Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
America Online Security IT

AOL Security Compromised by Teenager 99

Freaky_Friday wrote with a link to an InfoWorld article about a teenage kid accessing customer information at AOL. The alleged criminal trespass began late last year, and extended up through early April. According to the article, the guy used some 'off-the-shelf' hacking software he downloaded online to gain access to, and then transmit information from, AOL's systems. "The complaint states that Nieves admitted to investigators that he committed the alleged acts because AOL took away his accounts. 'I accessed their internal accounts and their network and used it to try to get my accounts back,' the defendant is quoted as saying in the complaint. He also admitted to posting photos of his exploits in a photo Web site, according to the complaint ... If the defendant was honest about his motivation in his reported confession, it's safe to assume that he wasn't interested in stealing data for financial gain, [Managing director of technology at FTI Consulting Mark] Rasch said. Still, it'll be interesting to find out what steps AOL is taking if customer data was in fact compromised, he said."
This discussion has been archived. No new comments can be posted.

AOL Security Compromised by Teenager

Comments Filter:
  • Hmmm (Score:5, Funny)

    by NightWulf ( 672561 ) on Saturday April 28, 2007 @11:45PM (#18915801)
    Kid must be pretty smart if he was able to hack AOL's servers. *Reads article* Ohhhhh to get his account back...hmm forget it.
    • One wonders exactly what tools he used. I mean it isn't like AOL is just sitting there open.
      • Re:Hmmm (Score:5, Informative)

        by Anonymous Coward on Sunday April 29, 2007 @12:40AM (#18916017)
        Well there have always been tools out there to hack AOL, some of the more notorious were AOHell and WAAS (We are all sinners), LOFT even had a whole series of tools for AOL. Most of them just contained a lot of script kiddy stuff but there were some others that gave you shell access to the network about 10 years ago or so AOL was really like a pretty face over a custom IRC type network. If you could drop down out of the pretty face and get to the raw shell which was only really only protected by the fact that the pretty face was there and most AOL users were too dumb to realize that there was something going on under the AOL screen. You could peek around, but then once you got yourself an overhead account you really could run through the system at will. While I imagine it has improved over the years I am guessing a lot of the base code and concepts of the network are there still.
    • Kid must be pretty smart if he was able to hack AOL's servers. *Reads article* Ohhhhh to get his account back...hmm forget it.
      Hey, his friends were laughing at him because he was sending mail with lower-case letters!
  • by Zeebs ( 577100 ) <(moc.liamg) (ta) (werdsr)> on Saturday April 28, 2007 @11:46PM (#18915807)
    I mean I won't even go with the obvious AOL bashing. But is it really news that Teens are committing computer crime? Isn't that the stereotype? The pimple faced dateless wonder in his parents basement 'pwning' the 'g1bs0n'?
    • by Zeebs ( 577100 )
      And just cause that's autobiographical doesn't mean anything mods!
    • Re: (Score:2, Funny)

      I heard that he was attempting to send some obscure command to the AOL servers: "Execute Order 66".

      For his age-frame, I think he'd have been better off trying to go three integers higher.

      Of course, for that you have to leave the basement eventually. Gotta leave that womb-like comfort to obtain...uh...some *other*...womb-like comfort...oh, never mind.
    • by nmb3000 ( 741169 )
      But is it really news that Teens are committing computer crime? Isn't that the stereotype?

      Exactly! The only feasible solution is to add Hot Pockets to the same over-the-counter blacklist that NyQuil and such are on. Anyone who goes to Costco and buys a case of Hot Pockets is obviously a criminal.
    • by fafalone ( 633739 ) on Sunday April 29, 2007 @04:46AM (#18917133)
      Well, the fact that this is news can mean only one thing; AOL has massively overhauled their security system and now has state of the art, well designed, and highly effective security. Because the AOL I remember had its security severely compromised by teenagers several times a day. Serious breaches too, read my other post in this thread. It happened so incredibly often, there's no way a breach would be national news. So logically, if its now rare enough to be newsworthy, they must have stopped the endless onslaught of easily exploited holes...
      ...because a journalist would never just write up a non-story to insult AOL or do some "omg haxors" fearmongering... never...
    • lol, Hackers was on last night :)
  • by Anonymous Coward

    According to the article, the guy used some 'off-the-shelf' hacking software he downloaded online to gain access to, and then transmit information from, AOL's systems.


