Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security

Some Companies Don't Care about Web Defacement 217

An anonymous reader sent in an interesting link to a story that talks about companies that just Don't care about Defacement. The story is just a light think piece worth a glance. And hell, its the holidays so its not like anything else interesting is gonna turn up to read for a few days :)
This discussion has been archived. No new comments can be posted.

Some Companies Don't Care about Web Defacement

Comments Filter:
  • L33t h4x0rs may claim in court "See, most companies don't care. It's just a web page!" But if a company should choose to care, they can now make a lot of legal hassles for the skript kiddie in question.

    So, be warned: depending on who you hack, you might get away with it, but you might not.

    John

  • Sounds familiar... (Score:5, Interesting)

    by Chuck Milam ( 1998 ) on Thursday December 27, 2001 @09:53AM (#2754724) Homepage
    Gee, this sounds just like a certian company I work(ed) for. They were getting all proud when they bought a package that detected defacements and automatically copied a "known good" version of the web page back in place. Of course, I'm kind of a low man on the totem pole, so my idea of plugging the security holes, so there's no defacement in the first place has yet to make it past my next-level management.
    • So, is that package hacked yet? :)
  • by ZaneMcAuley ( 266747 ) on Thursday December 27, 2001 @09:54AM (#2754728) Homepage Journal
    Run a regular checking task on the web server content and if that changes, restore the original from a stored copy.
    • Yeah, like, check your house contents regularly and when they get stolen, replace them!
    • Re:Simple solution (Score:2, Interesting)

      by LinuxHam ( 52232 )
      How about running web servers booted off cd-rom getting all of their content dynamically by calling java servlets against a remote machine using the secure xfer methods covered in yesterday's secure credit card transfer discussion?

      Something like a serial cable into the "servlet server" with a non-TCP/IP listener on the serial port. At max speed 115KB serial is like a 1Mbit connection. The web servers won't have IP access to the content server, and can't be defaced. Don't have to care about snort logs, tripwire -- all that happy hoo ha.

      Want to run a bunch of web servers for load balancing? put an 8-port digiboard in the servlet server.
      • What about the cache?

        Deface the cached content.
      • Re:Simple solution (Score:5, Insightful)

        by Hiro Antagonist ( 310179 ) on Thursday December 27, 2001 @10:28AM (#2754813) Journal
        How about running web servers booted off cd-rom getting all of their content dynamically by calling java servlets against a remote machine using the secure xfer methods covered in yesterday's secure credit card transfer discussion?

        There are a couple of good reasons why this unlikely to be a workable solution. First, this requires almost double the equipment (a two-tier minimum), and it requires the front-end servers to have some type of read-only storage, which most server appliances (like the Netra X1) don't have.

        Second, keeping the systems patched and up-to-date (which will still be imporant) is even more of a chore, as you can't just install patch foo -- you need to install the patch on a clean system, make a bootable CD, and then go physically insert the CD and reboot the machine to install the patch. In terms of administrator time, this is completely unacceptable.

        Third, it requires that you use JSP (and possibly EJB); things like PHP and Perl won't work with this kind of set-up. As nice as JSP+EJB can be for building complex and stateful web applications, it's really lousy for doing simple things like customer-feedback forms and the like.

        Fourth, the applications on the second-tier server are still open to exploit, as is the OS on the external server -- it's possible to crack and root a machine even if it has a read-only root filesystem.

        Fifth and finally, it completely violates the KISS principle (Keep It Simple, S*). More machines means more overhead for the admins, higher operating costs; and, most importantly, a more complex system. One of those little rules-of-thumb is that the more complex a system becomes, the more easily it will fail.

        Something like a serial cable into the "servlet server" with a non-TCP/IP listener on the serial port. At max speed 115KB serial is like a 1Mbit connection. The web servers won't have IP access to the content server, and can't be defaced. Don't have to care about snort logs, tripwire -- all that happy hoo ha.
        Want to run a bunch of web servers for load balancing? put an 8-port digiboard in the servlet server.


        I fail to see where a 115Kb/s serial connection is equal to a 1Mb/s link; I would suggest checking the numbers again, as I'm pretty sure that the latter is about ten times as fast as the former, and requires less processor overhead -- serial connections consume much more CPU time than ethernet ones.

        Snort and tripwire are very useful tools, and whether or not you have a "secure" setup, it's a good idea to run them. Snort [snort.org] is an extremely capable IDS (Intrusion Detection System), and if your uebersecure system is cracked, can provide valuable logs to find the attacker (and the original security hole). Furthermore, it's always a fun thing to watch the IIS exploit attacks pile up against your smug little Apache server...

        HTH. HAND.
        • Re:Simple solution (Score:4, Insightful)

          by LinuxHam ( 52232 ) on Thursday December 27, 2001 @10:59AM (#2754899) Homepage Journal
          Hiro, nice shredding!

          this requires almost double the equipment (a two-tier minimum)

          you normally have 3 tiers in professional ebusiness configurations. web servers, business logic, and database servers.

          patch a clean system, make a bootable CD, and insert the CD and reboot the machine. this is completely unacceptable

          I think we're looking at it from two different angles. You appear to be approaching it from a datacenter admin point of view, like a Qwest rack monkey watching 1,000 servers. My approach imagines an admin with about 20 servers for one e-business/e-commerce solution. If it's one guy's job to keep maybe 8 web servers, three or four servlet engines, and four database backends running, then occasionally publishing a new CD for the web servers is not "completely unacceptable". Plus, with multiple servers, you design one clean layout, burn 8 CD's, and reboot the web servers one at a time so the site never goes down.

          the second-tier server are still open to exploit

          if there is no IP connectivity from the web servers to the 2nd and 3rd tier, how are you going to get there? the web server would submit an ascii url to the servlet engine, and the servlet engine would reply with the content, also over serial. the web clients won't even have access to sending url requests over the serial line. even if they crack the box, LIDS will let you specify precisely which apps/binaries can use the serial port.

          it's possible to crack and root a machine even if it has a read-only root filesystem.

          www.lids.org - can't get root if root isn't even root

          I fail to see where a 115Kb/s serial connection is equal to a 1Mb/s link

          you're right. I'm an idiot. Need more coffee. that makes the whole thing too slow for anything over 128k upstream.

          One of those little rules-of-thumb is that the more complex a system becomes, the more easily it will fail.

          that of course depends on how well you plan and implement.
          • Re:Simple solution (Score:4, Insightful)

            by Hiro Antagonist ( 310179 ) on Thursday December 27, 2001 @11:58AM (#2755105) Journal
            Hiro, nice shredding!

            Thank you; and double thanks for taking it well and coming up with a good rebuttal. So rare on /. these days...

            you normally have 3 tiers in professional ebusiness configurations. web servers, business logic, and database servers.

            This is true with JSP-based system (JSP+Web to EJB to DB), but often smaller setups are done with Perl or PHP in a two-tier system (Web+PHP/Perl to DB) that work quite well.

            You are quite correct, however, in that most large installations use the three-tier model.

            I think we're looking at it from two different angles. You appear to be approaching it from a datacenter admin point of view, like a Qwest rack monkey watching 1,000 servers. My approach imagines an admin with about 20 servers for one e-business/e-commerce solution. If it's one guy's job to keep maybe 8 web servers, three or four servlet engines, and four database backends running, then occasionally publishing a new CD for the web servers is not "completely unacceptable". Plus, with multiple servers, you design one clean layout, burn 8 CD's, and reboot the web servers one at a time so the site never goes down.

            Speaking as a sysadmin, keeping one Unix admin around per twenty servers will get very expensive. One Unix admin can handle about fifty machines, assuming they were properly set up and documented to begin with.

