Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

"Crimeserver" Full of Personal/Business Data Found 114

Presto Vivace sends news of a server found by security firm Finjan that contained a 1.4-GB cache of stolen data, accumulated over a period of less than a month from compromised PCs around the world. The "crimeserver," as Finjan dubs it, "provided command and control functions for malware attacks in addition to being a drop site for data harvested from compromised computers. ... The stolen data consisted of 5,388 unique log files including 1,037 from Turkey, 621 from Germany, 571 from the United States, 322 from France, 308 from India and 232 from Britain." Oddly enough, the data was stored in the open, with not even basic auth to protect it. Finjan notes in their press release that this huge trove of data gathered over a short period of time indicates that the crimeware problem is far larger than most observers have been assuming. Update: 05/08 12:29 GMT by T : Note, the security firm involved is spelled "Finjan," not "Finjin" as originally shown.
This discussion has been archived. No new comments can be posted.

"Crimeserver" Full of Personal/Business Data Found

Comments Filter:
  • by morgan_greywolf ( 835522 ) * on Tuesday May 06, 2008 @07:18PM (#23318676) Homepage Journal
    Why would they need basic auth? After all, the security on the compromised computers was bad enough for them, complete random strangers to the owners of the PCs, to bypass system authentication and authorization controls to grab the data in the first place.
    • by kcbanner ( 929309 ) * on Tuesday May 06, 2008 @07:21PM (#23318708) Homepage Journal
      Because all scammers aren't friends with each other.
      • Re: (Score:3, Interesting)

        by Kingrames ( 858416 )
        I don't think that's it.

        I think they recognize that getting the information was as easy as walking through a door, and so they don't trust any security measures other than physical security.
      • So what?

        When you can collect that much data that quickly it has very little value.

        Even if all the data were compromised and all the CC/Acct numbers changed before the harvester could use it, the only thing truly lost is the opportunity costs involved in gathering the data itself.

        It just makes no sense to spend time securing the data and coming up with an authentication mechanism (After all, this server needs to accept uploaded data from their botnet.)

        That time would be better spent just creating more system
        • So what?

          When you can collect that much data that quickly it has very little value.
          What do you base that assertion on? I can't, in my experience, correlate the value of data to the time it takes to acquire it.

          What's more, I suspect that the fact that all that data was harvested implies value.
          • Is your experience in using a botnet to harvest personal data from users?

            Because in this particular case, the value of the data is nothing more than its sunk cost + opportunity cost.

            It was collected so quickly, that those are both low.

            If you can get 100 more CC numbers and bank accounts in a day/week/whatev the value of the data is less.

            Kinda like how if you make $120 an hour you can justify spending $4 on a cup of coffee where you really can't if you're out there making $6.50 an hour.

            So there you go, now r
    • by CodeBuster ( 516420 ) on Tuesday May 06, 2008 @07:21PM (#23318712)
      Well, if they were planning to sell the pilfered information then it helps if their...ahem...customers cannot simply help themselves.
      • Re: (Score:3, Insightful)

        by Anonymous Coward
        Maybe its a free sample?
    • by NoobixCube ( 1133473 ) on Tuesday May 06, 2008 @07:21PM (#23318714) Journal
      My first thought was, surely someone who accumulates this kind of data would go to some lengths to secure it. That leads me to believe that this "crime server" is owned by an amateur. The computer crime equivalent of a petty thief. Imagine how many properly run and hidden crime servers must exist. And think how many more petty thieves must own similar ones.
      • Unless the criminal is a complete idiot there's more than one drop spot... I mean, obviously you wouldn't want to design this sort of single point of failure into any C&C system.
        • by yuna49 ( 905461 ) on Wednesday May 07, 2008 @12:23AM (#23320558)
          Unless the criminal is a complete idiot there's more than one drop spot...

