Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security IT

Cryptome Hacked; All Files Deleted 170

eldavojohn writes "Over the weekend, the whistle blowing site Cryptome was hacked and vandalized, resulting in all 54,000 files being deleted and two days worth of submissions lost. Cryptome reported that its EarthLink e-mail account was compromised in ways unknown, and once the attacker was inside there, they were able to request a new password from the administration console for Cryptome at their hosting provider, Network Solutions. Once the attacker had that password, they deleted the ~7 GB of data that Cryptome hosted in around 54,000 files. Cryptome was able to eventually restore the site, as they keep backups ready for cases like this and stated that they 'do not trust our ISP, email provider and officials to tell the truth or protect us.'"
This discussion has been archived. No new comments can be posted.

Cryptome Hacked; All Files Deleted

Comments Filter:
  • Editing! (Score:4, Insightful)

    by GuJiaXian ( 455569 ) on Tuesday October 05, 2010 @05:46PM (#33800400) Homepage

    Holy cow, please edit the submissions before posting them.

    *sigh* I'll get modded down for having the nerve to ask for a baseline of professionalism, won't I?

  • ...what? (Score:4, Interesting)

    by blhack ( 921171 ) on Tuesday October 05, 2010 @05:48PM (#33800422)

    The real WTF here is that

    A) Cryptome is running on Network Solutions
    B) The email associated with the account is on *earthlink* ???
    C) None of these things have been shut down.

    Seriously, doesn't cryptome host some pretty shady stuff? On the same level as wikileaks, isn't it? What the hell is going on here?

  • Hmmm. (Score:2, Redundant)

    by Monkeedude1212 ( 1560403 ) on Tuesday October 05, 2010 @05:48PM (#33800424) Journal

    stated that they 'do not trust our ISP, email provider and officials to tell the truth or protect us.'"

    Just like I wouldn't trust you not to pull something like this for publicity's sake, but I guess in both cases, no one will ever know, so its moot.

    • Re:Hmmm. (Score:5, Funny)

      by hoggoth ( 414195 ) on Tuesday October 05, 2010 @06:08PM (#33800612) Journal

      > no one will ever know, so its moot.

      Oh Christ don't bring 4chan into this!

    • by interkin3tic ( 1469267 ) on Tuesday October 05, 2010 @06:08PM (#33800620)

      I'd expect that if it were a publicity stunt, they might mention a possible motive. As it is, I'd probably guess it's something like a bored teenager who was too lazy to scratch some vulgarity on a bathroom wall. Had they made even a tenuous conspiracy theory I might be more interested. Interested enough to click on over to cryptome anyway.

      Not to say that obviously this isn't a publicity stunt because it could have been done more effectively.

  • by longacre ( 1090157 ) on Tuesday October 05, 2010 @05:49PM (#33800440) Homepage
    Basically this stuff was never safe to begin with, and you're an idiot if you post anything there expecting to be anonymous.
  • by Local ID10T ( 790134 ) <ID10T.L.USER@gmail.com> on Tuesday October 05, 2010 @05:49PM (#33800444) Homepage

    Seriously, back up your data. Multiple copies in multiple locations.

    These guys were smart enough to keep backups (hopefully up-to-date backups) so this is nothing more than an annoyance to them, but if they hadn't it would be what we refer to around here as a resume-generating-event.

    If it's worth keeping, its worth backing up.

  • by LWATCDR ( 28044 ) on Tuesday October 05, 2010 @05:49PM (#33800446) Homepage Journal

    Your high profile site got hacked and you blame everyone else.
    Well you did pick your ISP and email provider. Honestly folks might I suggest RackSpace? We use them and they have been great if a little expensive but you get what you pay for.

    • by elucido ( 870205 ) * on Tuesday October 05, 2010 @11:42PM (#33803904)

      If the government wants to shut down a site they can probably do it. They'll just have one of their assets at earthlink or whereever handle it.