            Furthermore, one of the big advantages to running a Unix machine for things like this is that you don't need to physically interact with the hardware; for example, I can leave several "extra" Sun Netra X1 server appliances sitting in a rack, powered off, and if one of the production machines fails, I can remotely power the unit on, load an operating system on it (via Jumpstart, or just using dump and netcat), boot it, and configure it to take the place of the now-dead server (which I have powered off remotely). All without leaving my desk (or armchair if I'm telecommuting). I can then replace the dead server at my leisure.

            Same goes for patching; I can bring a spare server online, bring the old server down to single user mode, and use the serial console to load patches and updates, all without having to drive over to the colocation facility.

            if there is no IP connectivity from the web servers to the 2nd and 3rd tier, how are you going to get there? the web server would submit an ascii url to the servlet engine, and the servlet engine would reply with the content, also over serial. the web clients won't even have access to sending url requests over the serial line. even if they crack the box, LIDS will let you specify precisely which apps/binaries can use the serial port.

            Point; but giving that serial links aren't sufficiently fast, it's a moot point at best.

            you're right. I'm an idiot. Need more coffee. that makes the whole thing too slow for anything over 128k upstream.

            Happens to all of us. And I think I'll get more mud myself...

            that of course depends on how well you plan and implement.

            Not really; a more complex solution offers more total points of failure; even a well thought-out and well implemented solution is subject to this simple fact.
        • Why does that need JSP or EJB? What are these things doing in such a simple server that something else can't do? And why not just run the web server in a jail, virtual machine, vserver, or whatever?

    • Re:Simple solution (Score:2, Informative)

      by liquidsin ( 398151 )
      that's a great idea to replace the original data, but once your above-average script kiddie figures out that the page he just 0wn3d resets itself to normal 5 minutes after he h4ck3d it, he may just be smart enough to go after your monitoring software. or crash the box. or find the original data that's being used for backup, and replace it. and it doesn't even touch the problem that once a hole is found, it's there until you patch it. the 'simple solution' is to check your logs, find the hole, and patch patch patch. maybe these companies will start to care when somebody makes it through to the database servers that they thought were bulletproof. if the web defacement you don't care about turns out to be a listing of your customer credit card records, you may suddenly find yourself caring.
  • Palmstation (Score:3, Informative)

    by Col. Klink (retired) ( 11632 ) on Thursday December 27, 2001 @09:58AM (#2754737)
    PalmStation [palmstation.com] doesn't appear to care. They've had this up at least since Christmas.
  • Cost Justification (Score:3, Insightful)

    by wayn3 ( 147985 ) on Thursday December 27, 2001 @09:58AM (#2754738)
    Odd as it may seem, some companies cannot afford to pursue prosecution. They would have to pay several thousands of dollars of lawyer time and system administrator/security administrator time to preserve the evidence and litigate.


    What I can recommend to each SlashDot reader is to ask for your company's policy towards hacks and intrusions. It should be concise, clear, and objective. This way there will be no suprises, and the System Admins will know what to expect and not be punished for misunderstanding the policy.

  • I hear all this talk of MS being the problem, but they release patches.

    A patch not applied is as good as no patch at all.
    • Re:Patching (Score:2, Informative)

      Untill the bad press of late, M$ didn't release timely patches to problems. This was especially true if the application package with the coding error wasn't the absolute latest one out. They still don't want to really do the right thing. I really hope they get hauled over the coals for their latest major fuckup.
  • by rmadmin ( 532701 ) <{rmalek} {at} {homecode.org}> on Thursday December 27, 2001 @10:00AM (#2754742) Homepage
    I knew a kid in high school that stumbled onto a permissions mistake or something along that lines, he backed up the html, threw up a defacement, and went 'Hahahaha'. A week later the FBI was trying to put the smackdown on him saying that 'By defacing the (Small, 200 customer) ISP's webpage he caused them $17,000 in business and damages'. So a small ISP like that loses $17,000 in business in 4 hours? Unlikely... So does that mean when someone DoS's my workstation and I can't access apache from home for more than 15 minutes I've lost $1062.50?

    • by Anonymous Coward
      That's just the way the feds work.
      It's similar to drug busts. You read about the
      cops catching someone with 2 pounds of marijuana, and the papers say "Street value of 30,000", when we all know better.
    • So a small ISP like that loses $17,000 in business in 4 hours? Unlikely...

      Ha ha ha! If they would have let this kid deface thier page 24/7 for a year, they would have lost 37,230,000! Probably more than thier entire net worth...

      Even if they were an expensive ISP, like say $100 a month. at 200 customers, they can only rake in a *maximum* of 240,000 a year... By my cont, it would have taken this kid a little bit over 56 hours days to completely put them out of business...
    • by dillon_rinker ( 17944 ) on Thursday December 27, 2001 @02:30PM (#2755586) Homepage
      My ISP business website has been defaced.

      (1) Obviously, there's a security breach. How widespread is it? We need to audit the network and see how severe the breach is and what hole was unpatched. I've got to put either employees or consultants onto it.

      (2) We can't trust any code on our network, so the other copy of the web site on this other server may be bad, too. We'll have to check that against a known good copy, which means looking at our backups. Really, we need a known-good historical copy, too, just to be sure, so we've got to pull our off-site backups of the web site from records management vendor.

      (3) One of our business clients saw the defaced web page and decided that they didn't trust us to protect their data. They will no longer do business with us. We have lost all of the income they would have provided forever.

      (4) As part of our immediate security response, we had to shut down briefly. If someone had hacked our server, they might be trying to punch through to our client machines. Not a huge deal, but we had to issue a month's credit to everyone who complained about being unable to connect.

      Add together 1-4, and I think you could easily come up with $17,000. Think about 2-3 net admins + 1 security consultant doing security cleanup for a week.

      So does that mean when someone DoS's my workstation and I can't access apache from home for more than 15 minutes I've lost $1062.50?
      No, because you are not a business concern. Note that the four hour downtime doesn't mean that all the costs were incurred in that four-hour timeframe. The ongoing security audit that becomes necessary in the event of a hacked server could have gone on for a week.

      Are the figures inflated? Possibly. Did the idiot cost the business money? Certainly. Is the FBI playing hardball with the idiot who did it? Undoubtedly. You seem to be missing the point that your friend shouldn't have done it; instead, you are whining that the FBI talked mean to your friend.
      • by gnovos ( 447128 ) <gnovos.chipped@net> on Thursday December 27, 2001 @03:00PM (#2755730) Homepage Journal

        My ISP business website has been defaced.

        (1) Obviously, there's a security breach. How widespread is it? We need to audit the network and see how severe the breach is and what hole was unpatched. I've got to put either employees or consultants onto it.


        No, this is just a shifted cost. Since you DIDN'T pay to secure your network at the beginning (either through poor-quality admins or by not paying for intrusion detection tools, whatever), you are paying now. This is not a cost that you are suddenly having to pay, this is a cost that you didn't pay in the past when you should have. If a resturant decides that they don't want to pay for a new oven, does that mean that the fire inspector "costs thier business" when he says it's out of code and needs to be replaced?

        All of your arguments stem from the same problem. If you are going to base things on your security and up-time (such as your policy to pay back a month's salary to those who couldn't connect), then you had better damn well make sure that you *won't be going down*. If you have a business model *based* on security then you can't *skimp* on security, it's common sense.
        • No, this is just a shifted cost. Since you DIDN'T pay to secure your network at the beginning (either through poor-quality admins or by not paying for intrusion detection tools, whatever), you are paying now.

          Sorry, but in this case you're wrong. I should have mentioned sooner that my ISP has excellent security policies and procedures. The original poster noted that his friend found a mistake in the permissions. You can have the best security system and policies in the world, but they are administered by people and PEOPLE MAKE MISTAKES. There's nothing you can do about it except deal with it and move on. However, when a breach does occur (and it will)*, it is a good idea to analyze what happened and see how bad the breach is. Is it merely the replacement of an HTML page, or is the page replacement merely a symptom of having been rooted?

