MI5 Website Breached By Hacker 71
Jack Spine writes "UK intelligence agency MI5 has admitted that its website security was breached by hacker group Team Elite. A member of the hacker forum posted details of the hack last week, which took advantage of a cross-site scripting vulnerability in the site's Google embedded search. MI5 admitted the breach on Wednesday, but said that the flaw had not been exploited maliciously."
Is This Good, or Bad for Mike Corley? (Score:2, Funny)
Better headline (Score:2, Informative)
MI5 allows websurfing on critical computers.
Seriously. How else would you get hit by CSS?
Re:Better headline (Score:5, Funny)
BOOM! Hit by CSS.
Re:Better headline (Score:4, Funny)
meh (Score:5, Informative)
Re: (Score:3, Informative)
The exploit is that people, especially in the U.K., will tend to trust results of a search that appear to be emanating from the MI5 website [imageshack.us], and hence, with a well-formed set of "search results," a site could be setup that mimicks MI5's, thus tricking people into revealing passwords, credit card numbers, etc.
Yeah, it's the work 4m4t3ure p0s3rz, but hey, what did you do last week?
Re:meh (Score:5, Funny)
Oblig. (Score:3, Funny)
Man.. James Bond villains are getting a lot nerdier.
Somebody beat you to this conclusion. [xkcd.com]
Re: (Score:3, Funny)
I feel like Randall Munroe my Simpsons; the thorn in my back; the down-mod for offtopic.
Re: (Score:1)
I feel like Randall Munroe [is] my Simpsons; the thorn in my back; the down-mod for offtopic.
But this is /. Randall Munroe is never off-topic... he's like a Soviet Russia joke, or an all your base joke. It's just sort of... expected.
Re: (Score:3, Informative)
No. James Bond works for SIS aka MI6.
This would never have happened before Colin was murdered.
http://en.wikipedia.org/wiki/Colin_Wells_(Spooks) [wikipedia.org]
Re: (Score:1)
Her name is K. Board... you can put your fingers all over her?
Her name is Floppy B. Hard? Teri Bite?
Just askin'!
simple test (Score:3, Funny)
If a whole bunch of fake Iraq WMD reports start showing up on the net in the next few days, then we'll know if they were really exploited or not...
Re: (Score:2)
Re: (Score:1)
Oh come on. Al Gore made a movie and a big PR tour instead of just bombing all those evil petrol-burners. The world is much more peaceful without bombing. Doesn't that deserve a Nobel Prize?
Re: (Score:1, Funny)
You should be hearing black helicopters any moment. Stay in the basement - it's safer.
Sent from my iPhone
Re: (Score:2)
If they were smart, they'd start with the guy who thought it was a good idea to allow browsers to run javascript outside the <HEAD> section.
Then they'd go after all the cowboy coders who'd be screaming "but it's soooo convenient".
Re: (Score:2)
You mean, like, in the onClick attribute?
Competence (Score:3, Funny)
I propose the MI5 website team should be known as the "Mostly Incompetent 5" team !?
Re: (Score:3, Funny)
It's hardly surprising since the pay at MI5 is abysmal. I requested an information pack during my last year of university but lost interest when I found MI5 was about the worst paying graduate recruiter and especially bad for central London. Given the pay I would imagine that anyone with competence would take a job in the private sector leaving them to scrape up the dregs.
Still, it was worth requesting the information pack for the entertainment alone because in every one of the pictures all the people wer
Re: (Score:3, Funny)
Yes yes, but your forgetting one important detail, the information pack you requested is the one they show to the public, they dont want everyone to know about the "real" pay options you get that dont have any type of paper trails, just un-sequenced stacked bills handed to you in a brown paper bag that reads "lunch - extra lettuce".
As for not looking at the camera, i guess thats just habit to them now... knowing when their picture is being taken and all :-)
Comment removed (Score:5, Informative)
Re: (Score:2)
MI5 is internal security, MI6 is the one most like the CIA/Deuxieme Bureau/KGB.
Having said that, there was an interesting article recently on the BBC quoting ex MI6 chiefs who mentioned the remarkable amount of help they received for symbolic or no compensation by ordinary people, Britons and foreigners alike, who carried out all sorts of difficult and sometimes dangerous activities voluntarily, sometimes for no more than "a bottle of wine at Christmas". It seems their main motivation was patriotism and/or
Re: (Score:2)
Re: (Score:2)
A bit misleading ... (Score:5, Informative)
So what does this type of XSS do? Mostly embarass people because defacement examples are posted to "look what I can do" forums (which is basically what happened). Think about the attack vector here, they have to get a victim to visit their specific url that includes their attack. How is that done? Malicious email, posting the link to some website or forum and hoping they find it and visit, embedding the link in other sites that have been hacked or something like a banner ad, or whatever. All of these involve the target going out of their way to visit this maliciously crafted url. When you consider that they could still do all these things without XSS and simply host malicious code themselves, all this reflected XSS is doing is making it a bit harder for an end user to spot that this is something non-standard and dangerous.
Think of it this way, "With reflected XSS, I can send them a link, and if they visit it, I can do bad things to their computer!" but then again, you can do that without XSS too, it just isn't quite as effective. How many users are taking the time to carefully look at a link before clicking on it, checking to make sure it contains the domain name they expect and not just an IP address, or a domain name that is similar, but not quite right, etc. A user who is doing this sort of thing will more likely fall victim to this XSS attack, but most users, who don't scrutinize things at that level, were just as susceptible to a classic phishing/malicious linking attack anyways.