  • Not hacked! (Score:3, Insightful)

    by kju ( 327 ) on Tuesday October 05, 2010 @05:50PM (#33800454)

    The controversy about hacker vs. cracker is old and unsolved. But this case really does not warrant the use of the word "hack/hacked" under any meaning of the word whatsoever. This is a act of pure vandalism, nothing more.

    • by zzsmirkzz ( 974536 ) on Tuesday October 05, 2010 @05:57PM (#33800512)

      Cryptome reported that it's EarthLink e-mail account was compromised in ways unknown

      Sounds like hacking to me. The rest was exploiting the trust all providers build around your email being secure. All to pursue the end of simple vandalism.

    • by hedwards ( 940851 ) on Tuesday October 05, 2010 @06:24PM (#33800766)
      It's not unsolved, what's unsolved is the mystery of how to get people to get it right. Hacking is the generalized practice of modding things and coming up with clever technical solutions. Cracking on the other hand is applied hacking, as in applied to the practice of breaking into people's stuffs.
    • by hAckz0r ( 989977 ) on Tuesday October 05, 2010 @06:38PM (#33800922)
      Possibly. But lets not forget that erasing all files and logs is also a good way to cover ones tracks. If the intent was to do a DoS then it was quite effective, for a while.

      Its not as difficult as many might think to breach the security of a large ISP. Ask any Red Team. The IT personnel working there is probably mired by the tribulations of just trying to keep up with the little stuff, and haven't the time to build security in. Having a security 'plan' has little effect if your forward facing defence boundaries look like a piece of IP protocol Swiss cheese. It only takes one foothold inside that defence perimeter to make all the efforts of the entire IT organization look totally ineffective.

      The slash and burn technique serves to cover up all sources of incriminating evidence, and better yet, hides the true motivation of the attacker unless they actually take the time to leave a message behind. You are not likely to find a trail of breadcrumbs laying around if their intent was business rather than pleasure.

      • by azrider ( 918631 ) on Wednesday October 06, 2010 @02:24AM (#33804936)

        The slash and burn technique serves to cover up all sources of incriminating evidence, and better yet, hides the true motivation of the attacker unless they actually take the time to leave a message behind. You are not likely to find a trail of breadcrumbs laying around if their intent was business rather than pleasure.

        Oh, really? See The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (by Clifford Stoll) [amazon.com].

        • by azrider ( 918631 ) on Wednesday October 06, 2010 @02:45AM (#33805026)
          And for those who don't want to read the book, he used whatever dot matrix printers he had available. Remote syslog to a machine with WORM media works too.

          If you can't afford such writers, mount /var/log (or /var/adm depending on your system) on a remote with a different authentication with the directories as 500(-r-x------) and files as 300(--wx------) with a specific user for whichever syslog variant you use. Then chattr -i on the remote system so that the directory is immutable. On the remote system (if using rolling logs) don't forget to change the logrotate (or other appropriate cron configuration files)

          Works every time for system security stuff.

          You can tailor the logs for as much or as little as you need. Until the cracker can compromise your remote logging system (which should have different root passwords, no sudo/ssh credentials and no other rot access than the physical console), everything is recorded. Once it is cracked, you will know when it happened, because without the proper credentials on the logging system nothing can be erased.

          Tripwire/dnotify/inotify are your friends if you take the time to learn them and if you take the time to set them up properly.

    • by TheVelvetFlamebait ( 986083 ) on Wednesday October 06, 2010 @01:02AM (#33804524) Journal

      Maybe the word "sacked"?

  • Hack (Score:5, Insightful)

    by Stargoat ( 658863 ) <stargoat@gmail.com> on Tuesday October 05, 2010 @05:52PM (#33800472) Journal

    Is a social engineering attack a hack? It sounds like someone called over to EarthLink and got an e-mail password reset. Then, once holding the e-mail account, called over to Network Solutions. This sort of thing wouldn't be difficult at all.

