City Almost Loses 450K to Keylogger 158
SierraPete writes "The city of Carson, California (a suburb of Los Angeles) was the target of a 6-digit theft of cash. The LA Times reports that information taken from a keylogger was used to attempt to steal $450K from the city's treasury. Quick work by the city froze most of the funds, but it drives home the importance of keeping good anti-spyware and anti-virus software updated on both corporate systems as well as systems being used from home."
Obligatory... (Score:3, Funny)
Physical Keylogger (Score:2, Insightful)
Do you know how these things work?
Re: (Score:2, Interesting)
Re: (Score:2, Informative)
I think it's main use is to find out if your wife/husband or live in girlfriend/boyfriend is cheating on you, stuff like that. I owuldn't trust it for a sensitive operation like the one described in the article, too
RTFA (Score:2, Informative)
Antivirus/antispyware might not stop a physical keylogger, but that wasn't the problem here.
Re:Physical Keylogger (Score:5, Insightful)
It's also probably worth mentioning that the keylogger was likely active for atleast a minimum of a day or two, likely much longer, considering it's mentioned that the keylogger tracked the treasurer's keystrokes until the hacker discovered the appropriate passwords AND the hacker stole the money over a couple days. With this longer exposure, especially if the keystrokes were being monitored remotely, there's a good chance that an anti-virus program with heuristics scanning running in the background (or atleast a decent software firewall) could have flagged the suspicious behavior and perhaps identified the keylogger program being used.
At the least, I think the poster is trying to convey that proper computer security could have helped to secure the computer and identify the problem earlier (the larger amount of 358,000 was stolen on the second day) or helped stop it outright.
Re:Physical Keylogger (Score:4, Informative)
Yes there is.
That is, unless they don't know what the word "spyware" means. Being reporters, they might just assume that spyware means what it sounds like -- any software used to spy on you, including something picking up keystrokes from a physical keylogger.
But then, it also seems like it would be difficult to make a physical keylogger that communicates reliably with the outside world:
That sort of implies it's being done in realtime. Of course, they could always mean it was a physical keylogger, which the "hacker" then collected and dumped...
Then again, it's a laptop. If you have physical access to a laptop for long enough and with enough tools to install a physical keylogger, it's probably easier to carry the thing off and hope there's something valuable on the hard drive.
Re: (Score:3, Insightful)
Keylogger was probably installed through some kind of widespread trojan - be it email or compromised website. My favourite is website, because that requires slightly more sophisticated monitoring to do the job properly than an email system, particularly if you give people laptops and let them take the laptop home and connect to their employer through a VPN.
One of two things is possible from this point:
1. Hacker was specifically targeting the treasurer's department. Regardless of th
I would have gotten away with it... (Score:4, Funny)
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:1, Troll)
Did you read the fscking article?
Re: (Score:3, Insightful)
Well said! The notion that desktop computing in the Internet age would be problem-free if only everyone installed anti-malware software is completely bogus and doesn't even stand up to the slightest scrutiny. Everyone and is dog runs anti-malware (you can't buy a new PC without the stupid stuff literally flying out of the screen at you the minute you boot it up), and everyone and his dog is hideously infested with malware. Talk about brain-dead
Damned politicians (Score:5, Insightful)
Theft is already illegal, why do we need yet another law? Just enforce the ones we have now!
Re:Damned politicians (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
Think of it as political security theatre and/or CYA security - it doesn't actually do anything, but it mollifies the mob, and it allows her to point at the newly-passed laws and say "but I did something, you can't blame me!" when the same thing happens again later on.
Re: (Score:2)
Oh and connecting a laptop into the internal coroprate net? In a lot of companies people would get fired on the spot for that, never mind waiting for the next election. Laptops should be *outside* the firewall not inside it.
Re: (Score:2)
All the opponent has to do is to point out that if she hadn't been browsing porn/warez sites in the first place she wouldn't have got a trojan on her computer.
I think that particular misconception has been cleared here before - not that browsing porn/warez sites won't get you infected, but that you can't get it any other way. I was a network admin, and the largest spyware infection we had was with a weather toolbar which a user downloaded and shared (everyone has local admin privileges here).
My work doesn't have that much sensitive information (and we use the "default trust" approach with our employees), but, unlike her work, but you could conceivably allow l
Re: (Score:2)
Re: (Score:2)
Theft is already illegal, why do we need yet another law? Just enforce the ones we have now!
How about:
Re: (Score:2, Insightful)
Yes it is, which is exactly why it'll never happen
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Deterrence works well in that case. OTOH we still have robberies.. because A doesn't apply in all cases - firstly because the odds change.. stealing a million dollars worth of diamonds using a well planned robbery can seem like a good idea - and also there's the cases of faulty risk assessment (in the case of drug addicts etc.).
