exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

incidents-summary.txt

incidents-summary.txt
Posted Dec 29, 2007
Authored by Ofer Shezaf

A quick summary of recent web hacking incidents in December 2007.

tags | advisory, web
SHA-256 | 575ae4cacf70f24e99a97671aa2d5b09b37e72c31a968385ce7cd153fa062ab0

incidents-summary.txt

Change Mirror Download

The last month was very active in the web application security field and at
the Web Hacking Incidents Database Project we have collected numerous new
incidents, listed below. It is very evident that both the rate of incidents
as well the amount of information about each one is on the rise.

We have also started adding more classifications to each incident. In
addition to the attack method we now track for each incident its geography,
the outcome of the attack and the industry sector it occured at. We are
going to use this information in the our first annual Web Incidents summary
report to be issued in early January.

So if you know of a web hacking incident that you feel should be in the
database and is not (or you could not find it), send me an e-mail at ofer at
shezaf.com, so it will be there in time for the annual report.

For more information and complete details of each incident refer to the Web
Hacking Incidents Database at http://www.webappsec.org/projects/whid.

Ofer Shezaf
Work: offer at breach.com, +972-9-9560036 #212
Personal: ofer at shezaf.com, +972-54-4431119

VP Security Research, Breach Security
Chair, OWASP Israel
Leader, ModSecurity Core Rule Set Project
Leader, WASC Web Hacking Incidents Database Project


WHID 2007-71: Hacker uses Social Security numbers from Ohio court site
======================================================================
Reported: 22 December 2007, Occurred: 22 December 2007

Classifications:

* Attack Method: Credential/Session Prediction
* Country: USA
* Outcome: Identity Theft
* Vertical: Government

The Secret Service has arrested at least 6 people in an investigation that
involves information theft at an Ohio court web site, which is actively used
for identity theft. At least one known identity theft case resulted in
$40,000 loss to the victim.


WHID 2007-70: Tucson, Arizona police web site defaced using SQL injection
=========================================================================
Reported: 20 December 2007, Occurred: 20 December 2007

Classifications:

* Attack Method: SQL Injection
* Country: USA
* Outcome: Defacement
* Vertical: Government

The Indonesian hacker Hmei7 has left the message "Hmei7 has touched your
soul" on the Web site of the police department in Tucson, Arizona. Only
unlike regular defacement, this time it is not the front page but rather the
news section that was modified.


WHID 2007-63: Credit card data theft at Kartenhaus, a Ticketmaster German
subsidiary
=========================================================================
Reported: 19 December 2007, Occurred: 30 September 2007

Classifications:

* Attack Method: Unknown
* Country: Germany
* Outcome: Leakage of Information
* Vertical: e-commerce

An unidentified group had stolen credit card numbers and billing addresses
of the Hamburg, Germany ticket sales office Kartenhaus, a subsidiary of
Ticketmaster. Some 66,000 customers who purchased tickets with a credit card
from the Kartenhaus.de web site between October 24, 2006 and September 30,
2007 were affected.


WHID 2007-60: The blog of a Cambridge University security team hacked
=====================================================================
Reported: 19 December 2007, Occurred: 27 October 2007

Classifications:

* Attack Method: Known Vulnerability
* Attack Method: Insufficient Authentication
* Attack Method: SQL Injection
* Country: UK
* Outcome: Downtime
* Software: WordPress
* Vertical: Education

I am sure that the guys at Light Blue Touchpaper have the expertise to
protect their WordPress installation, but they don't have the time. They
made the compromise between ease of management of their web site and its
security.
Apart from, or actually because of the fact that the victims are security
experts, this story is noteworthy due to two additional twists in the plot:

* Zero day exploit in the wild - the attacker penetrated twice, once
using a known SQL injection vulnerability, but the second time using a yet
unknown vulnerability in WordPress, which was reverse engineered and
published for the first time by the people at Light Blue Touchpaper.
* The researchers found that they can use Google to retrieve the hashed
password of the hacker. Google has become so big that it actually allows
efficient encrypted passwords lookup.


