Monster.com Malware Tags Another Site 50
bl8n8r writes "The first wave of problems for Monster.com came in the form of malware as recruiters cluelessly pointed trojaned Windows systems into Monster's database. The incident reportedly gleaned more than 1.6 million records from the job search site's database. The second incident followed two days later in the form of an infected Monster.com server pharming out malware by way of advertisements hosted on its websites. The latest incident now shows jobseekers using USAJobs are also at risk from the pharmed Monster trojan. The worst part is Monster.com seems to shrug it off with: 'As is the case with many companies that maintain large databases of information, Monster is from time to time subject to illegal attempts to extract information from its database. Despite ongoing analysis, the scope of this illegal activity is impossible to pinpoint.'"
NEVER use Windows as a server OS. (Score:3, Insightful)
The main problem is, as illustrated here, an insufficient level of security and quality. This isn't just a problem with the Windows itself. This is a problem with the other Microsoft products that are commonly used on Windows, including IIS and SQL Server. They're far too easily compromised, and fixes never come rapidly enough.
When high-quality products like Linux, Apache and PostgreSQL are available for free, there's really no reason to be using anything from Microsoft in a server environment. Hell, there are many reputable companies offering very affordable, and worthwhile, support for those products. And when the rare security issue does arise, a patch is usually available within the same day, if not within an hour or less.
Maybe someday IT managers and executives will realize that Windows is clearly not the optimal way to go. There are alternatives, and they are far better when it comes to security, quality, reliability, efficiency, and most importantly, cost.
Re: (Score:3, Informative)
Like their homepage states, "Only two remote holes in the default install, in more than 10 years!" That's a pretty remarkable achievement, when you consider that OpenBSD is a full-blown UNIX-like system, including a very capable, multiplatform kernel, a wide array of libraries, a great number of
Re: (Score:1, Troll)
Re: (Score:1)
Re: (Score:2)
Here, I'll pinpoint the scope for them: (Score:5, Insightful)
I'm curious to know how they could screw up a simple thing like database security to the point where some windows laptop on their network can just connect and do the above.
Re:Here, I'll pinpoint the scope for them: (Score:4, Informative)
Here's how the trojan actually works.
A monster.com affiliated recruiter is someone who pays monster.com to have access to the section of the site where they can search the database of resumes and profiles with some fairly powerful search tools, and find candidates that might be qualified for open positions at their company. This trojan finds one of these people's computers and infects it. It sniffs out account and password information, which it then uses to log into the recruiting site. The trojan then makes a very broad search-- one that should make available all of the resume information. It then aggregates all of this information and uploads it to an external server, where presumably badies will parse it, and attempt to either make a spam mailing list probably.
The thing is, this information is all basically PUBLIC information. I mean, yes, it is supposed to be public only to companies that pay monster.com to show it to them, but it is your resume for goodness' sake. You know, that document that you send all over creation, hoping people will read it? Yeah.
So basically, I think the people whose accounts were comprised will noticed a slight increase in their spam traffic from having their email address crawled yet one more time.
Re: (Score:1)
Re: (Score:1)
An obvious phishing scam, but how many of these things are going out to people who wouldn't know.. who are desperate for a job?
I've since removed my account.. well I actually couldn't find an option on their site to delete it, so I resorted to clearing all my info.
monster.com is now in my e-mail'
Re: (Score:2)
Re: (Score:2)
Look at the response headers from those two websites. The site is setup by the usual MCSEs who showed management a pretty webpage without actually having anything robust underneath.
We need to call those fools out. (Score:1, Insightful)
I've seen this happen in meetings before. During one such meeting, one DBA suggested the use of SQL Server 2005 for a new project. And immediately, two Oracle DBs tore him a new asshole. They listed the numerous security issues that SQL Server has been plagued with. They listed a variety of
Re: (Score:2)
Re: (Score:1)
They're not shrugging it off (Score:1)
Re: (Score:3, Funny)
Trollish submitter (Score:5, Insightful)
[a] Monster discovered: Did you note that Monster themselves noticed the infiltration. Wasn't posted to a full disclosure list which means they caught it on their own for a change. Give them that credit
[b] Monster initiated contacting those affected and working with LEA's. This didn't come to light in the same fashion as say with what happened at LinkedIn. Linkedin spurns bug bounty hunter [theregister.co.uk]. So why post such a trollish statement as "monster shrugged it off". There should be a mechanism to moderate those who post articles.
Re: (Score:2)
Re: (Score:2)
Re:Trollish submitter (Score:4, Informative)
USAJobs was built under federal contract, and the government was slowly moving to requiring every federal position be applied for through USAJobs. That includes internal promotions, executives, new-hires...basically everyone who is not elected or an appointee. A lot of fairly high ranking career civil servants are in that database.
I'm guessing the government is going to be very harsh on this, as they typically are when a contractor screws up IT security.
BTW, most federal employees and managers hate USAJobs, since you are not allowed to interview anyone unless the computer ranks them highly when it runs it's resume search algorithm. I can't interview someone unless the computer spits it out. Potential hires (and internal promotions) have to figure out how to "fake out" the search algorithm so their resume gets through. I'd love to see it go away.
Re: (Score:1, Informative)
That this includes my SS# going from a
More importantly, I'm
pee in the pool (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1, Interesting)
See? (Score:2)
All it takes is one 'yes' to have your computer pulled out from under you and put to work by some bastard that's probably not even in the business anymore.
Text of the email Monster sent out (Score:1, Interesting)
Note their directions on "HOW TO BE A SAFE INTERNET USER". If perhaps they had taken their own advice, maybe we wouldn't be in this situation?
--
Dear Valued Monster Customer,
Protecting the job seekers who use our website is a top priority, and we
Say good-bye to Monster Dot Com (Score:1)
Re: (Score:3)
pass the buck (Score:3, Interesting)
say what ??? (Score:1)
Re: (Score:1)
but was it an accident? (Score:1)
It wouldn't shock me in the least to discover that monster played an active part in this shenanigan.
db
big deal (Score:2)
Ah, fun with Windows! (Score:1)
If we had, say, cars that had to have $5000 of repair done every month, we'd be good friends with several lawyers. Microsoft does nothing about viruses for two decades and such calamity is considered a 'way of life'.
Guess I need to take my SSN out of my Resume (Score:1)