          We spent good money on our people and our systems. One of them made a mistake, and a skript kiddie took advantage of it before we discovered it (that's the joy of the internet - there are so many skript kiddies you have no margin for error; default installs last, what, four hours before they're hacked?). We spent money recovering from our mistake, and granted it was our mistake, but the fact that someone took advantage of it forced us to spend a lot more money determining exactly what happened.

          Is this likely what happened in the original poster's situation? I don't know. It's entirely possible (more likely, in fact) that the situation is as you describe. My point is simply that even a small internet-based business (like an ISP)could easily have costs in the range of $10K-$20K as a direct result of a hack, even one as simple as a web-page defacement, because you don't know if that's all it is until you've paid someone to look at it really carefully.

          *No system is completely hackproof. If someone says "System X has never been hacked!" I would interpret that as meaning either the system is very young, or the person talking to me is a moron who can't recognize an intrusion.

          • Sorry, but in this case you're wrong. I should have mentioned sooner that my ISP has excellent security policies and procedures. The original poster noted that his friend found a mistake in the permissions. You can have the best security system and policies in the world, but they are administered by people and PEOPLE MAKE MISTAKES. There's nothing you can do about it except deal with it and move on. However, when a breach does occur (and it will)*, it is a good idea to analyze what happened and see how bad the breach is. Is it merely the replacement of an HTML page, or is the page replacement merely a symptom of having been rooted?


            A breach occoured becuase of either a lack of imagination on the part of the admins or a lack of dedication on the part of everyone. How hard is it really to put all of the system files on a un-alterable partition. It could be something like a CD, or simply cutting the black wire on the back of a hard drive and replacing that with a switch. When it's "on" you can write to the drive, and when it's off you physically can't. Sure, you need to write to some things, like log files and data stores, but when do you ever need to over-write 'ps' or 'login'? If these programs are being stored somewhere that they cannot be tampered with, then you are 90% safe already. Even with a wide-open system, you are still safe, since the only damage that can be done is to your data, which is being backed-up hourly right? How often does a small ISP need to update customer data? You could even put that data on the unwriteable drive and only change it once every few months or whenever a customer calls in to change his billing address or whatever.


            We spent good money on our people and our systems. One of them made a mistake, and a skript kiddie took advantage of it before we discovered it (that's the joy of the internet - there are so many skript kiddies you have no margin for error; default installs last, what, four hours before they're hacked?). We spent money recovering from our mistake, and granted it was our mistake, but the fact that someone took advantage of it forced us to spend a lot more money determining exactly what happened.


            All well and good, but like you said in your pervious post, you were basing a core component of your business on *not making mistakes*. You were paying back the customers an entire month of service if they could not connect. This policy is of your own choosing, so you have to live with it. If the power company is going to charge me for electricity, they actually have to provide electricity to me. If I order a pizza, I will *not* pay for it if it never gets delivered. If you are going to promise your customers 100% uptime, then it is your burden to deliver it. If someone gets into an accident with the pizza man's car on his way over, that guy is *not* responsible for paying for the undelivered pizza.


            Is this likely what happened in the original poster's situation? I don't know. It's entirely possible (more likely, in fact) that the situation is as you describe. My point is simply that even a small internet-based business (like an ISP)could easily have costs in the range of $10K-$20K as a direct result of a hack, even one as simple as a web-page defacement, because you don't know if that's all it is until you've paid someone to look at it really carefully.


            Where is this money coming from? You are already paying your admins (I hope), so why do they have to get paid again? Are you outsourcing "security consultants"? If so, then why didn't you call them in *before* you had a problem? That is what I mean by shifted costs. Since you didn't pay a security consultant to secure and test your netowrk before you started, you are paying for it now.


            *No system is completely hackproof. If someone says "System X has never been hacked!" I would interpret that as meaning either the system is very young, or the person talking to me is a moron who can't recognize an intrusion.


            This is a cliche and wrong. There are many "hack-proof" systems, but you probably won't buy them in a shrink-wrapped box. They are dedicated systems that serve specific purposes and are written by people who take security into account from the ground up, not as an after-thought when the system is "finished".
      • (3) One of our business clients saw the defaced web page and decided that they didn't trust us to protect their data. They will no longer do business with us. We have lost all of the income they would have provided forever.


        Erm..who's fault is that? You obviously did have poor security.


        Companies complaining that a cracker made them look bad are idiots, as is anyone who listens to them. If a company can't do what it's being paid to do, it may hurt the comany when it comes out, but tough shit. If Brinks trucks started getting defaced while there are supposed to be armed security guards inside, does Brinks deserve any sympathy? No, the defacers deserve a round of thanks as we all leap to using another armored car company.


        I usually don't defend crackers, but saying 'they made the company look bad, and thus cost money' is the dumbest thing I've ever heard. Of course the company looks bad, it can't secure its network, which is hardly the cracker's fault!

        • If you drive a truck through the plate glass window at the front of my retail shop and kill a couple of customers and trash all my inventory and I look like a complete schmuck, whose fault is it? You seem to be implying that it's mine because I didn't have reinforced steel and concrete posts in front of the shop. After all, everyone KNOWS that glass can't keep out trucks, and everyone KNOWS that there are drunks out there who can't drive (and some of them own trucks), and everyone KNOWS that an 8-inch-diameter steel pipe filled with concrete and rebar can be set in the sidewalk to keep trucks out. Therefore, everything is my fault, right?

          Just because there's more that I could do to prevent crime from affecting me doesn't mean that I am at fault when someone else commits a criminal act that I COULD have protected against.
  • Some people don't care enough about their stuff to lock their doors at night. Or more to the point, they don't care until someone breaks in late one night and kidnaps their wife or something worse.

    I bet these companies will start caring pretty damn quick once their web server is 0wn3d and used to DOS whitehouse.gov or something. If I'm an admin at a company with this kind of policy, I'm updating my resume as of right now, cause you know who the hammer's going to land on when the shit really hits the fan.
    • I think thats a real good point.. these companies put up this bravado 'we dont care' whilst the system admin is having a nervous break down because now every two-bit hacker wants a go at taking down their site.

      Why do non-technical people always come up with the 'great' ideas for things like this :)
    • IANAL, but I know about CYA...

      If you work for a place like this, send your concerns to up the chain of command... IN WRITING... IN HARDCOPY. Insist on hardcopy response, and keep copies of all such communications offsite, where you can get at them, but the company (in an attempt to create plausible deniability) can't.

      Then, when they try to nail your ass to the wall, you can show that you wanted to fix it, but were overruled.
  • lets collect statistics.
    who hosted the website, how many websites defaced that were hosted that that particular company/individual and not use their services.
    they will wake up really quick as to how the world turns, when they are administering a standalone dos machine in the basement.
    defacement IS a problem, havent we learned enough in the past when companies are scrambling to find out if the credit information of customers was compromised?
    funny how many 'lazy' admins we have out there.
  • Dead On... (Score:5, Interesting)

    by Bonker ( 243350 ) on Thursday December 27, 2001 @10:04AM (#2754752)
    Sayeth the article:

    What I am speaking of is investigating and prosecuting the criminal element involved in the act of defacement, root compromise or infection by "worms". In otherwords, companies tend to "fix & forget".

    Actually, this is probably the stance that every serious IT department out to take. If your website was cracked, then it's almost certainly *your* fault your server was compromised. There just aren't any rootkits out there that don't exploit known buffer-overflows or other bugs. There are a few situations when this is not the case, but it's usually still someone sitting around testing a web application (like Slashcode) for buffer overflows or back doors.