Re: (Score:2)
I see this and think the word "Hacked" gets thrown around a bit too easily. .
shhhh they need the ratings.
Re: (Score:3, Insightful)
more so when you consider the fact that there is no login form on their entire website. if these hackers can exploit something that doesn't exist, they're truly the cream of the crop. what's next? sql injection on static html?
Re: (Score:2)
Re: (Score:2)
When you consider that they could still do all these things without XSS and simply host malicious code themselves
Sure but people are still more likely to click on URL containing a domain name that ends with ".gov.uk".
Re: (Score:2, Informative)
You mean links like this? http://www.mi5.gov.uk/ [slashdot.org]
Re: (Score:1)
You mean links like this? http://www.mi5.gov.uk/ [mi5.gov.uk]
Good thing I am on OSX running Safari.... Hovering the mouse over the rendered text of the link shows me the actual domain I'm going to be vectored to... Gosh wouldn't want to go there.... might be dangerous!
Re: (Score:1)
Do you mean the tooltip? Slashdot adds a title attribute containing the domain. The title tag exists exactly for the purpose of showing something when you hover. I'd expect any current browser to show the target domain on Slashdot when hovering the link.
BTW, even if Safari normally shows the link target as tooltip, what does Safari show when you hover over a link with a title tag? The content of the title tag, or the actual linked domain? I can't give such a link, because Slashdot replaces the title tag wit
Re: (Score:1)
It shows it as a tooltip. So does the Mac OS Mail program. This works for all linked passive content displayed by WebKit.
It shows more than the domain. It shows the actual domain and path that clicking on the hot-text will request. WebKit has done this since at least Mac OS X 1.2.X
One place I's like to see it expanded in active content.... I have to watch my cursor very carefully on ad-rich pages to avoid getting whacked by active content. Not that it does anything worse than crash Safari browser
this XSS is overrated (Score:1, Insightful)
I'm not sure I'd call exploiting an XSS vulnerability penetrating. Sure, it can be used with a hybridized CSRF attack to penetrate into otherwise restricted areas of a website (although I don't know of such areas on MI5's website), but XSS, in and of itself, is more akin to graffiti than anything else.
And, btw, I don't consider the social engineering element of XSS to be a particularly bonafide threat. If someone's going to provide all their personal info because the MI5 website, through XSS, asked for it,
Well, at least the terminology is right... (Score:1, Redundant)
Re: (Score:2)
Re:Shit it's Neo (Score:4, Informative)
How could they ever abuse this "hack" anyway? "Hey man check the MI5 website by following my link here, it's a really cool governmental agency really. Please click!"
Hey, did you know that someone on the MI5 site with your name is listed as a terrorist. He lives in the (your city) region as well. I'd watch out if I were you, someone might get the wrong idea. Here's a link [mi5.gov.uk] so you can check it out yourself.
NSA anyone ? (Score:3, Interesting)
any "l33t hax0r" in the house brave enought to try this shit on the NSA ?
considering that i never heard of any snafu from those guys, either their pretty good at sevuring their stuff, or incredibly efficient at snuffing anyone who tries it before news get to public.
sincerely, i don't know which one is the scariest scenario.
Re: (Score:3, Informative)
I doubt the NSA cares. Their public websites arent hosted or even maintained by the people who do their cracking. The probably have a hosting service and if the site gets defaced or goes down, its no big deal. Its not exactly sitting on some high security LAN.
Websites are the low hanging fruit in the hacker community. Its like spray painting my garage. You can be a jerk if you want to, its just not worth it to obsess over protecting said garage.
Re: (Score:1)
any "l33t hax0r" in the house brave enought to try this shit on the NSA ?
Like 6ish years ago I sent the NSA an example of a similar cross-site bug like this, when they were using ColdFusion for their web server. I could pretty much display anything on their site to a user, given a long link, which is what others are describing this as.
Unfortunately, now we have things like TinyURL and bit.ly which everyone uses for twitter, which could make them unknowingly spread fake information, or run scripts, which appear to be from trusted domains.
Send the new Bond after them! (Score:2)
Send in the new Bond after them, hackers might think twice after seeing these guys get a few bullets in the back of their heads!
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
If you read my post carefully you would have seen that I thought of that and wrote
to make sure I was not referring to the original hackers, but others looking unto these ones.
Simple explanation for the security breach (Score:2, Funny)
http://apple.slashdot.org/story/09/07/29/1440233/Apple-Says-iPhone-Jailbreaking-Could-Hurt-Cell-Towers [slashdot.org]
Roberto
Someone is missing the point (Score:3, Insightful)
Why is this interesting? (Score:1)
Re: (Score:1)
What about wardriving?
In other news... (Score:3, Funny)
A hacker's apartment in London was invaded by a gang of unknowns. Nothing was stolen, but his computer was smashed, his books urinated on, and the victim suffered a broken leg, torn elbow tendon, and a few cracked ribs after reportedly being waterboarded in his own kitchen.
Re: (Score:1)
And yet you still feel the need to hide behind AC?
Your method of communication exposes your stink of fear....
I'll spare you the shame and follow up....
TE is a bunch of pu#$^#$%^$%^ ---NO CARRIER