If you think of something like smoking cannabis, which has a low (nearly zero) risk of being
Re: (Score:1)
Do not allow "key logger" or equivalent key tracking software to be installed on network connected computers or terminals.
Problem solved.
Re: (Score:2)
Not hardly. That law requires that the reader know what a '"key logger" or equivalent key tracking software' is, what a network is, what software is, and what a computer or terminal is.
All this information is beyond most private sector workers, and nearly all public servants. While ignorance of the law is not a defense, if the idea is to prevent the crime in the first place, this is a miserable failure. Any attempt by IT personnel (if the city even has them) to educate their workers will b
Re: (Score:2)
To my knowledge, "piracy" has two definitions:
I really, really wish the people writing these stories would bother to at least try to get the jargon right. After all, there's no mention of the word "keylogger", or the fact that it's a really fucking obvious and common attack. I bet they either thought or are trying to pretend that this kind of thing has never happened before...
Re: (Score:2)
this kind of idiocy they thinks a law will prevent a crime infuriates me.
Re: (Score:2)
Legislation can do more than simply make something illegal. It can provide additional means of enforcement (e.g. PATRIOT act (I don't like it, but it's an example)), or make it more difficult to commit the crime in the first place (e.g. Brady Bill).
450K ? (Score:1, Funny)
Re: (Score:2)
It's a keylogger! 450k of passwords is a BUNCH.
Re:450K ? (Score:5, Funny)
And nobody is really immune (Score:2, Informative)
You can say that again. But you can't assume you're completely safe even on non-Windows system. A quick search on Mac software sites shows at least one keylogger and surely more are available. I'm sure equivalents exist for Linux, too. This sounds paranoid, yes, but the truth is if *anyone* else has access to your computer, either remotely or phys
Re: (Score:2)
As for hardware keyloggers, the best defense is superglue and a policy of checking attached devices after an extended period of time away from the machine.
Re: (Score:1)
Re: (Score:2)
I tell ya, sometimes I feel like I should start doing "irresponsible security research" again. At least in the old days people understood the risks because people would yell from the rooftops what was possible (and prove that it was) instead of keeping it all secret so they can sell it to the russians, or, worse yet, the vendors.
Re: (Score:2)
Re: (Score:2, Flamebait)
There's about a dozen ways to intercept su or sudo. They range in sophistication from adding an alias to the user's
Hardware Loggers (Score:2)
They also exist for PS/2 and USB too, so the OS doesn't have to even know about it.
Many are so discrete even an IT tech might not notice them.
I've heard there are even some for Windows that can be programmed to inject keypresses.
Hopefully I'm OK typing on my laptop's integrated keyboard here.
Re: (Score:3, Funny)
Re: (Score:2)
I actually know nothing about Bluetooth line crypto, but assuming it's any good, having a paired device might not be a bad idea.
Who modded you Troll?
Yes, but (Score:2)
The simple fact is, that Windows IS easier to hit. And until the security tightens up, it will remain that way. *nix has decent security in it (due to a good initial design and years of work to get it right).
Re: (Score:2)
The simple fact is, that Windows IS easier to hit. And until the security tightens up, it will remain that way.
How do you suggest they "tighten" it up ?
*nix has decent security in it (due to a good initial design and years of work to get it right).
Seems you don't know your history.
Re: (Score:2)
Re: (Score:2)
Saying that GNU/Linux and Mac have the same problems Windoze does is a serious insult. I'm tired of hearing people tell me how much my OS needs an antivirus and spyware checker.
It's bullshit anyway. The pros can get through anything. Starting off with an OS that 99% of script kiddies can't own is a much better option than dragging down your computer's performance with snake oil. An OS like Debian, without Flash and other useless and insecure junk, is more appropriate for an office than Windoze with it's IE, Outlook and WMP burden. After that, AV can be done for mail servers and intrusion detection at the network level. Everything else is just so much busy work and waste of money.
While I will agree with you that Windows is fundamentally less secure than GNU/Linux||BSD haven't you ever heard of "Defense in Depth"?
Yes, AV can be done for mail servers, and hell also on proxy servers. But how do you protect against the user in room 314 with a USB Memory key that he likes to use? you need AV on individual systems (I like ClamAV for *nix, but that's my personal choice)
Intrusion Detection at the network level, brilliant, and a useful tool, but not enough. How do you detect changes to impo
Non free is just screwed. (Score:2)
While I will agree with you that Windows is fundamentally less secure than GNU/Linux||BSD haven't you ever heard of "Defense in Depth"?
Sure, and that's what's needed. The easiest way to start it to throw the Windoze out and end the monoculture. Defense in depth starts with a diverse OS install that makes the whole 0wnership game that much more difficult and less profitable.
Most of the Windoze problems are problems of obnoxious non free software that get in the way of real security. Complex licensin
Re: (Score:2)
Done, no need to reboot.