    I've never heard of AOL software referred to like that before. Sure I was thinking it.

  • Curious.... (Score:4, Insightful)

    by ScottKin ( 34718 ) on Saturday April 28, 2007 @11:54PM (#18915849) Homepage Journal
    I, for one, would like to know why he lost his original AOL accounts in the first place.

    Hacking, maybe? ;)

    ScottKin
  • by firpecmox ( 943183 ) on Sunday April 29, 2007 @12:01AM (#18915869) Journal
    I tried to hack someone once but that damn 127.0.0.1 was behind a firewall and it just messed up my computers
    • I know what you mean. I was once after this guy at ::1 but IPv6 is unhackable, you know? I felt bad too, because when I couldn't do it, the guy in the mirror started looking at me funny.
  • Suuurrree (Score:5, Insightful)

    by FalleStar ( 847778 ) on Sunday April 29, 2007 @12:13AM (#18915907) Homepage

    Among his alleged exploits:
    * Accessing systems containing customer billing records, addresses, and credit card information
    * Infecting machines at an AOL customer support call center in New Delhi, India, with a program to funnel information back to his PC
    * Logging in without permission into 49 AIM instant message accounts of AOL customer support employees
    * Attempting to break into an AOL customer support system containing sensitive customer information
    * Engaging in a phishing attack against AOL staffers through which he gained access to more than 60 accounts from AOL employees and subcontractors
    Yeah, sounds like he was JUST trying to get his account back alright.
    • Re:Suuurrree (Score:5, Insightful)

      by VirusEqualsVeryYes ( 981719 ) on Sunday April 29, 2007 @12:27AM (#18915957)

      Engaging in a phishing attack against AOL staffers through which he gained access to more than 60 accounts from AOL employees and subcontractors
      You'd think employees of an ISP, who routinely warns its customers about it, would be wise to rudimentary "attacks" like phishing scams.
      • by msimm ( 580077 )
        you're new here aren't you. (:
      • Re: (Score:3, Informative)

        by ShaunC ( 203807 ) *

        You'd think employees of an ISP, who routinely warns its customers about it, would be wise to rudimentary "attacks" like phishing scams.

        You'd be surprised. Back in the late '90s, when phishing first became a problem on AOL, they went so far as to modify the Instant Message window so that it contained a disclaimer, in very obvious red text, saying that no one from AOL will ever ask for your password. Believe me, very few people paid attention to that warning.

        I recall sitting in the nerve center chat with the

      • AOL is an isp? my elected official told me it was the point on the intarweb in which all the tubes met. he also assured me it was most certainly not a pickup truck.
      • You'd think employees of an ISP, who routinely warns its customers about it, would be wise to rudimentary "attacks" like phishing scams.

        I can tell you from personal experience that you'd be wrong. And not just because we are talking about AOL, but this will be true in any large company.

    • * Engaging in a phishing attack against AOL staffers through which he gained access to more than 60 accounts from AOL employees and subcontractors

      Unfortunately, this kid's command of the English language was no better than that of "Bob", who sits three cubicles down. To "Jim", the two were indistinguishable. It's no wonder "Jim" got phished.

      Ah, the joys of going multinational.
  • Why? (Score:3, Funny)

    by flyingfsck ( 986395 ) on Sunday April 29, 2007 @12:14AM (#18915913)
    If he had internet access already, why on earth would want an AOL account? Just a schtoopidttt script kiddie...
  • by Anonymous Coward on Sunday April 29, 2007 @12:22AM (#18915939)
    Mike aka Virus is far misrepresented by this article and the (at least) two others about this. AOL did not track him down by themselves, he was snitched on by a fellow member in the 'aim scene'. Causing $500,000 in damage by logging onto internal and overhead accounts to suspend and unsuspend account, way to try to make a case for yourself AOL. If anyone in this case needs to get in trouble it is AOL. AOL completely fails to train their employees against social engineering techniques, therefore their own employees are really the ones accountable for any customer information being revealed. AOL is notorious for exchanging favors for information on exploits and snitching on your "friends".

