Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security

Anatomy of the HBGary Hack 220

PCM2 writes "Recently, Anonymous took down the Web sites of network security firm HBGary. Ars Technica has the scoop on how it happened. Turns out it wasn't any one vulnerability, but a perfect storm of SQL injection, weak passwords, weak encryption, password re-use, unpatched servers, and social engineering. The full story will make you wince — but how many of these mistakes is your company making?"
This discussion has been archived. No new comments can be posted.

Anatomy of the HBGary Hack

Comments Filter:
  • Mistakes (Score:5, Insightful)

    by codepunk ( 167897 ) on Wednesday February 16, 2011 @10:56PM (#35227974)

    But how many of these mistakes is your company making?

    Most companies probably make these mistakes, all except the biggest mistake which was poking a sleeping bear.

  • The real mistake (Score:5, Insightful)

    by Fex303 ( 557896 ) on Wednesday February 16, 2011 @10:58PM (#35227986)

    The full story will make you wince — but how many of these mistakes is your company making?

    Well, we're not going after 4chan/anonymous, so we're probably in the clear.

    I think the biggest security mistake it's possible to make is antagonizing the largest collection of bored hackers/crackers/script kiddies/associated hangers on that exists.

  • Incompetent (Score:5, Insightful)

    by Anonymous Coward on Wednesday February 16, 2011 @11:00PM (#35228002)

    I'm just amazed at how completely oblivious "Chief Security Specialist" Jussi Jaakonaho was during the email correspondence, AND that he was perfectly fine with sharing root passwords via plaintext email.

    How do these people even get security jobs and be negligent in even the simplest security practices?

  • And What's next? (Score:5, Insightful)

    by rueger ( 210566 ) * on Wednesday February 16, 2011 @11:06PM (#35228026) Homepage
    Gotta say, the linked article was a great education for me, one who's interested but never had time to dig into some of the arcana of stuff like SQL injection.

    In watching Wikileaks, OpenLeaks, Egypt, the Palestine papers,and now HB Gary, I'm thinking that we're at the edge of something monumental. I expect we'll see a lot more formerly secret data become public, and see governments and corporations either clean up their acts, or become increasing desperate and hostile in trying to keep their inside info secret.

    Either way we're in for a wild ride!
  • by NevarMore ( 248971 ) on Wednesday February 16, 2011 @11:17PM (#35228080) Homepage Journal

    I like the idea of a custom CMS to avoid an open one (more security).

    Its far easier to audit existing code than it is to build your own code. Even if you write it yourself you have to do the same auditing and testing that you would against an existing product.

  • by RelaxedTension ( 914174 ) on Wednesday February 16, 2011 @11:34PM (#35228158)
    They are the Tacoma Narrows bridge of the IT security world now. They will be the textbook case example of the generations of students, with the entire repertoire of what not to do every step of the way, especially the one about not pissing-off a malevolent, anonymous mass.
  • by jamienk ( 62492 ) on Wednesday February 16, 2011 @11:42PM (#35228204)

    A non-custom CMS like WordPress is very often the target of massive automated attacks: a new bug is discovered in WP and a tool is written to seek out vulnerable installations and exploit that bug. If you have the skill or $$ to pour over the code, you can probably find your own bugs before they become publicly known.

    On the other hand, if your site is specifically targeted, then your custom CMS is as vulnerable or more than the WordPresses out there. You might have a bit of security through obscurity (in a standard WP install, the attacker might know file names and locations, variable names, classes, etc.) but this will probably do you little good if you weren't able to harden the code.

    Lesson: you are screwed if a rich, powerful, or smart attacker singles you out. A standard CMS can land you in hot water if you don't have a knowledgeable person administering it (and who has that?).

  • by Greyfox ( 87712 ) on Thursday February 17, 2011 @02:43AM (#35229224) Homepage Journal
    I think the big one is my CEO ain't talking shit about a bunch of hackers who are better at it than him.
  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Thursday February 17, 2011 @04:25AM (#35229706)
    Comment removed based on user account deletion

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...