          Indeed. If I were writing botnet software I'd distribute multiple copies of the collected data across a number of the compromised computers. The press release and article abstract indicate that the botnet control programs and the data were located in the same place. That doesn't seem like a particularly good architecture for this type of system. I'd keep the command programs far away from the harvested data. My hunch is that the data aren't that valuable as I outline below.

          I can accept that buying, installing and running a botnet could be as easy as installing an RPM. What appears more disturbing is the reported "timeframe of less than a month" to harvest over 5,000 records. But what kind of records are these? Finjan tells us [finjan.com] that the data "consisted of 5,388 unique log files [my emphasis]. Both email communications and web-related data were among them."

          They go on to list some specific examples:

          Compromised patient data
          Compromised bank customer data
          Business-related email communications
          Captured Outlook accounts containing email communication

          I'd be curious to see how much actual "patient" or "bank customer" data is revealed in "log files." /var/log/maillog on my servers would certainly reveal "business-related email communications" in the sense of senders and recipients. Mail logs might also contain some entries for mail between providers and patients or between banks and their customers. Apache logs wouldn't be so useful, though they do contain the usernames when Basic Authentication is used. But none of those logs would reveal much about the content of those communications. I don't know anything about Outlook so I have no idea how its logs might reveal "captured Outlook accounts containing email communication."

          Still if all they got after a month were logs, I'm not sure how valuable they would be unless the goal was harvesting addresses for spamming or phishing. Capturing the logs of compromised mail servers would certainly yield a pretty high proportion of legitimate addresses, especially recipient addresses. This method seems especially attractive if you're trying to identify targets for "spear-phishing." If you can compromise some corporate mail servers, you can build up a nice list to "spear."

          So I'm guessing Finjan found a machine containing some 5,600 mail server "log files" totalling 1.4 GB. Since the logs are worthless once the addresses are harvested, protecting them isn't much of a priority. I suppose competitive spammers might want to keep these potentially higher-yielding names to themselves, but given the volumes at which spammers operate, they probably don't care.

          I think I'll go take a look at my mail servers now just to ease my mind.

          • I agree, and also believe that any true malware writer will also incorporate
            p2p torrent download technology so that a file of 1.4 gb. can be shared by all
            child nodes within a network if so chose to ...and the download time would be minimal.

            Therefor, a botnet with 1000 pcs...could easily host a few hundred copies...

          • I'd be curious to see how much actual "patient" or "bank customer" data is revealed in "log files." /var/log/maillog on my servers would certainly reveal "business-related email communications" in the sense of senders and recipients. Mail logs might also contain some entries for mail between providers and patients or between banks and their customers. Apache logs wouldn't be so useful, though they do contain the usernames when Basic Authentication is used. But none of those logs would reveal much about the content of those communications. I don't know anything about Outlook so I have no idea how its logs might reveal "captured Outlook accounts containing email communication."

            You are assuming that the discovered log files are logs copied verbatim from the victim machines. It is more likely that these are logs of collected data (e.g., keystrokes, mouse clicks, screen snapshots, actual emails) captured using spyware or keyloggers.

            If that is the case (and the story does not make it clear), then such logs certainly contain credentials and other identifying information to allow anyone to access bank accounts, private patient data, and so on.

          • Actually, the log files refer to the logs sent by infected machines. These logs contain keylogged data that correspond to forms posted through IE and Firefox, as well as "datastore" information (credentials cached by IE, Outlook, and FFox).
            This means that the 1.4Gb of data, while containing some less useful information, is much more valuable than you have indicated above...
            Having said that, and realizing that this data is not just a mail/http log file, one can really start to grasp the true meaning of suc
      • Re: (Score:1, Insightful)

        by Anonymous Coward
        What amazes me is how quickly people adopt meaningless buzzwords like "crimeserver".
        • I only used it because it was used in the article. Little things like making sense just seem to matter to me, so I wasn't going to reinvent the wheel by using my own word for something already named in the story. It may have a particular name already ('server' on it's own seems good enough), but since I'm talking about this story, I'll talk within it's terminology. Hence the quotation marks on "crime server", when I used it.
        • by bhhenry ( 83946 )

