is unusual. Quite the opposite. The Anonymous hack was not exceptional: the hackers used standard, widely known techniques to break into systems, find as much information as possible, and use that information to compromise further systems. They didn't have to, for example, use any non-public vulnerabilities or perform any carefully targeted social engineering. And because of their desire to cause significant public disruption, they did not have to go to any great lengths to hide their activity.

Nonetheless, their attack was highly effective, and it was well-executed. The desire was to cause trouble for HBGary, and that they did. Especially in the social engineering attack against Jussi, they used the right information in the right way to seem credible.

Most frustrating for HBGary must be the knowledge that they know what they did wrong, and they were perfectly aware of best practices; they just didn't actually use them. Everybody knows you don't use easy-to-crack passwords, but some employees did. Everybody knows you don't re-use passwords, but some of them did. Everybody knows that you should patch servers to keep them free of known security flaws, but they didn't.

And HBGary isn't alone. Analysis of the passwords leaked from rootkit.com and Gawker shows that password re-use is extremely widespread, with something like 30 percent of users re-using their passwords. HBGary won't be the last site to suffer from SQL injection, either, and people will continue to use password authentication for secure systems because it's so much more convenient than key-based authentication.

So there are clearly two lessons to be learned here. The first is that the standard advice is good advice. If all best practices had been followed then none of this would have happened. Even if the SQL injection error was still present, it wouldn't have caused the cascade of failures that followed.

The second lesson, however, is that the standard advice isn't good enough. Even recognized security experts who should know better won't follow it. What hope does that leave for the rest of us?
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 16 guests