    To quote the article:
    "AOL has had pretty good security over the years."

    This is a massive error in any credibility on AOL's part. Within the past 6 months there have been countless exploits in their systems including the ability to register accounts that were 1 or 2 characters long, register accounts of names that were already in use, including over registering internal accounts and accounts such as "AOL System Msg", the ability to register accounts with vulgar and racist words in them via non-American AOL sites, and thats just to name a few off the top of my head. Currently there is still a major issue with accounts having more than one working password.

    I could go on and on about the flaws of AOL, but why bother, they know that the flaws exist but instead of tying to fix them they bury them by going after the people who find them, and leaving the holes still in their systems.
    • This kid's a punk. (Score:4, Insightful)

      by Anonymous Coward on Sunday April 29, 2007 @12:43AM (#18916035)
      He might have been ratted out by his hacking crew, but he deserved it. He is a jerk, special ed all his life for anger issues. And it wasn't just AOL, so that BS about "just trying to get my account" back doesn't fly. The jackass was so freaking high on himself that he would use social engineering to gain access to companies databases, then send screen caps to the FBI. Including his aim handle. Which he also had on his myspace page. Dumbass.
      • That may be true, but it doesn't change the messed up nature of how our society treats people who crack their systems. Yes, there should be consequences - but part of those conseqences should be requiring the crackers to help the victims clean up and secure their systems. What good does it do if a kid hacks government agencies, then just gets thrown in jail. It isn't a productive use of his skills, and the government servers sit there unfixed for the most part. (government is just the extreme example -
        • It isn't a productive use of his skills...


          What skills? Lusers like this have no skills, just programs they found somewhere. They have no idea how the programs work, couldn't write one if they did and have minimal computer skills. They're just young punks doing the computer equivalent of spray-painting graffiti, or tagging.

        • Not trolling here, but, if someone gets imprisoned for stealing and stripping automobiles, they should be hired by their local Goodwrench service center as a master mechanic?

          I don't think a life sentence is in order, but there has got to be some accountability for actions taken. I mean, by your line of thinking, why would you even interview for an IT position anymore? Just find an exploit in a prospective employer's system and run with it. Once you've caused thousands of dollars worth of damage and compro
          • Not hiring them, at least initially - more like community service - the cracker would have to spend a certain amount of time helping the company. After that point, if the company felt they could trust the person, sure they could actually offer to hire them.

            Frankly, hiring crackers would be the best thing AOL could do, considering their incompetent programmers and security procedures. I'm familiar with AOL, and although their security has gotten better in some slight ways over the past 7 years, it's remain
            • I'm not disagreeing with the reality of the matter. I am however disagreeing with the example that is set in the process.
      • by Anonymous Coward
        You make it sound as if they had a clue. These are just a few k1dd13z doing the kind of shit which only k1dd3z do.

        They believe that they're "special" because they did it, all the while not realising that anybody can do it, but it's just that only retarded k1ddi3z are actually bored enough, or have the time to waste to do something as lame and loserish as "hack" AOL.
    • Re: (Score:1, Interesting)

      by Anonymous Coward

      AOL completely fails to train their employees against social engineering techniques, therefore their own employees are really the ones accountable for any customer information being revealed.

      Entirely incorrect. AOL teaches all its new hires about various social engineering attacks. I know, I was forced to sit through it on my first day as an employee. And they remind people about it at least as much as anywhere else I have ever worked.

      Should they do even more? Maybe so. But the fact is that the people

  • If security is this bad is it too off the wall to suggest that this may have been done before by people who have it in their best interests to keep quiet about it? Scary stuff.
  • Freaky_Friday wrote with a link to an InfoWorld article about a teenage kid accessing customer information at AOL [CC]. The alleged criminal trespass began late last year, and extended up through early April. According to the article, the guy used some 'off-the-shelf' hacking software he downloaded online to gain access to, and then transmit information from, AOL's systems.

    Okay, so a script kiddie hacks AOL servers and Diebold builds really bad voting systems. Which one is worse? Technically, if all that's said so far is true, the kid probably belongs on a security team at AOL. He at least knows enough holes in their security to cause them no sleep for months. Perhaps that should be the entirety of his punishment: help AOL fix their holes for free.