    Even if you do prosecute, it's like stomping cockroaches. There will just be more, and if you hadn't left the food out on the counter to rot, they wouldn't have come to your apartment in the first place.

    Finally, there's the human element to contemplate. We all did stupid stuff when we were kids, which most website vandals are. I don't know any kid who didn't tresspass or vandalize property at least once during their youth. For many, it was the old junkyard or the cemetary. For these kids, its websites. Are you really going to put them in prison for decades because they're young and stupid? You might as well ruin their lives for experimenting with drugs or sex....

    Oh wait. We do that too. Nevermind.
    • Waah waah waah. I want to break into other people's systems. If they didn't want me running around in their computers, they would have patched their systems. If they didn't want me running around in their houses, they would have put bars on the windows and a security guard at every door. If they didn't want me driving their car, the would have it locked in a steel safety cage. If they didn't want me screwing their wife, they'd have her chained to the stove.
      Bitch, you break into my computer, I will press charges, I don't care what patches I've neglected, nor do I care what clildish prank you are playing. Just because I forgot to lock my door doesn't mean I've invited you into my house. Unauthorized access is just that, unauthorized. Once little shit 'kids' recognize that every computer connected to the Internet isn't put there for you to hack into or DOS, the world will be a much better place.
      • Re:Dead On... (Score:4, Insightful)

        by Bonker ( 243350 ) on Thursday December 27, 2001 @10:50AM (#2754865)
        Just because I forgot to lock my door doesn't mean I've invited you into my house. Unauthorized access is just that, unauthorized. Once little shit 'kids' recognize that every computer connected to the Internet isn't put there for you to hack into or DOS, the world will be a much better place.

        Hmmm.... No, but you're pretty stupid if you don't lock your door... or replace your locks if they're recalled.

        You're not considering the relative seriousness of the crimes here. If someone breaks into your house and steals your stuff or kills your pets, then yeah, you wanna press charges. If they spraypaint or break your windows... maybe.

        How about if they stomp your flowerbeds? Or rearrange your rock garden to spell out dirty words? How about if they egg your door or toliet-paper your trees?

        You need to think about that, because that's the mental level that most kids who vandalize websites are working on. (Show me a person who's never done at least one of these things, and I'll show you someone who was very sheltered as a child.) They're not hurting anyone, at least in their own minds. They're doing the equivalent of dropping a big nasty stink-bomb on your front porch.

        You don't put kids in prison because they're being mischevious, regardless of what John Ashcroft tells you. You tell them that what they were doing is wrong, give them incentive not to do it again, and then let them get on with life.

        Unfortuneately, police don't have the option of giving script kiddies a 'firm talking to', since any kind of computer crime has been labeled 'terrorism' by both our corporate oligarchy and our reactionary government.
        • Re:Dead On... (Score:2, Interesting)

          by 13013dobbs ( 113910 )
          How about if they stomp your flowerbeds?
          If I paid money for those flowers, yes. Just because something has no value to you, it doesn't mean it has no value to the owner.

          Or rearrange your rock garden to spell out dirty words?
          You will find that people may not want to go to a store that has "Fuck off and die" spelled out on their front lawn. Lost customers == lost $$$.

          How about if they egg your door or toliet-paper your trees?
          I would expect them to pay for the clean up, or for them to do it themselves.

          You need to think about that, because that's the mental level that most kids who vandalize websites are working on.
          Like I stated above: Just because something has no value to these 'kids', that does not mean it has no value to the owner.

          • I would expect them to pay for the clean up, or for them to do it themselves.

            That's what I'm trying to get at. The kids who do this sort of thing need to be punished... mildly. Not sent to prison where they can be ass-raped by their cellmates and/or be transfigured from a loser, messed-up kid into a hardened criminal.

            Lost customers == lost $$$.

            Because of people and businesses who demand monetary accountability and are not willing to write off the stupidity of those around them, mild punishments are not acceptable, by the lawyers if no one else. Dealing with the rigors of the community is simply one of the costs of doing businesses for most companies. If a vandal spraypaints obscene grafitti on a company's storefront, then that company has to pay to have it repainted that day. If they manage to catch the guy who did it, they'll press charges for the paint and labor they had to buy, not all the estimated 'lost businesses' that any given e-commerce website owner would.

            In my community, if a kid commits a crime like vandalism, fighting (assault), shoplifting or loitering, and is caught, he or she is sent to 'Teen Court', and is assigned a small community service penality to attone for his or her misdeeds. If script kiddies would get the same treatment, then they a.) wouldn't become martyrs, inspiring more script kiddies, and b.) would learn that there are better, more profitable ways to spend your time.
          • You will find that people may not want to go to a store that has "Fuck off and die" spelled out on their front lawn. Lost customers == lost $$$.

            To paraphrase you: "You are confusing your private residence with a business. There is a difference, you know."

            As another poster pointed out, your analogy is weak at best.

            -Legion

        • If someone wanted to break into my house, all they'd have to do is smash the window. Is it my fault for having windows?

          People _don't_ break in to other's houses because;

          1. They have some modicium of morality.

          2. They respect the law or fear the police.

          3. They're worried that I might be home
          and I would hurt them. And I would.
          • And for the people who do break into your house?? What about them?

            And why do people continuously use the comparison of house being broken into and computers being broken into. They are different things... I compare Inet sites to stores.. they are both offering a public service.. they require more attention than a house since a house offers no public services and less security is needed. It's like running a business from your home... even then people use more security at their homes..

            And finally, morality is a common sense thing and you may be a perfect moral citizen who does no wrong, but some kids growing up in weird situations have less moral convictions.. I'm not at all defending their acts nor support them, but keep an open mind. I'm all for giving them hard sentences, but strong jail time and fines might not be the correct punishment. Afterall, they'll just end up stealing more to pay for fines, etc..
            • I like the metaphore of breaking into someone elses house because people tend to keep personal info on their hotmail accounts, etc and this metaphore plays up the violations being carried out.

              I also like the metaphore because it emphasizes that government monitoring of private computer data (and most computer data is not actually private, I realize) without a warrant should be considered unlawful search and seizure if they violate your personal computer.
    • Re:Dead On... (Score:4, Interesting)

      by Snowfox ( 34467 ) <snowfox@sMONETnowfox.net minus painter> on Thursday December 27, 2001 @10:39AM (#2754846) Homepage
      Finally, there's the human element to contemplate. We all did stupid stuff when we were kids, which most website vandals are. I don't know any kid who didn't tresspass or vandalize property at least once during their youth. For many, it was the old junkyard or the cemetary. For these kids, its websites.

      Maybe my experience was different from others', but - as a kid - I stopped experimenting with stupid things once I was caught. I kept doing bigger and more risky things until I finally got in trouble, and I realized that I wasn't the smartest guy in the world, and that rules weren't just for other people.

      Nailing a kid for defacement now might mean that he doesn't need to be nailed for something much more serious later on.

      • As I said in a reply to the nay-sayer above:

        Unfortuneately, police don't have the option of giving script kiddies a 'firm talking to', since any kind of computer crime has been labeled 'terrorism' by both our corporate oligarchy and our reactionary government.

        If you bust a kid for defacing a website, he'll be lucky not to spend time in jail, along with drug-dealers, murderers, gang-bangers, and child-molestors, when all that should have happened is that his computer should be taken away because he can't use it responisibly.

        If you are a company who has been 'defaced', the best thing you can do is to try to identify and locate your vandal yourself, and then talk to his or her parents. If you discover that the person your dealing with is an adult... and this will be the rare case, *then* it's time to call the police and start talking about pressing charges.
        • If you are a company who has been 'defaced', the best thing you can do is to try to identify and locate your vandal yourself, and then talk to his or her parents. If you discover that the person your dealing with is an adult... and this will be the rare case, *then* it's time to call the police and start talking about pressing charges.
          This is not profitable, as this would deviate precious company ressources away from the goal of pursuing maximum dividends for shareholders who do not invest in the company for it to do some deviant child's parents work.