    • Re:Hack (Score:5, Interesting)

      by zarozarozaro ( 756135 ) on Tuesday October 05, 2010 @06:11PM (#33800648)
      Mod parent up. A company I used to work for used Earthlink as their provider for everything (web, email, ISP). I pretty much had to take on the IT admin role there. They had lost all of their passwords and logins. I could not believe how easy it was for me to take control of everything in ONE DAY without even getting my boss on the phone with the support guy at Earthlink. Security at Earthlink is a joke. The support people there seem to choose one piece of your information at random to verify that you are the account holder. They will often ask you to tell them your password over the phone and other similar nonsense.
    • Re:Hack (Score:3, Insightful)

      by BobMcD ( 601576 ) on Tuesday October 05, 2010 @06:35PM (#33800876)

      Is a social engineering attack a hack? It sounds like someone called over to EarthLink and got an e-mail password reset. Then, once holding the e-mail account, called over to Network Solutions. This sort of thing wouldn't be difficult at all.

      FYI - 'Hacking' never is, never has been, and likely never will be. The kind of amazing tricks you're imagining under that term lie within the realm of security research, espionage, etc. 'Hackers' are, by definition, hobbyists, and hobbyists are generally doing it for the love of the game, for the fun of it, etc. The guys doing the stuff that might actually amaze you are being PAID to do so. Otherwise they'd give it up and move on to something easier, until such time as nothing easier actually exists. So you say that exploiting a social gap isn't '1337' enough to make the grade? How is utilizing a published Windows exploit any better? SQL injection? Nobody buy nobody is divining their own security-breaking code from tiny mystical oracles found at the bottom of Mountain Dew cans.

      In short, the movie 'Hackers' bears zero resemblance on reality.

      • by fostware ( 551290 ) on Tuesday October 05, 2010 @07:07PM (#33801298) Homepage

        In short, the movie 'Hackers' bears zero resemblance on reality.

        Huh?

        The bulk of the leadup to a hack involved sifting through logs, dumpster diving, and social engineering (like the eidetic memory delivery guy or asking A/H guy what the phone number was on the label).
        The fancy graphics and the ZOMG! 486! were all Hollywood, but there were some moments the scriptwriters didn't screw up beyond recognition.

        Besides, I still own my 'Man in a pink shirt' book ^_^

        • by inKubus ( 199753 ) on Wednesday October 06, 2010 @11:42AM (#33809276) Homepage Journal

          That movie is a great metaphor for the hacking scene in the 90's--a metaphor for how you might have seen it from your computer. Sure, the roller blades and VR goggles might be cheesy, but it really captures the essence of the scene, kids vs. the corporate hackers, money vs. punk liberalism. Still brings a smile to my face 10 years later.

  • by Demonantis ( 1340557 ) on Tuesday October 05, 2010 @05:59PM (#33800528)
    If "they" have the physical machine, they own your data. You have to live with the consequences of relying on that third party. Unfortunately that is how the internet and most of society works. We hope that there are mechanisms and governing bodies in place that are trustworthy and reliable.
    • by AHuxley ( 892839 ) on Tuesday October 05, 2010 @07:11PM (#33801350) Journal
      Yes unless you go for something like
      http://www.macminicolo.net/facility.html
      Send in x number of Mac Minis and load them with OpenBSD, Linux ect.
      • by X0563511 ( 793323 ) on Tuesday October 05, 2010 @09:23PM (#33802734) Homepage Journal

        That's called colocation, and it doesn't mean shit.

        Joe random tech can yank your drive, boot with an external kernel with init=/bin/sh or whatever, do nefarious things, put it all back up, and claim a power outage or whatever.

        Unless it's sitting in your facility or your access control (locked cage with no raised floor, you have only keys) then it isn't secured.

        Unless you use full disk encryption, in which case driving in to boot your servers will get old. IPKVMs or other workarounds = keylogger = pointless.

        I like your Mac bullshit too. Nobody uses Macs for hosting... they are too expensive for what you get. I think I've seen probably one, ever. I didn't even realize Apple made rackmount equipment before that. As well, anyone who knows what they are doing isn't going to put desktop-type equipment into a datacenter role... any time I've ever seen this it spelt nothing but trouble, and when trouble eventually came around, it was made evident the owner didn't have a damn clue as we had to do -everything- for them.