          What amazes me is how quickly people adopt meaningless buzzwords like "crimeserver".
          Hey! It's a unique skill to be able to come up with virulent memes.
      • Well, my thought was this: If they leave the info unguarded, they run the risk of someone stumbling on to the data and sharing their work. If they put effective authentication methods in place on the data, then they have established a definitive link between themselves and the data. They can claim innocence if by some stroke of bad luck they are being monitored and are caught logging in, but not if they use their personal GPG key to authenticate.
      • They were credit card numbers, not MP3s. Only pirates go to great lengths to secure their stolen goods.
        • If I were to steal a credit card number, I'd want to be the only person with access to it, so I could max it out. Otherwise it's the same as robbing a bank and storing all of the cash safely in the town square.
          • Sure. But that's not a likely scenario.

            What's likely is that if you were to steal a credit card number, you'd also steal 20 others that day, and 20 more the next, and so on.

            And all of a sudden the value of a given CC is almost zero.

            A more apt analogy would be like a bank robber stealing $100,000 and fretting over each $100 bill. If YOU dropped $500 finding it would be your #1 priority. The same could not be said of that bank robber.
      • by dbIII ( 701233 ) on Wednesday May 07, 2008 @02:42AM (#23321146)
        The slang is "script kiddie".
      • But that's honestly a little naive.

        It's like the guy that steals your mail to get your account numbers. Do you think he shreds those when he's done with it?

        The cost of data-loss to these criminals is so low to nearly be non-existent.

        It's simple threat assessment / risk analysis.
    • by Opportunist ( 166417 ) on Tuesday May 06, 2008 @09:35PM (#23319616)
      This might come as a surprise, but scammers are not necessarily more tech savvy than their victims.

      This isn't the first completely unprotected (or default password protected) scammer server. Actually, a certain security company which I won't name (but you can guess it...) will have a hard time working with certain other security companies from now on since there are things you don't yap about. Those hardly-if-ever protected ID-theft servers is one of those things.

      The reason is twofold. First of all, those criminals with a minimal technical knowledge (most of the times, those drop servers are part of the package you buy from someone who does actually know how to use a computer and write the necessary client/server package to steal information) might start wisening up and protect their servers better, making our work harder. It's the whole "the less your enemy knows about you and the more you know about your enemy, the better" thing.

      The second reason, though, is even more important. When it becomes "mostly common" knowledge that there are servers stuffed with stolen information, a second part of the criminal chain opens. Well, opens isn't the right word, it already opened, but it will have a wider, let's say, audience. People who want that information for their own goals won't infect your machine but rather try to steal from the thieves, multiplying the problem in proportions that cannot even be measured anymore. So far, we have a pretty good picture of the threat and problem, knowing (or at least being able to estimate) how many people are infected by a certain trojan, what information is siphoned and by the actions taken thereafter, we can draw a picture of the threat, the goals of the group that siphoned the information and so on.

      If now many criminals start working with the same data base, it becomes a damn lot harder to even try working out a threat scenario.

      That's why this is being kept on a low profile, and why nobody so far went out into the broad public about it. It's one of those "don't give them ideas" doctrines. I was certainly not in favor of the idea when it was presented, because withholding information does rarely lead to more security. I just couldn't offer a better solution. Or at least a better broom to keep the ocean at bay.
      • When it becomes "mostly common" knowledge that there are servers stuffed with stolen information, a second part of the criminal chain opens.

        Just what we need -- thieves stealing from thieves. Except here the problem is that the information (your name, address, social security number, bank account numbers) is all digital and can be copied an infinite number of times. If a thief steals from a drug dealer ("rip and run") then the drug dealer knows he's been hit and is likely to take security measures. If thief steals from an identity thief, it might not even be obvious that anything was taken until it's already too late.

        This is why it's VERY i

        • Re: (Score:3, Interesting)

          ...As if there aren't already?