And when your apt-get upgrades include a new kernel, what do you do then?
Bill Gates can spend ALL of his money making Slashdot carry his message, but no one will believe it
I'm not sure he really gives a fuck, to be honest. When you're a billionaire ex-CEO of one of the world's largest and most successful companies, whose time is increasingly devoted to running a charity foundation to distribute AIDS drugs and whatnot, I really doubt your top concern is
foamy mouth and sham charity. (Score:2)
I'm not sure he really gives a fuck, to be honest. When you're a billionaire ex-CEO of one of the world's largest and most successful companies, whose time is increasingly devoted to running a charity foundation to distribute AIDS drugs and whatnot, I really doubt your top concern is astroturfing Slashdot. ... It's depressing in and of itself that someone can be as mouth-foamy as you are about some fscking software.
M$ spends about a billion dollars a month on marketing. I spend a few minutes a day.
B
Re: (Score:2)
Marketing, yes. Not astroturfing Slashdot.
Bill Gates' supposed charity is his bid to 0wn medicine and education... Everything he does comes with strings attached, such as pledging to use M$ software, respect their patents and other nonsense that has nothing to do with medicine or education
Re: (Score:2)
That is far from what was intended in my (the grandparent) post. I think you read in between the lines and found something that wasn't supposed to be there. Despite what you may think, I was not implying that Linux and Mac systems "have the same problems" as Windows. That is an absurd statement. Perhaps I should have spelled it out
What did he say that was wrong? (Score:2)
Re: (Score:1)
Re: (Score:2)
Fscking dumb (Score:5, Insightful)
> on both corporate systems as well as systems being used from home.
No. It drives the importance on controlling the flow of public money. If one person be it a president of California or what you call him, can make significant money transfers that are not audited and open that is something wrong with your system. Yes you fscking can make that bank *calls* you to approve any transfer above some ammount. Yes you can make that public transfers are open and visible.
So it is nothing to blame about the software since it is obvious that Windows in hands of non-technical people is insecure. The person making transfers should use different laptop perhaps? The one that IT department cares of not the one that he browses pron from?
It is just an example how retarded and uneucated people who have power to spend public money are.
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
Second, there's a whole range of things you can do to prevent dodgy payees being added to an account. I know of one bank here in Australia that sends
Re: (Score:2, Interesting)
Re: (Score:1)
Re: (Score:1)
Re: (Score:3, Insightful)
What kind of idiot sets up a financial system for a city (that deals with a lot more money that we ever will) in which one user can on their own authority transfer over a quarter of a million dollars to a random bank account? Whoever the controller for the city is should probably be fired at this point.
Even
There is no way to protect yourself (Score:2, Insightful)
it drives home the importance of keeping good anti-spyware and anti-virus software updated on both corporate systems as well as systems being used from home.
Uhh, no. If the keylogging software is some off the shelf crap, sure, that might work, but if it is something the attacker has written specifically for this attack, forget it. We don't live in a world where software is assured. You can't ever say "my keystrokes are on a secure path". Although, two factor security things like RSA's Secureid [rsa.com] can help.
Re: (Score:2)
Curses (Score:1, Redundant)
Because laws sure do _prevent_ things... (Score:2, Insightful)
Yeah, because laws sure do stop those criminals from, you know, breaking the law.
When are politicians going to wise up and realize that laws don't stop criminals from doing anything, they just offer a means of punishing them _if_ they get caught after the fact? Completely different methods are required to prevent these kind of things -- like proper security procedures, in this case.
Re: (Score:1)
Well, well... (Score:5, Insightful)
God I'm going to hell for writing that, and I'm a Linux user.
Re: (Score:2)
The article does not say what the compromised system was running but I guess if it weren't windows then it whould be news.
Keyloggers would become useless for passwords theives i
Re: (Score:2)
If only the treasury had been using Vista, at least someone would have been to blame for clicking "Accept". In this case no-one could admit ignorance by saying the keylogger just slipped through the net; SOMEONE would have had to click that damn button.
That damn Accept button will be the ultimate CYA for Microsoft.
Vista asks you so many times (if you do interesting stuff, at least), that you have to either disable the UAC or pressing "Accept" will become a reflex. Of course, I don't use Vista, I only install and troubleshoot it, so my view is skewed (you won't have to press Accept to use Word too often).
Keyboard technology (Score:2)
Re: (Score:2)
Actually, the article says that the compromise happened on a laptop, which implies a software keylogger, not a device -- the software loggers tap into the keyboard events in the OS, so it doesn't matter how the keyboard is plugged in.
I recently noticed Thinkgeek [thinkgeek.com] is now offering the "Ke
Have the bank call to verify (Score:1)
Of course we need more legislation - that'll work. (Score:4, Insightful)
* sigh *
Because people who would try and steal some $450,000 are going to be stopped by legislation making it even more illegal.