      • Maybe my experience was different from others', but - as a kid - I stopped experimenting with stupid things once I was caught. I kept doing bigger and more risky things until I finally got in trouble, and I realized that I wasn't the smartest guy in the world, and that rules weren't just for other people.

        Nailing a kid for defacement now might mean that he doesn't need to be nailed for something much more serious later on.


        And how did you enjoy your many years in the maximum security prision? What? Are you saying that when you got caught for *real* vandalism, you didn't go to prison for 5-50 years as a terrorist? You're kidding!?

        If you want to slap a $100 fine on these kinds, sure, that's what a web-site defacement is worth, but if you are going to put them in jail, even a single night in jail, then no, this is not justified.
    • Re:Dead On... (Score:3, Interesting)

      by InsaneGeek ( 175763 )
      I would take the stance that if your website is cracked then more often than not you are *partially* to blame. It's not completely the website maintainers fault, someone broke into the website and they also should carry blame and the larger brunt of it.

      Prosecuting is the only way to start changing the attitude that it is morally OK to do this. Only thing is that most of the time I don't believe they should be thrown into jail, but punishment needs to be dolled out to the offender who broke into the website. The most appropriate, in my mind would be fines levied against the parents nothing like tens of thousands of dollars, but something appropriate enough to get the parents involved in their childs life, throw in some probation & community service. Those out of their parents care should be delt with the same way, a reasonable fine (except of course they pay it), probation & community service.

      Any additional fees should be done in a civil court, a simple break-in can get very expensive, someone told me that they brought in the Wheel group at $60,000 for 3 days to make sure other systems were not compromised (can you be *sure* they didn't do anything else in your system). Civil court (in my opinion) is more apt to deal with whether or not the moneys spent was appropriate for the situation, since that is the only issue they are dealing with, and tend to look at whether or not the reparations requested are *truely* appropriate for the situation.
  • by dirk ( 87083 ) <dirk@one.net> on Thursday December 27, 2001 @10:06AM (#2754757) Homepage
    This stuff doesn't surprise me at all. Companies are in the business of making money. If they report every intrusion that happens, that means other people find out about them (potentially). If people find out, they may be less likely to use that company (or their website or whatever) than if they believe there was never a compromise. I think companies should be forced to report it when there is a compromise that includes user information or something like that, but if it is just a web-site defacement (with no possibility of anything else) I would probably not let it get out either. Add onto that fact that some PHB automatically will assume it is the admins fault, even if they were told not to patch it/didn't have enough money to do it right/were ignored on their suggestions, that measn the less people who know about the exploit, the better off you are. I don't agree with the policy, but it is certainly understandable.
  • My experience with corporate management is that it comes down to the lack of understanding and education. How many managers call their IT people to teach them how to attach a file (in Outlook the paperclip icon) to an email?? I once brought up security as an issue and was told not to mention it again. Something about techs always wanting to spend money on useless "latest & greatest" ideas that wern't important. No amount of explaining helped or changed any minds. When these managers get their teenagers to finally tell them what is going on (that good security is worth the pittance in extra cost) maybe we'll finally get something done.
    • Yes.. it is a lack of understanding; it's ignorance of what the job should really entail.

      Then again.. I've seen a lot of IT people who misunderstand their own job.. they see themselves as some ronin, as the mayamoto musashi of sysadmin, there to hide in the shadows and make the company work. Perhaps helping with Outlook was part of the damn job description in the first place.

      A lot of times, it's the IT kid who misunderstands what he was hired to do.. or in otherwords, it's not up to you to tell your boss what your job is, unless he asks you to.
  • Esp. if they want me to engage in e-commerce.

    If a company doesn't care about "grafitti" on their storefront, then how much do they care about customer privacy, esp. credit card information? How much do they care about the security of their actual network?

    If I can tell, I won't order from a MS hosted e-commerce site.

    Off topic: Anyone know how CCBILL was comprimised? I wonder what they were running...
    • You are ignorant beyond belief.

      A website with a Linux front end may very well be connecting to an NT 4 or even 3.51 server running Oracle or Sybase, which is where your data is stored.

      NT web servers may have Solaris application and database servers running in the background.
      • This is indeed true, it is common, and is a good idea. But the problem here is you can't generally tell what the database is hosted on (and if you can tell, you probably don't want to trust that site, either).

        I think the point is that the outside host, which is the only host you can check for platform generally, is going to be the first point of attack (excluding trojans), and if it is vulnerable, it gives a toehold to the potential cracker. The poster seems to believe any company which would put Windows systems out as their first line of defense is not serious about security, and a lot of people would agree, especially after hearing the ignorant rantings of Microsoft's "chief security officer," Scott Culp.

        The guy routinely reflexivly claims any proven exploit is impossible without having read about the exploit itself (or the details for recreation, source code, etc) and generally demonstrates a lack of knowlege of the issues affecting MS customers who actually think they might like to be reasonably secure. Contrast this with the output of people in charge of security/development for your more secure platforms/products.

        It is clear MS has a don't-care attitude toward security, is not really interested in being up to speed on the research being done in the field, and essentially will only release a patch for a problem which has been around for a long time, has a published exploit, and also is on the radar of big consulting firms/Time Magazine/ Wall Street Journal. In other words, they only care about security when they are forced to by their big customers. Therefore it is reasonable to assume someone who really puts MS on the front line is not up to speed or does not care enough about the security of your data.

        • In a well designed system, the frontline is almost irrelevant.

          I support a number of projects which have third-tier webservers running Windows that are maintained by our clients. Oftentimes because of government contracts they are still on Windows NT 4. (or even 3.51 in one case!!)

          We own the middleware and database tiers, and keep a VERY tight ship. We've never had a breach in the database tier in four years, and only had one in the middle tier (which was an internal breach by an admin). The webservers are considered more dangerous than the general internet user.

          Personally, I am more afraid of Unix systems being breached on the front end than windows machines. It is quite easy for an unsophisticated hacker wannabe to do real damage with a poorly secured Linux or Solaris box.
  • by Anonymous Coward on Thursday December 27, 2001 @10:10AM (#2754773)
    For professional reasons, I'm posting this anonymously.

    I've worked at one or two places where boxes have been cracked and once the initial panic settled down the word that came down from On High(tm) was to quietly pull the system, disinfect it (but not reformat/reinstall), and return it to service. "This system needs to be available for the developers, we don't have time for you to find whomever did it."

    Needless to say, I wasn't real happy at the prospect of putting a questionable system back into active duty. Just because you found the /usr/lib/.../31337^k17 directory and copied back the files replaced by the rootkit does not mean that you've found every last trojan horse or old config file. I'm surprised that the more intelligent kiddies havn't started doubling up their rootkits yet - one which acts as your basic rootkit, replacing system binaries et al, and a second in an entirely different location that they leave in place for situations just like this: If the primary rootkit is removed but the system isn't reinstalled, they've still got a way back into the system and a backup toybox to get revenge with. It wouldn't take much at all.

    Not to rip on Redhat exclusively, but with all the RH servers popping up these days I'm surprised that the newer rootkits aren't being passed around as .rpm files. No muss, no fuss, but the sysadmin would still notice if (s)he did a verification from the install CD-ROM.

    At the end of all of it, I did what they asked me to and put the box back into service. I'm reasonably sure that I swept the system clean but you can't prove a negative, you can only state a negative to within a certain tolerance. For all I know, the backed up system binaries I'd found and put back into place were trojans as well and the originals had long since been overwritten.

    But that's in the past now.

