Digital Thieves Use Ex-Employees Accounts 98
prostoalex writes "The New York Times is running an article about a new generation of digital thugs. Using unsecured wireless networks, free e-mail accounts, a wealth of security knowledge, and, most important - employee passwords, thieves are getting access to valuable company databases. Once they're in, they start extorting the companies to pay up for them to leave. Otherwise phony e-mails to customers and sensitive information published publicly will lead to an embarrassment."
Re:why (Score:1, Insightful)
Re:why (Score:2)
Re:why (Score:2)
Apparently you haven't been paying attention your whole life. Sociopathic personalities make up 2-3% of the population. There are always going to be people out there who have zero regard for anything other than personal gain.
So Low!! (Score:5, Interesting)
If you have never heard of this I suggest you research it and you will be astonished how the symptom list fits the behaviour of so many public figures.
Re:So Low!! (Score:5, Interesting)
But, if you ever cross someone who has NPD they will never, ever forget it (it doesn't matter if they were in the wrong) and they will stop at virtually nothing to hit back in their narcissistic rage. On top of it all, I don't think most people realize that not only can you not reason with these people, but that they will never be "cured." It's a life-long affliction.
Re:So Low!! (Score:4, Insightful)
You're probably thinking of Dr. Sam Vaknin's, Narcissistic Leaders. My favorite topical quote;
Sound familiar?
Re:So Low!! (Score:1)
Re:So Low!! (Score:2)
Seriously. Psychologists need to stop calling every damned personality trait 'disorder'. It just slows things down by making people second guess themselves. Worse, it satisfies the californian need to pidgeonhole everything, and when the californians like what you're doing, you know you're doi
New Generation? (Score:5, Informative)
Re:New Generation? (Score:1)
i know a kid who had access to the web box with his ex-employer, decided to get even with them for firing him, so he decided to deface their homepage and delete their mysql databases. (they sold info on databases or something..)
whats up with these garbage stories? did you know people get their passwords cracked, or stolen from social engineering?
i got a better story.. cisco/ISS laywers are running around harrassing everyone who posted that info by micheal lynn. cryptome.org got hit with the
Re:New Generation? (Score:2)
But it doesn't look like they complied? http://cryptome.org/lynn-cisco.pdf [cryptome.org]
big or small targets? (Score:5, Insightful)
Stupidity? No. (Score:2)
Users shouldnt have to understand how it all works and how to secure their network/pc. It should come that way.
Much as your car does. You shouldnt have to understand how the locks work, or the ECM's. They should 'just work'.
Is it nice that you can tear down and rebuild a transmission in 2 hours flat? Sure, but you cant expect the average citizen to know that.
Re:Stupidity? No. (Score:3, Insightful)
Sure, a computer isn't a single system, but it's a set of systems with a single interface, and your actions are rather more separated from effects than
I dotn agree (Score:2)
It is not realisitc to expect average users to understand the PC from a techincal side. It has *nothing* to do with stupidty or lazyness. Its an appliance to them, nothing more.
IT people hired to be experts, we do agree on that part. They should know what they are doing and take action.
Re:I dotn agree (Score:1)
That's about one esse
Re:I dotn agree (Score:2)
Re:I dotn agree (Score:1)
There's also the safety factor--do little kids have the attention span to drive ten miles down the freeway, obeying traffic laws? Explosions are cool, after all. And then there's the whole hand-eye coordination in development thing.
Re:I dotn agree (Score:2)
No the problem with driving is that it's actually a huge task, with lots of full-body coordination (steering, a couple of feet, a hand for
Re:I dotn agree (Score:2)
Who says that? 5 year olds can drive a car just as they can use the computer. The damage they can cause will result in different set of risks/liabilities...
Car Complexity (Score:1)
My mother plugged her digital camera's charger into my wife's car and it blew some fuse that changed the car from automatic to manual until we figured out that this was the problem.
Cars are plenty complex and you can do lots of things to s
Re:I dotn agree (Score:1)
Re:I dotn agree (Score:2)
See http://www.flippedbit.net/3921/failures.htm [flippedbit.net] (scroll down a bit)
Re:I dotn agree (Score:2)
Cars are 'systems'. Vastly more complex then that PC you are sitting at now.
Yeah right, how many cars allow you to install random stuff on the computer? Fact is, your car has been continuously refined over the past century, while your computer has been vastly extended over 30 years.
Re:I dotn agree (Score:2)
I don't know about random stuff on the computer (in a car, right? Maybe in the ECM or something?), but you can install random crap in the engine compartment, or on the wheels, or on the brake calipers, or in the steering pump, and have horrid results. (I speak from experience. Never ever mix radial and bias-ply tires. Scary.)
A careless and thoughtless user can install crap in a car that can KILL. It's the rare computer that for whi
Re:I dotn agree (Score:2)
you can install random crap in the engine compartment, or on the wheels, or on the brake calipers, or in the steering pump, and have horrid results. (I speak from experience. Never ever mix radial and bias-ply tires. Scary.)