          I mean, it's not like we have regular drivebys, but Russian spammers keep getting found dead... You do the math.
        • I seem to recall different rootkits disabling each other, around the time that mytob was released (may have been related to mytob)
      • kick ass. and u just posted one of those "don't give them ideas" idea on a slashdot ...
  • WTF (Score:4, Interesting)

    by ColdWetDog ( 752185 ) * on Tuesday May 06, 2008 @07:20PM (#23318692) Homepage

    The person that operated this server had no clue on security, he had no clue about how to configure a Web server. He just took a ... toolkit and started to use it and in three weeks he managed to have this fortune, this treasure on his server."

    I know it's just a rehash of a press release, likely taken out of context from what was originally said, but - WTF?

    I don't think that malware is so advanced that all you have to do is "use a toolkit" and poof - magically financial and personal data will just show up on the hard drive. Maybe the guy's server was pawned - he is at least acting like he doesn't know what he is doing, but come on.

    If it's that easy, I'm gonna try it....

    • Re:WTF (Score:5, Funny)

      by Bryansix ( 761547 ) on Tuesday May 06, 2008 @07:22PM (#23318716) Homepage

      If it's that easy, I'm gonna try it....
      I'll make sure to alert the authorities.
      • If it's that easy, I'm gonna try it....

        I'll make sure to alert the authorities.

        They will be expecting the usual payment.

        I kind of was kidding when I started this joke, but I think it isn't really that much of a joke considering status they found that server in. It may well have been a gift of junk data, stuff they couldn't use anyway. If you can write malware and don't lock the server it goes to you are doing that for a reason not in error.

        I not only look gift horses in the mouth I do DNA testing.

      • by WK2 ( 1072560 )

        If it's that easy, I'm gonna try it....
        I'll make sure to alert the authorities.

        Bryansix, what part of this sounds like we should involve the authorities?

    • Re: (Score:3, Insightful)

      by epiphyte42 ( 1236934 )

      I know it's just a rehash of a press release, likely taken out of context from what was originally said, but - WTF?

      If it's that easy, I'm gonna try it....

      Did you consider the fact that the stuff that does all the hard work is actually .... software?! In other words, if some black hat makes a nice package with a decent installer and good documentation it could well be that it is less complicated to setup such a server then, say, setting up a decent webserver. The app in question would then do something like: 1: look for vulnerable pc's 2: infiltrate weak ones with preprogrammed stuff 3: send data back to simple integrated webserver 4: goto 1 The componen

    • Re:WTF (Score:5, Funny)

      by commodoresloat ( 172735 ) * on Tuesday May 06, 2008 @08:31PM (#23319196)

      Maybe the guy's server was pawned
      Why would you take a server with all that valuable data to a pawn shop?
    • In my day to day administration duties of your average admin maintaining your average server, the exploit scripts that attack Linux boxen are either on autopilot or obtaining the search parameters remotely - if searching for exploits from a static/dynamic list is successful, it's not that far of a leap to imagine a list of parameters to search for valuable data.

      The stuff I see sometimes in /tmp, will never cease to amaze me.
    • Re: (Score:2, Interesting)

      by DogDude ( 805747 )
      I don't think that malware is so advanced that all you have to do is "use a toolkit" and poof - magically financial and personal data will just show up on the hard drive.