  • by tshoppa ( 513863 ) on Thursday December 27, 2001 @10:12AM (#2754777)
    CERT/CC [cert.org] has been gathering statistics on incidents, vulnerabilities, security alerts, and hotline calls [cert.org] for over a decade now. They also analyze the statistics for trends [cert.org], present courses on security issues [cert.org], and publish reports for general consumption [cert.org].

    To me, the real problem is that every couple of months folks come along like internet security is something new, when in fact the exploits and vulnerabilities of today are very much like the same problems from a decade ago.

  • Although most website defacements and root exploits occur on the "outside" servers, some, if not the largest percentage of actual defacements occur because of the "unicode exploits" in Microsoft IIS 4.0/5.0 Servers. These exploits DO NOT undertake a sophisticated process in order to deface a website. A simple URL entered into the address line of the web browser of an unsuspecting netizen could in fact deface a website without the knowledge of the person doing the clicking.

    This is perhaps one of the most insidious qualities of the 'net - a person can commit an illegal act (Unauthorized alteration of a computer system) without even knowing it, or intending to. Yes, I believe that most website defacements are intentional. But this only makes it worse for the person who accidentally mistypes a URL and ends up getting their computer seized, or worse, dragged into court.

    Granted, you may not like Microsoft. You don't have to use their insecure products. But this is not enough - you could go to jail because of their negligent ignorance in security issues.

    When cars became widespread, there was a legal push to make them safer. Soon, people started holding the car maker, rather than the driver, responsible for safety. Hopefully, the same thing will happen to Microsoft - people will hold them accountable for their (almost) criminal negligence when it comes to security.

    • by Anonymous Coward
      The chance of someone "mistyping a URL" and accidentally triggering the Unicode exploit are laughably small. What are the chances of someone "mistyping a URL" and doing the following?

      http://www.someserver.com/scripts/..%25%35%63../ wi nnt/system32/cmd.exe?/c+dir

      I realize it is vogue to talk about how MS is the devil and "you could go to jail", but you're being ridiculous.

      Additionally: "you could go to jail because of their negligent ignorance in security issues." No. It is not MS problem that you didn't patch. Or is it also Slackware's problem if you don't patch for the recent /bin/login problem that they were vulnerable to?
      • The chance of someone "mistyping a URL" and accidentally triggering the Unicode exploit are laughably small. What are the chances of someone "mistyping a URL" and doing the following?
        http://www.someserver.com/scripts/..%25%35%63../wi nnt/system32/cmd.exe?/c+dir

        Social engineering. If I was a real prick of a Webmaster, I could include a link in my web page that would "mis-type" the URL for you when all you wanted was to see the item "advertised" by the link, an intimate and revealing picture of Brittney Spears. It's even worse with HTML-capable electronic mail -- when was the last time you really looked at the URL behind the juicy link in front of you? Now imagine a clueless newbie presented with the same message. What happens is left as an exercise to the reader.

        As for going to jail, you might want to look into the history of BBS sysops who have been "investigated" for wrong-doing. Suitable links are elsewhere in the discussion.

      • Granted, its not MS problem if I don't patch - someone should know better than to run IIS, but they don't. But the fact is that I could use something like this:

        Click here [microsoft.com]

        to get an unsuspecting visitor of my site to launch an attack against a remote server. Granted, the average user wouldn't know what to do if it worked, but someone monitoring for hackers would be able to pick up their IP.
  • And maybe not (Score:5, Insightful)

    by r_j_prahad ( 309298 ) <r_j_prahad@NOSpAM.hotmail.com> on Thursday December 27, 2001 @10:20AM (#2754794)
    I think a lot of companies would care if they could afford to, they've just made a business decision not to go after this sort of thing. Investigations can take months, and prosecution can take years. What responsible CEO would be willing to commit those resources to a process that won't yield a cash return? How much money do you think Intel got back from Randall Schwartz?

    I, for one, cannot afford to have my servers collecting dust in an evidence locker while I rearrange my business schedule around interviews, depositions, and testimony. Sorry folks, but yes, I'd bury it and forget it.
  • Happened here too... (Score:4, Interesting)

    by tsmit ( 222375 ) <tsmit50&yahoo,com> on Thursday December 27, 2001 @10:28AM (#2754815) Homepage
    Surfing around my intranet at my last job, found an internal test webserver 0wn3d by poisonbox. Nobody in the company gave a shit.

    That is, until, i sent a message to the CEO, COO, and CFO with their credit card information. Apparently there were credit cards and user information stored on this machine.

    They started to care then. Just a bit though. Of course, two months later, we were one of the companies that had to shut down EVERYTHING due to Nimda.

    They're out of business now. Take that for what it's worth.
    • > i sent a message to the CEO, COO, and CFO with
      >their credit card information.

      What you did is known as "pulling a Schwartz"

      You are lucky they didn't fire you and then prosecute you.

      >They're out of business now. Take that for what
      >it's worth.

      You are twice lucky: so far, they haven't held you responsible for this.
  • Cost analysis (Score:2, Interesting)

    by BlaKnail ( 545030 )
    Assuming that most companies are smart enough to have the documents for their website saved on a local machine in addition to their webserver, then what does a defacement really do to them? It may momentarily make them look stupid, but it doesn't cost them anything to fix it, just reupload. The upper management might not see this as much of a problem...for instance, if I owned a store, and some kids kept putting up posters that said "You Smell!", I could just tear them down (or leave them and let potential customers think that I smell). Its not worth the effort to put up a system that prevents the posters from getting put up in the first place.
    • This would work for a small site with fairly static data.

      Go roam around IBM website and its subsites (support.ibm.com, etc.) and you'll see thousands if not 10s of thousands of pages. Uploading all that takes time.

      One other point is if someone cracked Amazon and put up a message saying "Amazon has been cracked and we now have your credit cards numbers!" What are you going to think when you see that again, or for the third, fouth, and fifth time? Bye, bye business! That would be a good reason to prevent it in the first place.
  • I don't care either (Score:2, Interesting)

    by gmack ( 197796 )
    As a system admin it's life.. if I don't keep servers updated ahead of the kiddies I get pages defaced.

    Penalty for me: yelled at by boss and now I have to reformat server. Score 1 point for the kiddies and I learn for next time.

    I don't care much unless they do something lame like use the box to DDos or something equally lame.

    If you find your site defaced more than not it's a sure sign that something is not right with the tech department.

    Mind you I've not had a production site defaced in over 2 years.
  • by bero-rh ( 98815 ) <bero@reCOMMAdhat.com minus punct> on Thursday December 27, 2001 @10:37AM (#2754839) Homepage
    I think quite a few people responsible for deciding on what to do with a cracked website would agree with me in saying the resulting consequences have to depend on what the cracker did...

    If someone just added a statement saying "Hi, I'm l33t hax0r, I've cracked this site 00000001 times", it's likely just a kid trying to have fun, not someone who should end up in prison.

    On the other hand, if it's a spammer cracking my server and using it to send spam, they'd face all consequences I can think of. And there are quite a few in-between things...
  • by greensquare ( 546383 ) on Thursday December 27, 2001 @10:39AM (#2754842)
    The problem is that it is too hard to prosecute.

    The FBI is way too busy with the real bad guys, like Bin Laden. You should go check out Gibson's story [grc.com] about the DOS attack that he was subjected to, and the results of his attempt to get the law involved. Basically, if your damages are less the $20,000 they don't care, and if the alleged hacker is less the 18, they probably don't care. It may be very hard to put a value on a webpage defacement that will hold up in court. Courts don't like to do much to kids either.

    To make a long story short, it only makes sense to not throw good money after bad by trying to apprehend and prosecute someone. The effort on behalf of the corporation will be better spent shoring things up to prevent it from happening again.

    Cheers!

    gs

  • by Fatal0E ( 230910 ) on Thursday December 27, 2001 @10:49AM (#2754861)
    What I especially didnt like about this article was this part...