Yeah, but I bet you don't expect the car to behave after defiling it like that. The basic functions of a car haven't changed much in 20 years. It's more eficient, and ABS helps, but the basic behavior is the same.
Re:big or small targets? (Score:2)
While the big corps maybe more hassle, they are also a bigger prize.
On the point of wireless networks, thats not the only weakness in big companies. A telecoms company i used to work for are very lax on the employee leaving proceedures. I was finished up on a temp contract and left the company. three months later i had a new contract and i was back there. I sat down at a desk and typed in my login details... they worked, only my password had expired. I still had all the access i had previously.
Also a fr
Re: (Score:2)
Re:big or small targets? (Score:2)
It still astounds me that computers seem to halve people's intelligence. What [tomsnetworking.com] is [ehow.com] WEP [weblogsinc.com] going [wifi-toys.com] to [quepublishing.com] get [networkworld.com] you?
Yes, I just karma whored a google search for "WEP encryption break".
Also, I don't use WEP at home, nor do I use any kind of encryption by default at work for our ethernet. In fact, I've only heard of things that are by default encrypted like interbank communication, and I would assume the military might use some encryption be
Re:big or small targets? (Score:2)
Two things: It will make gaining access slightly more difficult, thwarting the casual/curious "attacker" or the accidental-associater AND it acts as a clear sign to those looking for goodwill/free access that your network is private.
Will it stop determined attackers? No, but VPN and firewall are better suited to that task.
Re:big or small targets? (Score:2)
Supply and demand, son. (Score:1)
Insecure practices (Score:1)
Re:Insecure practices (Score:2)
Well, the problem is, once you put sensitive information on a machine that's part of a network that includes machines that have internet access, you're fucked plain and simple.
Re:Insecure practices (Score:2)
Re:Insecure practices (Score:1)
Embarrassment? (Score:1)
'access to valuable company databases' (Score:1)
ok, so say my company has 'a database' with 'client information' in it.
Nobody is going to have "select * from foo" privileges.
And the data is probably meaningless without a client application.
They make it sound like the Wargames movie - where some guy 'gets into' 'the system' and gets 'the data'. Its a lot harder than this.
I know from experience that its easy enough to compromise an employee, who can print pages of stuff out, or save things as a
Re:'access to valuable company databases' (Score:2)
Don't even need to get someone to save anything as an Excel file. Just roam open shares.
It will work with most companies without a full-time IT guy.
Re:'access to valuable company databases' (Score:1)
D.D.O.S. (Score:5, Funny)
Heck, they talk like it is such a big deal to start a DOS attack. Just post an article like "Walla Walla school district to abandon FreeBSD and use Linux desktops" on slashdot, using your target's web site for the article location.
Re:wow, you are so not funny (Score:1)
Old news... (Score:1)
Re:Old news... (Score:1)
Re:Old news... (Score:1)
I decided to see just how secure my friends' hotspot
was one day when he was out of town.
Not only was it not secure, but for some reason it
could be received TWO MILES AWAY from his home.
I called him to let him know this and he was very
surprised and later went to a more secure setup.
But you would be surprised how many unsecured
wireless connections are nearby.
I suppose that this isn't surprising news but with
the prevalence of articles like this you would
think
Re:Old news... (Score:1)
We are using 2 directional aerials with about 8dbi of gain. In the process of trying to get the signals to hit each other somewhere in the middle, I've managed to pick up over 35 different wireless access points, 5 of those are "secure" (a very relative term).
I view wireless security in the same light as putting a padlock on my front gate, it wil
Payment (Score:4, Insightful)
It's all very well to do that to a company, but you aren't exactly going to hand out your own bank details to the company in order to get paid.. heh.
- paul
http://pmp.deviantart.com/ [deviantart.com]
Re:Payment (Score:2)
Why would anyone need to give out bank information, anyway? Have them send a check to a PO box at some non-post office place where they rent mail boxes. No id needed there and no tracability.
Western Union is another great way to send money without much id being required. They have money for "Elmer F
Re:Payment (Score:1)
Re:Payment (Score:1)
Not that I'm looking for ways to do it.. haha.
- paul
Re:Payment (Score:2)
Re:Payment (Score:2)
They submit combo of SSN/Name to gov't, for verification.
[/Fact]
[Speculation]
Gov't actually gives a hoot, and follows through.
[/Speculation]
Of course, if you've truly "stolen an identity" (proper combo of SSN/Name/et al), you can pretty much do whatever you want anyways.
Re:Payment (Score:2)
There are a number of foreign banks that will happily accept large transactions and ensure complete anonymity to everyone involved. The classic example of this used to be the Swiss banking system, although it's not quite as popular now that they finally relented on the WW2 account issue.