      Actually, it IS that easy. Tools like that have existed for years. Anybody with malicious intent and even a basic understanding of computers can easily run their own bot-net. Really. Literally a few button clicks, and the data is yours.
  • by mungmaster2000 ( 1180731 ) on Tuesday May 06, 2008 @07:30PM (#23318774)
    "The server was not secure at all. It indicates that these people that are doing the crime today, they are not security experts, they are not computer science experts." Uhhh....So someone knocks over a liquor store with a 9 mm. Does that mean that he's a gunsmith or a sharpshooter, or skilled in advanced war-fighting techniques of some kind? No...Chances are he's a just a guy with a gun. People use whatever they can to take what they want. Film at eleven.
  • 5 dollars, do i hear 5 dollars
  • Why is Turkey at the top? I had not heard before that Turkey is a haven for unpatched machines. Maybe mainly a local or Kurdish crimeserver?
  • by Whuffo ( 1043790 ) on Tuesday May 06, 2008 @07:42PM (#23318860) Homepage Journal
    Must be a slow news day for this kind of astroturf to bubble to the top. Notice how carefully they count how many people in each country had their data stolen and stored on this server. Also notice how many of those people these security folks notified of the data breach. Yup, exactly zero.

    So they're not trying to help at all. What they're trying to do is sell their services and using this pseudo-news article to do it. Shame on them.

    • Must be a slow news day for this kind of astroturf to bubble to the top.
      If you pay attention, you'll see that about 60% of "stories" on Slashdot fit the Astro Turf profile.

      News flash, oh SlashDrones, Slashdot is like Google, a commercial money-making business . WORD...

    • Re: (Score:3, Insightful)

      by TubeSteak ( 669689 )

      Also notice how many of those people these security folks notified of the data breach. Yup, exactly zero.
      What are the odds that one of "those people" would sue the security firm?
      Even white hats have to deal with the PHB who wants to blame you for their problem.
    • by camperslo ( 704715 ) on Tuesday May 06, 2008 @09:10PM (#23319428)
      Notice how carefully they count how many people in each country had their data stolen and stored on this server. Also notice how many of those people these security folks notified of the data breach. Yup, exactly zero.

      People may not have been contacted directly, but those in a good position to quickly mitigate damage were notified:

      "Finjan Inc said it had notified the U.S. Federal Bureau of Investigation, police in various countries and more than 40 financial institutions in the United States, Europe and India about the discovery of the so-called "crimeserver".

      So they're not trying to help at all. What they're trying to do is sell their services and using this pseudo-news article to do it.

      Do you actually have any evidence of this? What were they trying to sell to who?
      I would expect a press-release type of promotional piece to have more information about the services the company offers.
      • It should really be handled by the Secret Service: they're responsible for wire fraud, as the law enforcement arm of the Department of the Treasury. They've shown little signn over the years of being competent at managing computer crime, but it is their job.
  • HoneyPot (Score:3, Insightful)

    by camperdave ( 969942 ) on Tuesday May 06, 2008 @08:15PM (#23319082) Journal
    Oddly enough, the data was stored in the open, with not even basic auth to protect it.

    Sounds like they found a honeypot [wikipedia.org] or a decoy to me. Now that the bad guys know that the good guys are on to them, they can disappear into the ether for a while until the heat dies down.
    • Re:HoneyPot (Score:5, Interesting)

      by Lumpy ( 12016 ) on Tuesday May 06, 2008 @08:29PM (#23319178) Homepage
      Actually that's called a tripwire. Back in the 80's when I knew some hackers really well I helped set up several tripwires. They went hand in hand with modem hop points. You Social engineer into an office building, best is a multi business place. get to the phone room and fine a couple of demarc boxes that are old and gut them. Install a pair of modems back to back and you can hop from one phone line to another to mask your call if it's traced.

      to make a tripwire you add in a second box like that, have your outgoing line go into and out of the box, install a isolation relay or switch that when the box is opened it dumps 120VAC into the phone lines This typically smokes a modem hard making it impossible for them to recover any info inside it. (mostly designed to piss off the feds/cops) but it disables the modem and the line tipping you off that that relay has been compromised.

      worked well, One "friend" had 5 of his relays compromised in one night, tipping him off that something big was happening and he laid low for a while.
      • What relay did you use? The ones that handle 120V reliably tend to be rather expensive.
        • They don't need to handle it reliably ; just long enough to fritz the delicate sensitive electronics in a modem.
        • What relay did you use? The ones that handle 120V reliably tend to be rather expensive.