    Damnit I was all set to paste and italicize the part where the person says something like, "...but I was there only for one month and didnt want to seem like a pain in the ass." but it's /.'ed

    Anyway what really irks me is that this I get the impression that this guy doesnt take his job seriously. Being a NetAdmin is not a job, it's a duty. You have a duty to your Network and it's users first. Your PHB's second. I think anyone who treats their role as any different is inviting disaster.

    I mean seriously, I'm lazy; does that mean I want to have more to do later on b/c someone who cant appreciate the gravity of their decisions told me to do something against my better judgement.

    If I were him I would have kicked and screamed about that OOB installation on a public server but if thats how they want it done, then thats how I'll do it. If that becomes a pattern in their decisions, then I'll decided to start surfing monster.com. What I'm getting at tho is that it's not hard to make someone understand that best practices are called as such for a reason and straying away from them should only be done with very high degree of deliberateness, instead of the implied laziness on the part of the PHB and the cowardice of the person interviewed in the article. The whole point of the article could have been avoided with a pair of cojones.

    :::rant mode off:::
  • by bo0push3r ( 456800 ) <boopusher@[ ].co.uk ['gmx' in gap]> on Thursday December 27, 2001 @10:56AM (#2754889) Homepage
    .. and also worked for a company (a dial-up provider) where we had to deal with this kind of crap and just turn a blind eye.

    i was one of only two admins for what was then the 3rd largest dial-up provider in that state.

    first of all, their network infrastructure was a mess. they didn't even bother using their lovely switches with segmentable backplanes to set up different suubnets for the internal network. i mean, a lot of good this would have done, considering that the owner was FAR to cheap to shell out money for even a cheap firewall. we actually had very smart and network-savy techs printing warnings about network security to the printer on the owner's desk (while connected with other ISPs no less!) and the idiot still didn't get the message. this is made more rediculous by the fact that the man built the company from the ground up, he was supposed to know what he was talking about! (quote: "do we even know if that shit works? why do we need that?" - owner, when asked if we should use RAID in the SQL server i was building)

    second, the main admin and 'webmaster' was too cozy in his M$ bubble to venture into the world of open source software. granted, the two of us often had more work than four more of us could have handled, but in the interest of job security he should have at least tried listening to all the people (more security-conscious than he) who were telling him that our setup was crap. he, the operations manager for the company, and the owner (my three immediate bosses, in that order) didn't seem comfortable with the idea of me, a newer constituant to the department, tightening security.

    so, when it came to setting up and securing machines i was left to dabble on shell boxes hidden under my desk. (which i did from under my workstation at the other end of the building even before i worked in the department or had access to the zone files. the network room was unlocked, so it was simply a matter of noting a jack number and moving your connection to a switch that wasn't managed by novell.) the owner was actually more afraid of his employees in the building using the hi-cap lines for d/ling MP3s on his dime than he was about paying an army of trained monkeys to manually re-enter 17,000 accounts when some 15-year-old decided to kill the user database from his AOL connection.

    so rediculous was his thinking that he paid all the money he could have spent on securing the entire network and more on some overpriced Intel server and the (fucking) NOVELL software necessary to control network access from INSIDE the building.

    so lax was the security and so cheap the owner, that it actually took two incidents of having production monkeys switch our servers off (for the hell of it) in mid-operation (first the SQL/RadiusNT server, then the Mailsite server) before we managed to get locks for the network room doors.

    anyways.. i'm finished.

    -j0nah
  • Not effin' likely... The Otis people get sued for every broken leg. They're not going to be that stupid.

    Eventually some dweeb will come up with a real killer script. One that infects hospital systems, screws up with the meds and results in a few hundred deaths.

    Then some smart lawyer will go after M$ and learn that they do not warranty the suitability or fitness of their product for any purpose what-so-ever.

    Then the governor of the state who's aging mother died because of the boo-boo will get into the act and the software industry will be as regulated as the automotive industry.

    Given the number of blazing Corvairs and chest impalements by steering columns, this will NOT be a bad thing. But its about as likely as M$ selling elevator systems.

    As long as the cost is ONLY money, nobody in the corporate world gives shit. Its not their money. They don't want to waste time or money fixing the problem. They don't even want to report the problem.

    I know of at least one company that got screwed on Sept. 11, 01 because they hadn't even taken a copy of their back-up tapes off site in months. Takes too long. Costs money. Like cab fare. Believe it...

    Get used to it.
  • by satch89450 ( 186046 ) on Thursday December 27, 2001 @11:14AM (#2754950) Homepage

    After reading the link for this story, I was amused to see that things really haven't changed in a number of places. Management doesn't worry about Web site security until it hits them where it hurts, their liability insurance premium, or when the executives spend some time in the cooler.

    The majority of defacements I've seen described involve little more than vandelism, electronic tagging by lower lifeforms of script kiddies, that do very little harm to the company whose site is defaced. You "wash the walls" and go on. End of story.

    Except that it isn't the end of the story.

    What happens when the defacer decides to use your Web site to store a couple hundred cracked credit card numbers? How about the 600 MB of MP3s of copyrighted music material that appears in its own directory of your Web server? The kiddie porn? Can you imagine what would happen if a terrorist cookbook were to be uploaded to your site, given today's paranoia caused by the November 11 terrorist attack?

    IANAL, but I recall the Mogur-BBS debacle [textfiles.com] when a BBS system was used to traffic in telephone calling card numbers. Some facts are missing from the account the link points to, but it's sufficiently accurate to be useful. Here is another account of the incident. [www.dang.se] Here is a more thoughtful retrospective and analysis. [publiceye.org]

    Shall I bring up the episode of Steve Jackson Games [eff.org] as an indication of the kind of risk that operators of public computer systems face when security is not a primary concern? Steve Jackson Games is apparently alive and well [sjgames.com] (and probably mad as hell about being mentioned in a Slashdot article) so the news isn't all bad, but the six months they were effectively out of business -- the publishing business -- must have hurt and hurt badly. Granted, the Secret Service has learned much since that 1990 fiasco, but can you imagine the long arm, and the long flatbed truck, coming and taking your computer systems because of the acts of some malicious script kiddie who does more than tagging?

    Can your company afford to have its Web servers siezed and perhaps damaged because of the illegal acts of non-employees?

    What you can do: tell your manager to contact your company's general legal counsel and request they research the legal liability, and the practical effects of law enforcement action, resulting from illegal acts committeed on public servers that have inadequate security controls. Emphasize that the research include short-term effects such as equipment seizure and forceable removal, damage inflicted during such action, and the expense of obtaining the timely return of the equipment.

    If you run an e-commerce site, also be sure to ask about legal exposure in the event any web server containing crdit card records, customer information records, order histories, or credit search information is compromised and the information released to unauthorized people.

    Steve Jackson Games was almost put out of business based on a bogus rumor. How would your company survive the legal onslaught from a script kiddie interested in more than just defacement?


    • Shall I bring up the episode of Steve Jackson Games as an indication of the kind of risk that operators of public computer systems face when security is not a primary concern?
      Really, you shouldn't.

      As I recall, they didn't get raided because of anything to do with their system security, and indeed their computers had nothing to do with it at all (other than that they were taken in the raid) - they published, on paper, an entirely fictional game about computer hacking that any sane person should have been able to tell was a game (the game rules should be a big hint) and didn't constitute a criminal instruction guide, and they got raided for it because the Secret Service apparently wasn't able to make that distinction.
      • Really, you should pay attention to what you reply to...note this quote from the parent post:

        Steve Jackson Games was almost put out of business based on a bogus rumor.

