AOL Security Compromised by Teenager 99
Freaky_Friday wrote with a link to an InfoWorld article about a teenage kid accessing customer information at AOL. The alleged criminal trespass began late last year, and extended up through early April. According to the article, the guy used some 'off-the-shelf' hacking software he downloaded online to gain access to, and then transmit information from, AOL's systems. "The complaint states that Nieves admitted to investigators that he committed the alleged acts because AOL took away his accounts. 'I accessed their internal accounts and their network and used it to try to get my accounts back,' the defendant is quoted as saying in the complaint. He also admitted to posting photos of his exploits in a photo Web site, according to the complaint ... If the defendant was honest about his motivation in his reported confession, it's safe to assume that he wasn't interested in stealing data for financial gain, [Managing director of technology at FTI Consulting Mark] Rasch said. Still, it'll be interesting to find out what steps AOL is taking if customer data was in fact compromised, he said."
Re: (Score:1)
Hmmm (Score:5, Funny)
Re: (Score:1)
Re:Hmmm (Score:5, Informative)
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:1)
This is news? (Score:5, Funny)
Re: (Score:2)
Re: (Score:2, Funny)
For his age-frame, I think he'd have been better off trying to go three integers higher.
Of course, for that you have to leave the basement eventually. Gotta leave that womb-like comfort to obtain...uh...some *other*...womb-like comfort...oh, never mind.
Re: (Score:2)
Exactly! The only feasible solution is to add Hot Pockets to the same over-the-counter blacklist that NyQuil and such are on. Anyone who goes to Costco and buys a case of Hot Pockets is obviously a criminal.
Re:This is news? (Score:5, Funny)
Re: (Score:1)
Off the shelf hacked software? (Score:1, Funny)
I've never heard of AOL software referred to like that before. Sure I was thinking it.
Curious.... (Score:4, Insightful)
Hacking, maybe?
ScottKin
I remember... (Score:5, Funny)
Re: (Score:2)
Re:Some of us say why others say why not? (Score:5, Insightful)
Re: (Score:3, Insightful)
In what bizarro world does AOL have good customer service, such that they'd investigate and remove a ban?
What are these other avenues?
A civil lawsuit?
Re: (Score:2)
Save switching ISPs, not really. AOL's support is pretty bad. For example mail to aol wouldn't parce out names with periods in them.... I.e. John E. Hancock.
Re: (Score:2, Flamebait)
In high school I was 'banned' (really they revoked my account... problem is they left the Administrator account without a password on the local system -- idiots) from using the schools computers because I had ssh'd into my home system and was fiddling around. Obviously because there was a command line involved, I was 'hacking.'
Re: (Score:3, Interesting)
Re:Some of us say why others say why not? (Score:4, Interesting)
Incidentally, they were all Windows 95 boxes with some pretty bad security software on it. I found at least two ways through it - the fun one was they didn't lock down Winkey-F. Search on the program you wanted to run, and run it. Likewise, you could load an "approved" program, pull up the Open File dialog, and find the program in there and run it. The other way was Winkey-E. It would pop up a "You don't have permission to run this program" error. Hold it down and the screen filled with them very quickly. Eventually, Windows ran out of memory, Explorer crashed, and it would automatically repop without the security software there. Voila.
So, I guess I was kind of a hacker. Oh well
Re: (Score:1, Interesting)
They started running Fortress but you could still open up apps like Word and get to the system information tool where you could run other applications from- similar with netscape- just configure a helper application for some odd protocol and try and go to a site with that prot
Re: (Score:2, Interesting)
Re: (Score:1)
Re: (Score:3, Interesting)
Just because you can click yes all the way through installing something on Windows doesn't mean the NSA should hire you to harden the Linux or BSD kernels they use on their systems...
Re: (Score:1)
Re: (Score:2, Insightful)
Suuurrree (Score:5, Insightful)
Re:Suuurrree (Score:5, Insightful)
Ya.. (Score:2)
Re: (Score:3, Informative)
You'd be surprised. Back in the late '90s, when phishing first became a problem on AOL, they went so far as to modify the Instant Message window so that it contained a disclaimer, in very obvious red text, saying that no one from AOL will ever ask for your password. Believe me, very few people paid attention to that warning.
I recall sitting in the nerve center chat with the
Re: (Score:1)
Re: (Score:2)
I can tell you from personal experience that you'd be wrong. And not just because we are talking about AOL, but this will be true in any large company.