WHID 2007-62: A security flaw in Passport Canada's website
==========================================================
Reported: 19 December 2007, Occurred: 01 December 2007

Classifications:

* Attack Method: Credential/Session Prediction
* Country: Canada
* Outcome: Disclosure Only
* Vertical: Government

The Web site of the Canadian passports authority enables users to access
others' record by modifying a value of a parameter in the URI.


WHID 2007-64: Information about Duke's Students and Applicants Stolen
=====================================================================
Reported: 19 December 2007, Occurred: 01 December 2007

Classifications:

* Attack Method: Unknown
* Country: USA
* Outcome: Leakage of Information
* Vertical: Education

The personal data of nearly 1,400 prospective Duke Law School students may
have been stolen by a hacker from two separate databases, one including the
prospective students' data and another filled with requests for information
about the school.


WHID 2007-65: Facebook suing a porn site over automated access
==============================================================
Reported: 19 December 2007, Occurred: 28 June 2007

Classifications:

* Attack Method: Insufficient Anti-automation
* Country: USA
* Country: Canada
* Vertical: Information Services

Use of robots and automated software against a web site, as long as it is
not done in order to break into the site, falls into a grey area. While hard
to classify as an unlawful act, it is usually harmful to the site owner and
possibly to the site users. Apart from using valuable resources, such an
automated access may breach the site's usage license of public information
and might also indicate unlawful activity such as using a botnet. Many times
it is hard to know if such a blast of requests is a denial of service
attack, brute force password cracking or just a search engine crawler.

Going forward we are going to add such incidents to WHID if there is a
reason to believe that they are not friendly, even if the actual goal of the
attack cannot be easily classified. The Facebook case at hand is a perfect
example: while the details are not clear, the fact that Facebook filed a law
suit implies that there is fire behind the smoke.


WHID 2007-66: Hacker Conquer French Embassy In Libya Web Site
=============================================================
Reported: 19 December 2007, Occurred: 14 December 2007

Classifications:

* Attack Method: Unknown
* Country: France
* Country: Libya
* Outcome: Planting of Malware
* Vertical: Government

To iframe or not to iframe, this is the question. As malware becomes more
popular, the number of incidents, mostly insignificant, in which malware was
planted on a hacked site is rising and WHID is not the right place to list
all of them. We currently report such incidents if the hacked site is of
interest or if the attack method is known.


WHID 2007-67: The Day My Web Site Was Hacked
============================================
Reported: 19 December 2007, Occurred: 17 December 2007

Classifications:

* Attack Method: Known Vulnerability
* Country: UK
* Outcome: Link Spam
* Software: WordPress
* Vertical: Information Services

In an incident very similar to the Al Gore Hack, the personal blog of IT
journalist Tim Anderson was also hacked. Unlike Mr. Gore, Tim discusses the
breach and its origins.


WHID 2007-69: The Orkut XSS Worm
================================
Reported: 19 December 2007, Occurred: 19 December 2007

Classifications:

* Attack Method: Cross Site Scripting (XSS)
* Country: USA
* Outcome: Worm
* Vertical: Information Services

A vulnerability in the social networking site Orkut that allowed users to
inject HTML and JavaScript into their profiles set the stage for a
persistent XSS worm that appears to have affected more than 650,000 Orkut
users.


WHID 2007-61: Another inconvenient truth: Al Gore's Web site hacked
===================================================================
Reported: 19 December 2007, Occurred: 26 November 2007

Classifications:

* Attack Method: Known Vulnerability
* Country: USA
* Outcome: Link Spam
* Software: WordPress
* Vertical: Government

Whether comment spam by itself is an application failure or a necessary evil
for site allowing rich comments is an open question. However it is reported
that in this case vulnerability in WordPress allowed the spammers to
actually penetrate the site and modify pages and not just abuse comments.


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close