          You can get such relays [active123.com] for about six bucks, and if you shop around, I'm sure you could get them cheaper.
      • by ei4anb ( 625481 )
        120V into a modem would just make the opto-isolator pop like pop-corn but it probably would not damage the rest of the electronics (I have worked on modem design).

        The most likely result would be to add "intent to do bodily harm" to the charge sheet, or worse if the telephone company technician was following the wires when someone opened the box :-(

        • Re: (Score:3, Insightful)

          by Anonymous Coward
          First telephone wires carry over 90VAC on them all the time.

          Second 24Ga wire cant carry any current it smokes out right away.

          Thirdly it does in FACT smoke the modems that were made back in the 80's and early 90's Hayes and USR modems back then could be eaten alive easily by 120VAC at any strength inot the phone port, better would be to also run a pair of wires to the modem's power supply side as well.

          Fourthly it also pop's the Telco gear at the Switching station dropping the line off so when you call it
      • I would think that they would still be able to tell which phone lines the modems were wired to which is all they really need to know to trace the calls through them.
  • by Fluffeh ( 1273756 ) on Tuesday May 06, 2008 @08:26PM (#23319166)
    Perhaps this data was intentionally left out in the open by whoever had it first?

    If you think about it, if you just hacked into a users pc and nicked something (credit card info, passwords, whatever) and used them quietly to some degree, wouldn't you WANT someone else to use them, perhaps not so quietly? I mean, you want a fall guy right? Let the next script kiddie run through and take the fall. With a bit of luck, they will pin all the activity on the new guy rather than the guy who carefully used this once, then let the information loose on the masses.

    It's not "accidentally" or "stupidly" left unprotected, it's a perfect smoke screen to cover tracks if you ask me.
  • these guys are such press whores. you can google to find a ton of open drop sites like this. the fact that they bothered making ridiculous statistics and press release on something so common just shows how pathetic they are
  • The correct spelling is Finjan (not Finjin). The word means a small metal container in which Israelis (and Arabs) cook their coffee.
    • since we're getting technical, I am assuming you mean, in which they brew their coffee.
      • since we're getting technical, I am assuming you mean, in which they brew their coffee.

        Ever had Arabic coffee? "Cook" is a more appropriate term.

  • 1 hard drive doesn't make for a very impressive visual aid.
  • this huge trove of data gathered over a short period of time indicates that the crimeware problem is far larger than most observers have been assuming.

    Maybe so - but conversely they may not be able to use all of it (at least for time-limited things like credit cards) before it's expired, making me happy that they have lots of data, because when (not if) my data gets stolen from somewhere, I'm less likely to be one of those exploited. Whee.
  • Gee what gripping news of cutting-edge malware research; I found one of these, of similar size, two years ago. The FTP credentials were in plain text in a config file dropped by the malware. It was childs play getting in and getting enough info for authorities to do something about it. Shortly after that it disappeared. It was created by stupid people who were playing with things they didn't really understand, although I'm sure they understood the $$$. I remember thinking at the time "this would be cool if
  • Oddly enough, the data was stored in the open, with not even basic auth to protect it
    I'd do this if I wanted to frame the server owner, or if I were the server owner and planned to deny everything and claim it was a plot to frame me.
  • > a server found by security firm Finjin that contained a 1.4-GB cache of
    > stolen data, accumulated over a period of less than a month from
    > compromised PCs around the world. The "crimeserver," as Finjin dubs it,
    > "provided command and control functions for malware attacks in addition
    > to being a drop site for data harvested from compromised computers..."

    Fucking Morpheus! Can't the feds ever stop this guy?!?!?
  • As a service to fellow Slashdot readers, I'm more than happy to report back and let you know if your personal or financial information has been compromised.

    Simply give me as many search terms as you can think of, and I'll let you know. Examples: Your name. SSN. Bank Account Routing and Transit numbers. Mother's Maiden Name. Any other search terms that you want me to search for.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...