what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

a-19.ciac-unix-attacks

a-19.ciac-unix-attacks
Posted Sep 23, 1999

a-19.ciac-unix-attacks

systems | unix
SHA-256 | 36956b8f053b8cc55d3e539de071b280ddc059093af2eb753b1cc7a0e6de0690

a-19.ciac-unix-attacks

Change Mirror Download

FOR OFFICIAL DOE USE ONLY--DO NOT DISTRIBUTE OUTSIDE OF DOE
________________________________________________________________________
THE COMPUTER INCIDENT ADVISORY CAPABILITY

CIAC

ADVISORY NOTICE
________________________________________________________________________

UNIX Internet Attack Advisory

February 23, 1990, 1500 PST Number A-19

CIAC has learned of a large number of attacks on UNIX machines connected to the
Internet. There are several groups of attackers using a variety of different
methods to break into systems. One method is to use tftp to steal the password
file. Another is to use sendmail to append additional entries onto .rhost
files. Still another is to login to unpassworded system accounts and "Joe"
accounts (in which the username and password are identical). Many of the
attackers then exploit unpatched vulnerabilities to obtain root privileges.
Using the root account, some have installed a modified version of /bin/login.
Modifications to /etc/utmp, /etc/wtmp, and /usr/adm/lastlog have also been made
to mask the intrusion. The motivation for intrusion largely appears to be use
of machine time rather than destruction of files or damage to systems.
However, cases of malicious activity have also been observed. This intrusion
activity is widespread, and is usually difficult to detect.

CIAC recommends that you take the following actions:

1. Ensure that you have installed any applicable patches (e.g., for tftp,
restore/ dump, etc.--see previous CIAC bulletins) in your UNIX system. (CIAC is
currently preparing a checklist to help you verify that you have installed all
the applicable patches.)

2. Regularly perform an integrity check on /bin/login

3. Check for unpassworded accounts and "Joe" accounts--CIAC can supply DOE sites
with a copy of the Security Profile Inspector, a UNIX password checking tool

4. Look for suspicious connections from the University of Texas and Dartmouth
University

5. Look for strange files in /tmp

For additional information or assistance, please contact CIAC:

David S. Brown
(415) 423-9878 or (FTS) 543-9878
FAX: (415) 423-0913 or (415) 294-5054

CIAC's business hours phone number is (415) 422-8193 or (FTS) 532-8193. You may
also send e-mail to:

ciac@tiger.llnl.gov

Neither the United States Government nor the University of California nor any of
their employees, makes any warranty, expressed or implied, or assumes any legal
liability or responsibility for the accuracy, completeness, or usefulness of any
information, product, or process disclosed, or represents that its use would not
infringe privately owned rights. Reference herein to any specific commercial
products, process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor the
University of California, and shall not be used for advertising or product
endorsement purposes.

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close