Re: (Score:2)
Unfortunately, this kid's command of the English language was no better than that of "Bob", who sits three cubicles down. To "Jim", the two were indistinguishable. It's no wonder "Jim" got phished.
Ah, the joys of going multinational.
Why? (Score:3, Funny)
Article is Loaded with Errors (Score:4, Interesting)
To quote the article:
"AOL has had pretty good security over the years."
This is a massive error in any credibility on AOL's part. Within the past 6 months there have been countless exploits in their systems including the ability to register accounts that were 1 or 2 characters long, register accounts of names that were already in use, including over registering internal accounts and accounts such as "AOL System Msg", the ability to register accounts with vulgar and racist words in them via non-American AOL sites, and thats just to name a few off the top of my head. Currently there is still a major issue with accounts having more than one working password.
I could go on and on about the flaws of AOL, but why bother, they know that the flaws exist but instead of tying to fix them they bury them by going after the people who find them, and leaving the holes still in their systems.
This kid's a punk. (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2)
What skills? Lusers like this have no skills, just programs they found somewhere. They have no idea how the programs work, couldn't write one if they did and have minimal computer skills. They're just young punks doing the computer equivalent of spray-painting graffiti, or tagging.
Re: (Score:2)
Re: (Score:1)
I don't think a life sentence is in order, but there has got to be some accountability for actions taken. I mean, by your line of thinking, why would you even interview for an IT position anymore? Just find an exploit in a prospective employer's system and run with it. Once you've caused thousands of dollars worth of damage and compro
Re: (Score:2)
Frankly, hiring crackers would be the best thing AOL could do, considering their incompetent programmers and security procedures. I'm familiar with AOL, and although their security has gotten better in some slight ways over the past 7 years, it's remain
Re: (Score:1)
Uh, "hacking crew"? (Score:1, Insightful)
They believe that they're "special" because they did it, all the while not realising that anybody can do it, but it's just that only retarded k1ddi3z are actually bored enough, or have the time to waste to do something as lame and loserish as "hack" AOL.
Re: (Score:1, Interesting)
Entirely incorrect. AOL teaches all its new hires about various social engineering attacks. I know, I was forced to sit through it on my first day as an employee. And they remind people about it at least as much as anywhere else I have ever worked.
Should they do even more? Maybe so. But the fact is that the people
One time thing? (Score:2)
Okay, so lets think about this for a minute (Score:2)
Freaky_Friday wrote with a link to an InfoWorld article about a teenage kid accessing customer information at AOL [CC]. The alleged criminal trespass began late last year, and extended up through early April. According to the article, the guy used some 'off-the-shelf' hacking software he downloaded online to gain access to, and then transmit information from, AOL's systems.
Okay, so a script kiddie hacks AOL servers and Diebold builds really bad voting systems. Which one is worse? Technically, if all that's said so far is true, the kid probably belongs on a security team at AOL. He at least knows enough holes in their security to cause them no sleep for months. Perhaps that should be the entirety of his punishment: help AOL fix their holes for free.
On top of that, lets have AOL users now hold the board of AOL responsible until they show they have fixed their security issues.
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
AOL? (Score:2)
What is this AOL you speak of?
This is news? (Score:5, Funny)
Re: (Score:1)
Too early for internets as a teen. By the time they got it together, I'd lost interest.
Re: (Score:2)
Thats because your old.
In other news... (Score:3, Funny)
Re: (Score:1)
Same old same old (Score:5, Interesting)
I remember when the phishing trend started. AOL's biggest mistake at that point was creating a special People Connection lobby that overhead/internal accounts would default to. Initially, it was just a private room whose name changed occasionally (who else remembers THEBLIMPSAIDITALL, and numerous incarnations of IllIlIIlIIlllIlIIlI...?). Anyone who knew the name could get into the room with any regular account, and phish privileged accounts to their heart's content. Eventually AOL made some progress and created a viewruled lobby, which they assumed would keep the riff-raff out, but they forgot to plan for the fact that the riff-raff already had access to privileged accounts.