        Somebody told the Secret Service that SJ's BBS had hacker files on it. They took away the BBS and some vital manuscripts. What if your hacked server actually had illegal material on it? In other words, the poster's point was...a rumor and stupid cops almost shut down a business. What if the rumor were true, and there was illegal information on your web server (put there by a skript kiddie), and the cops were smart?

        • Really, you should pay attention to what you reply to...
          Really, your mother should have taught you better manners. I understood the original author's point. My point, however, is that the anecdote has nothing to do with the consequences of lax computer security and therefore doesn't make a good example for their argument.
          What if the rumor were true, and there was illegal information on your web server (put there by a skript kiddie), and the cops were smart?
          If the rumor had been true, prosecuting them would probably have been justifiable if I remember correctly what the rumor was. If the cops were smart, they would have tried just looking into the matter before raiding the place, and also would have realized that the owner of the computer isn't necessarily responsible for the actions of every script kiddie who attacks it.

          Bluntly, I think it's just a lousy example for this particular discussion.
  • by NiftyNews ( 537829 ) on Thursday December 27, 2001 @11:16AM (#2754959) Homepage
    Heck, some of the webmasters out there are so lazy that they probably look at defaced pages and figure "Hey, free content. Looks like I can take another couple days off."

  • by drew_kime ( 303965 ) on Thursday December 27, 2001 @11:32AM (#2755016) Journal
    There are two opposite sides to every debate. I am sure a middle ground is obtainable where everyone, well almost everyone, can meet and appease the majority of those concerned. Frankly, that's why it's called a "democracy". Without two opposing views, at an equal distance apart, a logical solution would be oppressed by the single minded behavior of an individual dominating force.

    No. The reason it's called a democracy is because people get to vote. If there are in fact three sides to a debate, there is the distinct possibility that no one will be appeased. In fact, most compromise among reasonable people results in everyone being equally displeased, but willing to accept it.

    Insisting on seeing every disagreement as a matter of two opposites is how we got the Republicans and the Democrats, with no (okay, little) room for third parties. I can't see how applying the same method to computer security will somehow suddenly work.
  • by psychophil.com ( 2573 ) on Thursday December 27, 2001 @11:45AM (#2755053) Homepage
    It may not be that most companies do not care, it may simply be that many incompetent admins/managers are worried about keeping their jobs.

    What are they going to do? Report a defacement/breakin and look bad in the eyes of upper management, or cover it up so that it looks like it never happened and keep management in the dark as much as possible?

    It may not be that these companies do not care, they may just not know that they have a crappy staff.
  • The subject says --
    Some Companies Don't Care about Web Defacement
    ... but then the story tells how the companies want it fixed! (even if they won't take the time to fix it right, they DO copy over a correct copy of the web site. Obviously they DO care.)

    If they didn't care, they'd never correct it -- they'd leave the defacement up forever.

    Some more appropriate/accurate titles would be :

    Some Companies Don't Care enough about Web Defacement
    Some Companies Care about Web Defacement, but won't Fix It Right
    or
    Some Companies Care about Web Defacement, but when they `fix' it they just fix the defacement itself and don't take the time needed to keep it from happening again
    Of course, once somebody read one of these more `accurate' titles, they'd go `duh! and this is news? We all knew that already!'
  • If people just want to install a web server, and not muck around with a million details of Linux to make is really secure, my advice would be to not use Linux.

    OpenBSD has been secure for "Four years without a remote hole in the default install". They look over just about every line of code every release for possible security problems, and also regularly screen their ports collection for possible problems. FreeBSD has a secure mode option in the installer that apparently makes it about as good as OpenBSD, but I have to doubt that somewhat.

    Is there a way to make a default Linux distro as secure as OpenBSD (and have long-term proof of it)? Probably not. So, if you want a secure web server as soon as the installation is finished... go with OpenBSD. It runs just as well as Linux, and has the same capabilities, so why not?
  • When I was going to school, I worked security - the non IS type - where the company had issues with folks stealing stuff. It was one of those home shopping networks, so they had jewelry, electronics, and all sorts of other stuff that got shuffled around from buyers, to the TV studios, to warehouses, and outlet stores.

    As you might have guessed, some people would steal stuff. Every once in a while, we would catch them, we would call the cops, they would fill out a report, and that was the end of it. Termination, but no criminal prosecution... Some of these folks made off with a lot of stuff before you figured out how they were running off with it.

    I suspect our police force is not interested in dealing with the "lowly" 13 year old script kiddies who would make a lousy public example. Lord knows they did not really care to prosecute when someone runs off with several thousand dollars worth of gold, confesses, and provides a verbal and written confession to the officers as well.

    I also suspect these companies do care; they just realize the futility of trying to bring these "crackers" to justice....
  • We've all been idiot kids before, so I don't think it'd be fair to send some "kiddie" to jail for web defacement, nor do I think he/she should get off scott-free. However, when I was about 16, something like $100 was a lot of cash, and that's certainly a lot less than the thousands of dollars it "costs" when an e-commerce site goes down. So how about advertise, "if you can prove that our server can be rooted (without actually doing so), we'll send you a check for $100." This would keep the system up to date on security since 0-day exploits would be reported quickly, and it'd probably be a lot cheaper than hiring a full time security expert.
  • What's a good reason that companies should care any further than what is necessary to restore the site to working order. The amount of revenue lost due to a defaced web site is probably so small that it cannot be calculated. Why waste all the man hours and money to seek out and prosecute web bandits? The real money wasted would be in the legal proceedings, and then the company would become its own worst enemy. They spend money on an IT staff to handle these things... might as well get the mileage out of the people they've hired.
  • NFS ro Mount? (Score:2, Insightful)

    by 3rd_Floo ( 443611 )
    I havent read all the comments, at ~ 150 it gets too long, but what about NFS mounting the httpd doc root RO(Read Only)? Have it exported RO on the machine thats secure behind the FW, and the public webserver that only has port 80 open for inbound connections not originating from within the corp, and thatway, nothing can be defaced, it cant be modified period from the webserver, the content server that holds it all is elsewhere, safe, and accesable to the employees inside, but out of reach of the defacement. And this same logic could still be applied to M$ IIS last time I looked, a simple SMB mount with the right permissions and viola.

    You would still have to provide security patches to your servers, and be a proactive admin to keep your network secure, but wouldnt this solve the modification/defacement problems?

  • Companies do not report defacement, People do. Here are some reasons not to report defacement.

    1) The Geek thinks it makes him look bad if he cannot secure the platform.
    2) The Management view than 'if Big Guy's aka Microsoft cannot secure the Web, then nobody can! '.
    3) The Company also thinks it makes them look bad if a) they are prosecuted for failing to secure their data and b) if they start prosecuting their customers.

    Geeks recognise Web Defacement is about as serious as Vandalism, and the punishment for each is completely disproportionate. Perhaps the Geeks are not reporting these breaches to the Authorities because they understand the law is B.S. I KNOW this colours my view.

    In the UK, we have the Data Protection Act and the Computer Misuse Act these are well regarded amongst lawyers & politicians and are held up as good examples of computer internationally, the rest of the EU has (is) adopting the same standard legislative framework. These stipulate a six year term for 'each unauthorised access' by an individual, and an 'enforcement notice' for a company committing a similar offence, or failing to secure their data.

    Another question is 'what constitutes an unauthorised access ?' is it each packet, each login/session or each machine compromised ? A packet storm could result in a Six Million year sentence in a few minutes.

    The platform I work on has been attacked several times, yet time has proven we have a very effective security setup, breaches have been handled without damage. The nature of our platform means that the hackers are also our customers, we usually cut the offender off and send a warning letter and once they apologise and ask nicely, we let them back on the platform. So far we have had only one repeat incident and they have be cut off permanently. We have never informed the authorities, despite the fact that these actions certainly constitute a breach of UK Law.

If you didn't have to work so hard, you'd have more time to be depressed.

Working...