AFAIK, the current favorites are Central American countries, the Bahamas, and other countries in the Gulf of Mexico area. Highly anonymized banking, a pretty corrupt governm
One of the cases in TFA was covered... (Score:1, Informative)
Monologuing! (Score:5, Funny)
It was then that the stalker made a series of mistakes. Among them, he began to brag. In an e-mail message titled "Fire them all," he informed Mr. Videtto that he had found valuable MicroPatent documents by going "Dumpster diving to the Dumpster and recycle bins located in a parking lot on Shawnee Road" in Alexandria, Va., where the company maintained a branch office
From "The Incredibles":
Syndrome: Oh, ho ho! You sly dog! You caught me monologuing!
Ah yes, the evil cybervillain cannot resist the urge to pontificate about his supposed superior intellect and abilities to his victims. Of course, by doing so they reveal all kinds of details about their nefarious plans and give the victims time enough to escape or capture the idiot.
Monologuing trips up the bad guy everytime.Re:Monologuing! (Score:5, Funny)
Example:
A guy starts monologuing for 10 hours. In that time, the police are able to:
*Get info on him
*Eat a donut
*Google him
*Eat a donut
*Find out where he is
*Eat a donut
*Go to his house
*Eat a donut
*Break in
*Eat a donut
*Arrest him
*Have a donut party
Re:Monologuing! (Score:2)
This is the first time in ages I've actually laughed out loud at a slashdot post. Okay, maybe that says a bit too much about my lowbrow sense of humour - ah well. :)
More truth in that than you might think (Score:3, Insightful)
I mean in the real world it's not usally as overdone as in the mov
Re:More truth in that than you might think (Score:2, Interesting)
Re:More truth in that than you might think (Score:1)
A bit irrelevant to the main topic, but, in Australia, anyone who rear ends you for whatever reason is always at fault. If they'd been driving at a sensible following distance and had kept their brakes in good condition, they wouldn't have rear-ended you. They did. Therefore, they're to blame.
Re:More truth in that than you might think (Score:1)
Not too likely to be an issue in the long run.... (Score:5, Interesting)
In other words, it's just sensationalist writing.
In any nation with reasonably well enforced laws protecting a company's I.P. - I would think it's pointless for an extortionist to even attempt this. Sure, you might have the technical means to steal the proprietary info (especially if the company has unsecured or poorly secured wi-fi networks), but then what?
Even the guy in this story got caught after unsuccessfully trying to scam money out of just one company. And today, it would seem to be much more difficult to get away with than it was even a few years ago. The government and law enforcement are getting more knowledgable about Internet-based crime all the time, and since 9-11, the U.S. at least has enacted more laws giving feds the ability to "spy" on net traffic and trace things back to their source.
I really don't believe any legitimate business would think it made sense to pay some hacker millions of dollars in extortion money. This is MUCH more effective in situations like the one discussed in a Slashdot story a while back
Re:Not too likely to be an issue in the long run.. (Score:5, Insightful)
I don't know, I think there are plenty of companies that operate 'above the radar' that would be horrified at the thought of customers being able to see what's really going on in the back room. Getting the FBI involved can be thought of as riskier than just paying up. If they are detected while going to the authorities, the psycho that's threatening them can release all the secrets and just disappear. Screw the money, you're just plain going DOWN now. Just as kidnappers can threaten (and make good on that threat) that they will harm or kill their captive if you go to the cops. And, just because your business is legitimate on paper doesn't mean it's actually operating that way either.
Re:Not too likely to be an issue in the long run.. (Score:2)
Although I love the part where the hacker threatens to open the web bug in a hex editor! Oooohh! And the NYT tries to explain what that means, defining a hex editor as "software that allows users to preview the
Re:Not too likely to be an issue in the long run.. (Score:1)
Same goes for spammers .. They're always trying to sell something, just follow where the money's going.
Re:Not too likely to be an issue in the long run.. (Score:1)
>it made sense to pay some hacker millions of dollars in extortion money.
Hey - ask around.
I've had many conversations about black hats and what to do about them if you find things as innocuous as a rogue FTP server running on one of our hosting systems.
One interesting comment has been that an organization is inviting war on themselves when they kick our these kinds of squatters...best bet is to lay down ground rules for them so they don't affe
Nothing will change... (Score:3, Insightful)
Re:Nothing will change... (Score:1, Funny)
Dammit, are you trying to get Canada to launch a preemptive nuclear strike against the US?
Mark Edwards
--
Proof of Sanity Forged Upon Request
Its windows man... until bill and co vanish... (Score:2, Insightful)
Subtle crooks (Score:3, Insightful)
There seems to be a lot of comment about the case, considering that he asked to have the cheque made out his own name [google.com].
This line even appears in court documents (pdf) [4law.co.il].
Re:Subtle crooks (Score:1)
The other Why !!! (Score:1)
Old Employees Account (Score:1)
I asked my supervisor if all those accounts were in use. He didn't know. I did a bit of research, and found out that between 5% and 10% of the accounts were belonging to old Interns, Employees that left, or ppl that changed group. In a company with 15000 Employes, that makes a really big bunch of wandering accounts. No wonder why people can find 1 or 2 accoun