In the early to mid 90s, there was no such thing as phishing. If you wanted privileged access, you had to work for it, and it was a thankless (but sometimes rewarding) task. There were a handful of folks - okay, probably a few handfuls, maybe numbering in the tens - who spent their free time doing real hacking. Those of us on the Mac side were busy poring over logs from Serial of Champions, reverse engineering the client-server communications. Through trial and error, we determined that every client request would send a two-character "token" and an argument to match. For example, double-clicking a message board to open it up might send the token "mB" with the message board's ID as the argument. Using the Keyword feature would send a Kk token, that's the only one I still remember for sure.
We eventually compiled a list of the various "tokens" that made up the AOL protocol, and what they did. There was a developer's client extension that allowed for sending arbitrary token/args, and like most things inhouse, it was leaked to a few people. This gave some of us the ability to do things nobody else could. Way before AOL ever introduced "Mail Controls," for instance, we were able to reject mail from specified users. The feature had been built into the system from the beginning but had never been released to the public (IIRC, the then-system-devs didn't even know it was possible). We'd stumbled upon the feature by sending random tokens to the server.
Here's a funny story about how something went from blackhat to implemented feature. At some point I discovered a token that would refresh the client's installed list of screen names. Basically, if you had AOL installed on multiple computers, or had multiple copies of the client on one machine, the list of your available screen names would inevitably become outdated across clients: if you created a new screen name on one client, then switched to another, the new name wouldn't show as a sign-on option. Likewise, if you deleted a screen name while you were logged in from one machine, that name would still (incorrectly) display as available on another machine. There was no way to synch up the list of names, so if you created screen name FoobarMan on machine A, the only way to sign onto it from machine B was to reinstall the client.
Well, I found out that if you sent a certain token to the server, it would force a client-side refresh of the screen names on the sign-on list. Having legitimate access to publish things - did I mention I was not only a haxx0r, but also remote staff - I created a little form with a link that would send that token, thus refreshing the client's list of screen names. I passed it on to a TechLive friend who started giving it out to members who were having this (common) problem. Eventually someone inhouse got wind of it. I got reamed, my creation was removed, and a month later a shiny new feature appeared at keyword: NAMES... "Refresh Screen Name List."
Go figure.
Accessing member information is hardly anything new. AOL has a customer management system
Re:Same old same old (Score:5, Interesting)
I won't go into much more detail, but good ole star tool (as it was called, adding a menu titled * that gave any account a direct interface to the internal FDO scripting) led to countless exploits for the small group of people able to take full advantage of it (i.e. it was significantly harder to interface with AOL through FDO than the Visual Basic programs everyone with half a brain flooded the scene with). Some of the more ambitious exploits made the news; I recall one time the leak of the next version of AOL months before it was even supposed to enter early beta got a mention in a major news outlet; while it wasn't me that leaked it, I was the one who found the eB library where it resided and passed along the token to those who did make it public. OpsSec (operations security, the highest level of AOL network security staff) knew us by name, and terminated my access more than a few times. It was really cool stuff, especially for a kid. I don't know if newer AOL software still allows clients to use tokens and other FDO code, or if AOL figured out how to secure privileged resources from those who could program in it, but back in the day security was so poor that our group of 10-13 year olds walked in and out of staff resources like they were our own personal playground.
Re: (Score:3, Interesting)
FDOs and atoms were the Windows side of things. Your mention of OpsSec brings up another anecdote. There was an internal account, "NOC Nodes," run by network ops. I o
Re:Same old same old (Score:5, Informative)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
AOL deserve everything they get (Score:2)
A year or so ago, a relative had their credit card details "lifted" while conducting a transaction over the phone with $retailer. This only became obvious when his monthly credit card statement showed payments to AOL. He called the credit card company to get the payments stopped and refunded. This took place but AOL continued to take the payments. The police were asked to intervene, but even though AOL must have had an address linked to the card details (AOL accounts require a landline don't they ?) they cl
Re: (Score:2)
Why is this happening? Well, finally after taking up the back end for so long, merchants got their act together and got the credit card companies to accept this. It has nothing to do with your bank, it has to do with Visa, Master Card and the others. What this means is that you can't sign up f
Security Campaign (Score:1)
LOL (Score:2)
AOL, so easy to hack (Score:3, Funny)
More to the point (Score:1)
Has anyone seen a lawsuit where an user can sue AOL or some other corp for not adequately protecting their info? If it can be proven that the exploit was a known exploit then it seems to follow you could sue them for not protecting the info.
Why AOL? (Score:1)
tag? (Score:2)