  • by cdrguru ( 88047 ) on Tuesday October 05, 2010 @06:06PM (#33800602) Homepage

    A professional organization that knows its web presence is its life is going to have a bit better setup than a server that someone else (Network Solutions in this case) has control over. The right solution is a co-located server that is controlled exclusively by the organization. The hosting company doesn't need to have any passwords. They are also going to have their email processed by their own server and not be relying on an ISP for anything at all except connectivity.

    However, a completely amateur operation is going to use shared virtual hosting because it is cheaper and the hosting company will be doing backups for them. And controlling passwords. And all other security. Oh, and using a non-domain based email setup from an ISP.

    I guess it is pretty obvious into which category Cryptome falls, right?

    Yes, it would cost $2000 a year or more for a co-located server whereas shared virtual hosting is dirt cheap.

    • by twoallbeefpatties ( 615632 ) on Tuesday October 05, 2010 @06:32PM (#33800816)
      [A] completely amateur operation is going to use shared virtual hosting because it is cheaper and the hosting company will be doing backups for them. And controlling passwords... I guess it is pretty obvious into which category Cryptome falls, right?

      Being a non-profit organizatino, Cryptome's status as a professional organization or an amateur organization probably depends on the size of their donation base. For a website group trying to get by on a shoestring budget... well, maybe this little stunt will help them raise awareness to get the donations for a better server setup. (Not that I actually know the size of their donation base, and maybe they do have enough money for that sort of setup and they're just stingy/stupid.)
    • by c ( 8461 ) <beauregardcp@gmail.com> on Tuesday October 05, 2010 @06:44PM (#33801016)

      Using virtual hosting might be intentional. A lot of people don't particularly like them. Including agencies of the US government. By running their site on a shared box with hundreds (thousands?) of others, they're a little more protected against the infamous "just take the whole server" attack. Also, it gives them more money to allocate to bandwidth costs, which as I understand it are pretty high.

    • by ducomputergeek ( 595742 ) on Tuesday October 05, 2010 @08:08PM (#33801978)

      Or in between. We have our servers managed by our hosting company. We don't have root control, but they maintain the PCI compliance and honestly we've not had a problem in years that wasn't solved in less than 10 minutes via phone. We have RAID 5, they do back ups, but we have back ups of the db and critical files done nightly and SFTPed to a box back at the office, which is then backed up to tape once a week and every monday morning that tape is taken to a safe deposit box at our bank. Every month we pull out a random tape and see if we can restore on a test system.

      But trusting your backups only to your hosting company is stupid.

  • Old school (Score:5, Informative)

    by 0xdeadbeef ( 28836 ) on Tuesday October 05, 2010 @06:08PM (#33800610) Homepage Journal

    Cryptome was cool before Wikileaks made it mainstream. And John Young is the original gangsta, so you know he got backups. Bitches don't know about all the backups he has.

  • by commodore64_love ( 1445365 ) on Tuesday October 05, 2010 @06:17PM (#33800708) Journal

    I once had an account with them, back in the 33k days. Also Erols. I guess these old services never truly die..... they just fade away.

  • by savanik ( 1090193 ) on Tuesday October 05, 2010 @06:23PM (#33800746)

    And Cryptome is now saying that a Wired reporter contacted them [cryptome.org] after having spoken with a hacker claiming responsibility for the attack.

    Which they responded to with a threat of a subpoena, and publishing news about it before the reporter, after they told the reporter they wouldn't? ... er. Way to burn bridges, guys? Seriously, I understand free speech and using reporters as sources, but I don't think reporters are going to be too gung-ho about reporting your findings later after this.

    • by RapmasterT ( 787426 ) on Tuesday October 05, 2010 @06:35PM (#33800862)
      Well, if someone told me they had knowledge of a person who had committed a very serious crime against ME, but were refusing to share that information with me, then I wouldn't honestly feel the slightest obligation towards them either. I'd tell them whatever they wanted to hear to get the maximum information out of them.