    On top of that, lets have AOL users now hold the board of AOL responsible until they show they have fixed their security issues.

    • he used off the shelf hacking tools - I take it that means somthing off sectools.org depending on which it was - it could mean anything but although he does know the holes better that AOL's team i think AOl's security team should just stop driking coffe and have a go at hacking their own systems and hang out on #cracking-aol-with-no-speacialist-knowledge
    • by Tuoqui ( 1091447 )
      Slavery is illegal. Fixing all of AOL's security holes would require him being there for a lifetime. I'm not condoning what the kid did... well ok maybe in a roundabout way. AOL should fess up that their own internal security is not as good as they would lead everyone to believe. It sounds like their Security Team is not doing nearly as much penetration testing as they should be. You want good penetration testers hire the kid on instead of frying his ass in court. Obviously if you give the kid a check and
    • by KTorak ( 860467 )
      Why would a 'hacker' be using AOL (dial up i presume - who pays for high speed AND AOL?) to access the internet? Wouldn't he be a little more sophisticated and have DSL or cable? If you get banned, more on to a better ISP, end of story.
  • What is this AOL you speak of?

  • by Bob Cat - NYMPHS ( 313647 ) on Sunday April 29, 2007 @01:23AM (#18916193) Homepage
    Who DIDN'T own AOL when they were a teenager?
  • by thib_gc ( 730259 ) on Sunday April 29, 2007 @01:25AM (#18916207)
    Other shocking headlines: "Ape defeats security of Diebold voting machines"
    • "Further investigation reveals that the alleged Ape was actually Steve Balmer, who is now President of the United States. When asked to do something about it, congress said 'we will work on a plan for a timetable to remove Balmer from office within 24 months, but there is little we can do.. he's just going to veto it."
  • Same old same old (Score:5, Interesting)

    by ShaunC ( 203807 ) * on Sunday April 29, 2007 @02:30AM (#18916589)
    From the perspective of someone who was in that scene more than a decade ago, it's enlightening to see how much of this is still going on. I don't see where in the article it says he used "'off-the-shelf' hacking software," but I guess these days it doesn't take much talent.

    I remember when the phishing trend started. AOL's biggest mistake at that point was creating a special People Connection lobby that overhead/internal accounts would default to. Initially, it was just a private room whose name changed occasionally (who else remembers THEBLIMPSAIDITALL, and numerous incarnations of IllIlIIlIIlllIlIIlI...?). Anyone who knew the name could get into the room with any regular account, and phish privileged accounts to their heart's content. Eventually AOL made some progress and created a viewruled lobby, which they assumed would keep the riff-raff out, but they forgot to plan for the fact that the riff-raff already had access to privileged accounts.

    In the early to mid 90s, there was no such thing as phishing. If you wanted privileged access, you had to work for it, and it was a thankless (but sometimes rewarding) task. There were a handful of folks - okay, probably a few handfuls, maybe numbering in the tens - who spent their free time doing real hacking. Those of us on the Mac side were busy poring over logs from Serial of Champions, reverse engineering the client-server communications. Through trial and error, we determined that every client request would send a two-character "token" and an argument to match. For example, double-clicking a message board to open it up might send the token "mB" with the message board's ID as the argument. Using the Keyword feature would send a Kk token, that's the only one I still remember for sure.

    We eventually compiled a list of the various "tokens" that made up the AOL protocol, and what they did. There was a developer's client extension that allowed for sending arbitrary token/args, and like most things inhouse, it was leaked to a few people. This gave some of us the ability to do things nobody else could. Way before AOL ever introduced "Mail Controls," for instance, we were able to reject mail from specified users. The feature had been built into the system from the beginning but had never been released to the public (IIRC, the then-system-devs didn't even know it was possible). We'd stumbled upon the feature by sending random tokens to the server.

