Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security The Military United Kingdom IT

Royal Navy Website Hacked, Passwords Revealed 114

An anonymous reader writes "The British Royal Navy's website has been suspended after a Romanian hacker exploited SQL injection vulnerabilities to gain access to the site. The hacker, named 'TinKode,' accessed usernames and passwords used by the site's administrators and published them on the web. TinKode's attack is 'particularly embarrassing for the British Ministry of Defence, as just last month protecting against cyber attacks was declared in the National Security Strategy to be a "highest priority for UK national security."'"
This discussion has been archived. No new comments can be posted.

Royal Navy Website Hacked, Passwords Revealed

Comments Filter:
  • by alen ( 225700 ) on Monday November 08, 2010 @11:46AM (#34161694)

    we had this happen a few times and every time you go back to the developers who coded the website they always complained how it would take them too much time to change the code. even though changing the database permissions would be a snap

  • Why !? (Score:1, Insightful)

    by Ddalex ( 647089 ) on Monday November 08, 2010 @11:50AM (#34161724)
    I don't understand why people need to deface sites just to show ... what ? their skillz ? the poor security of the website ?! This is beyond childish, and the "authors" are probably no more than script kiddiez. As tinKode points out on his site, he wants to drive attention to security problems. In fact, if he wanted to do only that, he could privately inform the site owners about the problems he sees. He could make his own security company, and make some nice bucks out of doing this specific job he seems to enjoy. But what he does now is no better than hooliganism, and I hope he will be tracked and serve some sentence for defacing of private property or anything similar.
  • Meh (Score:3, Insightful)

    by Timmmm ( 636430 ) on Monday November 08, 2010 @11:53AM (#34161768)

    Embarrassing, sure. But it's just their website, and doesn't justify spending £500m on fighting "cyber-terrorism". By the way does anyone know what the £500m will actually be spent on? It *should* be spent on researching secure systems like BitC, SELinux, stack protection and so on. I bet it isn't.

  • by mangu ( 126918 ) on Monday November 08, 2010 @12:02PM (#34161842)

    I don't understand why people need to deface sites just to show ... what ?

    They do it just to show how ignorant are the people who are supposed to manage those sites.

    The Royal Navy used to be the defense of the UK against invaders. They were supposed to fight to the end, to resist against everyone. Yet, nowadays, some script kiddie is able to defeat the Royal Navy from his mom's basement? WTF???

    The message is that the sites can be defeated very easily, that's all.

  • Re:Why !? (Score:5, Insightful)

    by phyrexianshaw.ca ( 1265320 ) on Monday November 08, 2010 @12:02PM (#34161846) Homepage
    Have you ever found a glaring security hole in a major website for a major company?
    do you know how hard it is for somebody to even begin reporting something like that?

    if you are a young adult (aged 12-24) and you find a security hole, do you know how few people will take you seriously? it's amount to telling your teacher there's a problem in every copy of a textbook: they'll just laugh at you and tell you "you just don't know any better".

    Yes, I completely agree that there ARE BETTER WAYS to disclose: but by not making them easy enough for a youngster to understand: you prevent people from reporting in the first place.
  • Re:Why !? (Score:5, Insightful)

    by Monkeedude1212 ( 1560403 ) on Monday November 08, 2010 @12:07PM (#34161900) Journal

    By making a public display of low security standards - you impact more people.

    Could he have told the ONE administrator of the site about the vulnerability, and HOPED that the Sysadmin would take the time out of the day to fix it - and not completely disregard his advice? Yeah, he COULD have done that, but that doesn't guarantee results or get the message to as many people.

    Don't get me wrong, we just had to deal with the hooligans ourselves in my company, and it is a bit of a piss off to have to deal with it. However, I can say for a fact we're much better with our security standards now than we ever were before. And on top of that - anyone who finds out might think "Jeez, that kind of stuff is on the rise, maybe I should get to that update I've been sitting on".

    It sucks if it happens to you - but its one of those things that seems necessary to keep things in line. I'd rather we be too secure as a society as opposed to being all willy nilly.

  • Re:Oh Noes (Score:4, Insightful)

    by tlhIngan ( 30335 ) <slashdot.worf@net> on Monday November 08, 2010 @12:20PM (#34162052)

    A useless PR website to a government agency was hacked! This is like when the RIAA home page gets hacked. No operations were actually effected, because no one goes there anyway. No shut down the email servers, thats something else.

    You're assuming that no one ever puts anything else up in a hidden directory on a website, do you? Just because it's a fluff website doesn't mean there isn't anything else behind those pages. At the very least, an exploited script could be running a simple fileserver on it for dropping off warez and pr0n and other stuff. Hell, the webmaster and his friends might've put up files there on behalf of some higher up who needs a large file sent somewhere.

    Wasn't there that funny anti-piracy site that was DoS'd and ended up revealing a pile of hidden files containing emails and such?

    You might think that such entities would use super-secret encryption and file transfer methods, but you'd be surprised to find out most still use common FTP and HTTP.

  • Re:Why !? (Score:2, Insightful)

    by ArsenneLupin ( 766289 ) on Monday November 08, 2010 @12:29PM (#34162142)

    if you are a young adult (aged 12-24) and you find a security hole, do you know how few people will take you seriously?

    And when they do eventually take you seriously, they will take you way to seriously by threatening you with jailtime etc.

    Better avoid all risks, and anonymously hack their site via tor or an open Wifi.

  • Re:Why !? (Score:3, Insightful)

    by Aceticon ( 140883 ) on Monday November 08, 2010 @12:39PM (#34162288)

    This being the UK, if you find such a hole in a government website and report it you're likelly to end up in prison accused of terrorism.

    Seriously, they've used the Anti-Terrorism legislation to detain a pensioner who shouted "nonsense" at the labour party conference: do you really think they would not do whatever it took to shut somebody that found such a hole up to avoid the embarassment? The whole purpose of these without-court-order-laws is exactly to be unrestrained tools of state power ...

    Nah, your're better off anonymously outing this hole or keeping your mouth shut while foreign powers get to exploit whatever they can from it at will.

  • by ghjm ( 8918 ) on Monday November 08, 2010 @12:41PM (#34162310) Homepage

    The point is that someone probably already has.

  • by IshmaelDS ( 981095 ) on Monday November 08, 2010 @01:19PM (#34162796)
    "it would take them too much time to change the code...that should have been coded properly to begin with." Fixed that for you.

Saliva causes cancer, but only if swallowed in small amounts over a long period of time. -- George Carlin

Working...