      AND I'd try to get that subpoena too. The First Amendment guarantees freedom of the press, but it doesn't guarantee freedom from subpoena. An ethical journalist would go to jail in contempt of court before giving up a confidential source, but since journalism has abandoned most of the principles of old, I wouldn't count on that happening.
      • and the crime against you will go unpunished

        i'm not saying that you have no right to seek out the information source about the crime against you, i'm saying your tactics suck

        what you do is you let the information source speak, and you ask the reporter for more information. you make up false reasons for why the information source is wrong, forcing the information source to prove they actually are genuine. or you keep them talking, until they make a mistake, and they reveal themselves

        you set a fire, and you smoke them out, THEN you pounce

        but if you run into the initial situation yelling subpoena, the source clams up, and your strong arm tactics only wind up hurting yourself, because now you can't hunt down the criminal

      • by arth1 ( 260657 ) on Tuesday October 05, 2010 @11:56PM (#33804040) Homepage Journal

        I'd try to get that subpoena too. The First Amendment guarantees freedom of the press, but it doesn't guarantee freedom from subpoena. An ethical journalist would go to jail in contempt of court before giving up a confidential source, but since journalism has abandoned most of the principles of old, I wouldn't count on that happening.

        This is Wired, who had no qualms ratting out the Wikileak's army informant.
        I'll be surprised if they haven't already finked on this guy too, unless it was one of their own or their chummies.

    • by russotto ( 537200 ) on Tuesday October 05, 2010 @08:34PM (#33802256) Journal
      The way Young reports it, he had the conversation with Zetter and _at the end_ she asked him to not report it. He responded "sure" but didn't say what tone of voice he used. She then pointed out that he always reported interviews, so it's clear she didn't really expect him to keep it quiet. I'm not sure why Young is so pissed at Wired. Just because the vandal went and bragged to them after the fact doesn't make Wired "complicit" as he claims.
    • by siddesu ( 698447 ) on Tuesday October 05, 2010 @11:19PM (#33803684)

      Cryptome.org's SOP is to report on all interviews, he's been doing that for ages now.

      From the interview, even the Wired clueless bimbo was aware of this.

      Knowing the SOP before you call a site about them being defaced, and still asking for exceptions while you hide the perpetrators of the defacement doesn't come across as building bridges to me.

    • by elucido ( 870205 ) * on Tuesday October 05, 2010 @11:45PM (#33803934)

      Who would have guessed? This isn't a surprise at all.

  • SSH FTW (Score:3, Interesting)

    by MichaelSmith ( 789609 ) on Tuesday October 05, 2010 @06:24PM (#33800762) Homepage Journal

    Its the only CMS I use on my servers. Mercurial for version control over ssh. Update my sites with hg push. Hooks on the receiving side to run hg up and rebuild if required. SSH can be configured to require certificates only for authentication. Desktop environments all integration with ssh-askpass or similar.

  • Well, it just goes to show you get what you pay for. From the point of view of security Colo is probably the best, but running a server on a static IP from home is likely the most cost effective. Virtual hosting is dirt cheap but worthless for any serious operation. VMs tend to be configured minimally and ISPs mash them all together using shared resources so performance is all over the place. It's pretty easy to brick an OS running in a VM due to the minimal memory configuration it is typically given.

    And backups... well, there are lots of choices there. There is no need to lose more than the most recent 60 seconds worth of modifications if you run a near-real-time streaming backup off the site. Something like DragonFly + HAMMER can do just that (and here is my unashamed advertising of DFly :-)).

    Also... only 8G of data? That's it?

    -Matt

  • by Arancaytar ( 966377 ) <arancaytar.ilyaran@gmail.com> on Wednesday October 06, 2010 @03:39AM (#33805240) Homepage

    Why not use Hotmail while you're at it.

    John Young is alleged to be paranoid as hell; no idea how something like this can happen.

  • by Logic ( 4864 ) <esm+slashdot@logic.net> on Wednesday October 06, 2010 @10:19AM (#33807866) Homepage
    ComputerWorld actually linked to Encyclopedia Dramatica? Yeah, this is going to go well. :)

All power corrupts, but we need electricity.

Working...