Maybe something like two factor authentication would be better? That way different numbers are needed every time. And better security on the laptop perhaps? Non administrator priviliges. Not allowing people to install software? All quite doable.
Sure, blame the criminals, but maybe the doors should be bolted too?
unsecured terminal? (Score:1)
Yup, now that she has pleanty of time on her hands since she has been FIRED!
Re: (Score:2)
I've found keylogger cache files (Score:5, Interesting)
A guy called, infested with spyware... I started poking around, and found a text file. Before I continued, I called the Help Desk manager over, and put the client on speaker:
"Um, sir, do you bank at Bank of America?"
"Yeah, why?"
"Is your password 'Snoopy67'?"
Since then, I've found a few dozen files with clear-text keylogger yields... and thousands of log files filled with coded stuff that could be anything.
Re: (Score:3, Funny)
Before I 'retired'....
and
"Um, sir, do you bank at Bank of America?"
Re: (Score:2, Interesting)
"Um, sir, do you bank at Bank of America?"
"Yeah, why?"
"Is your password 'Snoopy67'?"
"No. It's the same as my luggage: 1, 2, 3, 4, 5."
hmmm (Score:1)
Well, yall can start by getting your heads our of your asses and implementing a descent security program, including limiting employees' access to their workstations..
Except that... (Score:1)
Congress wants to pass a law that would make spy-ware legal.
(IIRC, it is HR 950 - the "CAN SPY ACT". There was a /. post about it a few weeks back, but too hard to use PDA to search while riding on a bus.)
Who Uses Online Banking? (Score:1)
Does anyone here actually use online banking? If you do, aren't you worried about your account being compromised? What measures do you take to address the numerous security issues?
Personally, there's no way I'd sign up for online banking, there's just too much risk. I prefer to either visit my bank in person or (rarely) speak to someone at the bank over the phone. I understand that the phone is also risky, but I figure that there's much more risk for an attacker since there will be a record of from w
Re: (Score:1)
More legislation? (Score:2)
This doesn't bode well. What they need are some secure computing practices. Legislation won't prevent this, especially when the person lives outside her jurisdiction which happens to be most of the world.
Thats it? (Score:4, Funny)
morons (Score:2)
Three words: Hardware key [thinkgeek.com] logger [thinkgeek.com].
Fools and their money are soon parted.
lol (Score:3, Interesting)
"The treasurer said she is now determined to try to write legislation that could prevent this kind of computer piracy."
Yeah... more "rules" against this kind of behavior will fix it. It's not illegal enough... that's the reason it happens. Criminals care about consequences. Dumb ass.
Will not be enough. (Score:2)
Then there is current research on doing audio-keylogging (by recognizing the individual key-sounds), and that seems to work reasonably well. There is Tempest monitoring for the keyboard. This one is a bit more effort, not because the signal is weak, but it is not too suitable for convent
Stupid (Score:2)
My god, the simplest things... (Score:4, Interesting)
I know it's not going to fix anything, but there are a few simple, simple steps:
This is common sense stuff. Some of it is a bit tinfoil-hat (SELinux, secure hardware), but really, most of the above can be done very cheaply, and in the long run, won't take any significant amount of time or brainpower to maintain.
And though I've never been a cracker, it still pisses me off when, instead of responding by paying attention to common-sense security (as I've just described), they'll attempt to buy a magic bullet -- they'll buy ONE product, probably something standard like Windows Defender, and then get lazy again. Or sometimes they'll try litigation, or both:
Re: (Score:2, Insightful)
Re: (Score:2)
For example, I really don't give a damn if MySpace can get into my free New York Times account, but that's basically what using the same password on both implies -- if someone 0wns MySpace, or MySpace itself becomes corrupt, they can get my password and use it
Social Engineering (Score:2, Informative)
Anti-malware software can only do so much. The real solution is to educate users so they are not vulnerable to social engineering attacks such as "OMG SMILIES FOR YOUR EMAIL", "I need to verify your username and password" and various other ways users are conned into having their boxes rooted and/or their passwords exposed.
Of course locking down corporate workstations is a very good idea. No admin access and
Meh, happy endings suck.. (Score:2)
PS: Just curious: how would it be possible to transfer 450mil out of a bank and go undetected? How are these big things pulled off?
YAY WINDOWS! (Score:3, Interesting)
California should just outlaw the root problem (Score:2)
Since the state thinks that legislation can be used to solve all their problem there are just 2 things they need to outlaw: ignorance and stupidity. I sure it would be just as effective as creating new laws covering crimes that are already covered by other laws.
anti-? (Score:2)
Re:6 digit theft? (Score:5, Funny)
Ob: Princess Bride. (Score:5, Funny)
Re: (Score:3, Funny)