    Here's a funny story about how something went from blackhat to implemented feature. At some point I discovered a token that would refresh the client's installed list of screen names. Basically, if you had AOL installed on multiple computers, or had multiple copies of the client on one machine, the list of your available screen names would inevitably become outdated across clients: if you created a new screen name on one client, then switched to another, the new name wouldn't show as a sign-on option. Likewise, if you deleted a screen name while you were logged in from one machine, that name would still (incorrectly) display as available on another machine. There was no way to synch up the list of names, so if you created screen name FoobarMan on machine A, the only way to sign onto it from machine B was to reinstall the client.

    Well, I found out that if you sent a certain token to the server, it would force a client-side refresh of the screen names on the sign-on list. Having legitimate access to publish things - did I mention I was not only a haxx0r, but also remote staff - I created a little form with a link that would send that token, thus refreshing the client's list of screen names. I passed it on to a TechLive friend who started giving it out to members who were having this (common) problem. Eventually someone inhouse got wind of it. I got reamed, my creation was removed, and a month later a shiny new feature appeared at keyword: NAMES... "Refresh Screen Name List."

    Go figure. :)

    Accessing member information is hardly anything new. AOL has a customer management system
    • Re:Same old same old (Score:5, Interesting)

      by fafalone ( 633739 ) on Sunday April 29, 2007 @04:26AM (#18917049)
      Well it sounds like I was in "the scene" a year or two after you. We took the token thing to a whole other level. Tokens are a small part of the scripting language AOL runs on, FDO. Thanks to some leaked internal documentation and lots of trial and error, a small group of us became quite good with FDO and could pretty much run amok among every resource on AOL. We wrote programs that automatically mapped the tens of thousands of objects; every mF token (forms), and my personal project, every eB token, which were the file libraries. Not only could a normal user invoke an eB token for a beta library, we could obtain staff only files too. The eB libraries didn't contain customer billing records, but they did contain internal operations documents, alpha release software, staff tools, and all sorts of other goodies. Mapping the tokens unleashed the real power of FDO; imagine having a list of every single window that made up the AOL software including ones you could not get to from a non-empowered account, and then being able to view the source code for that window and then having complete control of that code locally. While I wasn't involved personally, I believe one exploit that descended from that power was the ability to bypass the SecureID (a physical device with a code that changed every 60 seconds) of internal accounts by recoding the entry window to behave as if it was entered. And of course, countless ways to terminate or take over normal accounts and access billing systems (I never messed with anyone elses account or info, of course in part due to the legal risk, but mainly because I actually did have morals as a young teen, and I was in it for the challenge, knowledge, and yes the glory and fame that came with being among the first to harness the power of AOL's internal language, which made us the elitest of the elite among the AOL programmer/hacker kiddies).
      I won't go into much more detail, but good ole star tool (as it was called, adding a menu titled * that gave any account a direct interface to the internal FDO scripting) led to countless exploits for the small group of people able to take full advantage of it (i.e. it was significantly harder to interface with AOL through FDO than the Visual Basic programs everyone with half a brain flooded the scene with). Some of the more ambitious exploits made the news; I recall one time the leak of the next version of AOL months before it was even supposed to enter early beta got a mention in a major news outlet; while it wasn't me that leaked it, I was the one who found the eB library where it resided and passed along the token to those who did make it public. OpsSec (operations security, the highest level of AOL network security staff) knew us by name, and terminated my access more than a few times. It was really cool stuff, especially for a kid. I don't know if newer AOL software still allows clients to use tokens and other FDO code, or if AOL figured out how to secure privileged resources from those who could program in it, but back in the day security was so poor that our group of 10-13 year olds walked in and out of staff resources like they were our own personal playground.
      • Re: (Score:3, Interesting)

        by ShaunC ( 203807 ) *
        I think we were marginal contemporaries. If I have it right, y'all were doing "invokes" (like 32-41908) while the Mac side was busy sending token/args. Yes, I remember the * menu on WAOL. Its equivalent on the Mac side was the "Bullet Menu," named for the fact that instead of being a *, it showed up in the menu bar as a bullet (cmd-8 on a Mac).

        FDOs and atoms were the Windows side of things. Your mention of OpsSec brings up another anecdote. There was an internal account, "NOC Nodes," run by network ops. I o
        • Re:Same old same old (Score:5, Informative)

          by fafalone ( 633739 ) on Sunday April 29, 2007 @05:22AM (#18917263)
          First we documented all of the tokens with just invokes yes; but from there we went on to writing our own windows and modifying the behavior of existing windows, working with every part of the FDO stream, not just the token invokes. If I remember correctly, the invoke menu command was only for invoking mF tokens anyway. That's all people could do before my time, where learning how to use all the other FDO commands was made possible by a internal documentation of the entire FDO language, a large manual covered in "CONFIDENTIAL" and "INTERNAL USE ONLY" stamps. Just invoking an mF token for a form would display the graphics and such, but if you really wanted to do something worthwhile, invoking that token was only the start of a stream. FDO has hundreds of commands besides invoke; we figured out how to do entire streams using all the commands, atoms, etc. Too bad I'm traveling with my laptop right now, I have hundreds of custom FDO scripts and documentations in my storage archives back at home. But anyway, FDO was an entire language, invoke was just one command, once one knew the entire language a whole new world of possibilities opened up that you could never accomplish with a simple invoke. I'll share another OpsSec story. My account got terminated for no good reason, so I called up the support line (CAT i think) and asked to be transferred to OpsSec. I was told no such department exists. I asked to speak to a supervisor, since granted a low level support peon might not know about it. The supervisor also told me it didn't exist. I explained in great detail why I knew it existed, and was then told 'well, you're not speaking to them' and got hung up on. So I started digging around all the internal documents we had, and in a couple hours came up with a phone number for OpsSec. I called them up, and right after I said hello, they called me by my handle, told me my account was killed for hacking, and told me knock off the token scanning and stop harassing tech support. First time I ever talked to someone who worked for AOL that actually seemed like an intelligent person who knew what was going on, and how I found out the highest levels of the company were actually worried about what we could now do with FDO.
          • by ShaunC ( 203807 ) *
            Jesus H, at least I can tell you're the real deal. Now I'm going to have to go through every CD in my possession, looking to see whether or not I have some old backups of all the AOL shit. I'm fairly certain that it's all been lost to time (many priceless screenshots included) but damn if I could stumble across an archive.
    • Oh man, this is some good stuff. I'm gonna go read my programming books :).
    • I can tell you about a whole bunch of fun tokens. :P Is this AFC ShaunC and/or FiIe? wow.. memories.
  • A year or so ago, a relative had their credit card details "lifted" while conducting a transaction over the phone with $retailer. This only became obvious when his monthly credit card statement showed payments to AOL. He called the credit card company to get the payments stopped and refunded. This took place but AOL continued to take the payments. The police were asked to intervene, but even though AOL must have had an address linked to the card details (AOL accounts require a landline don't they ?) they cl

    • by cdrguru ( 88047 )
      Sorry, but this is a new feature with credit cards. Once a reoccurring payment has been authorized, canceling the card does not make it go away. You have to get the merchant (AOL in this case) to stop the charges.

      Why is this happening? Well, finally after taking up the back end for so long, merchants got their act together and got the credit card companies to accept this. It has nothing to do with your bank, it has to do with Visa, Master Card and the others. What this means is that you can't sign up f
  • So much for AOL's security ad campaign...
  • Well it is funny to see AOL is now increasingly going after these kinds of people. If you search the past news, you will find one or two other cases of this. However, this is going on much more than you think. Not to mention it has increasingly gotten harder to successfully conduct such attacks. AOL didn't even used to use SecurID or any other form of hard token to protect this sort of thing in the past. Now even with these sort of security measures in place, they are still getting beat up badly. If y
  • by Khyber ( 864651 ) <techkitsune@gmail.com> on Sunday April 29, 2007 @10:33AM (#18918545) Homepage Journal
    No wonder it's #1!!!
  • If he was doing it with script kiddie stuff then how many other "pros" are doing it and not getting caught?
    Has anyone seen a lawsuit where an user can sue AOL or some other corp for not adequately protecting their info? If it can be proven that the exploit was a known exploit then it seems to follow you could sue them for not protecting the info.
  • If this kid is such a "hacker" why the hell is he using AOL?
  • by mstahl ( 701501 )
    Why isn't this tagged 'pwnt'?

It is easier to write an incorrect program than understand a correct one.

Working...