- When a group of web vandals hacked into the website of USA Today on July 11 and inserted fraudulent news stories, the internet security community got a taste of just how serious web page defacements can be.
Most security professionals consider web page defacement as little more than a nuisance. However, in interviews with Computerworld US, analysts, hackers and members of some of the most infamous website defacement groups said that newspaper officials at the subsidiary of McLean, Virginia-based Gannet got off easy.
Subtle changes could have been much more damaging, hackers and analysts say. In addition, the hack demonstrates the continued vulnerability of websites resulting from poor administration.
Although the USA Today defacement led to only minor downtime for the website, Peggy Weigle, CEO of Sanctum, a security consulting firm in Santa Clara, California, says companies should fear the real economic ramifications of such hacks.
"Imagine a press release being posted that says the CEO and CFO are resigning due to undisclosed ethical or financial concerns," Weigle says. "The stock price would likely plummet immediately." Companies should always audit web applications before "taking them live" on the internet, she says.
"We found in our auditing that 90% of all attacks stem from poor configuration, and administrators that do not consistently update the software they use," says EPiC, the leader of a "white hat" hacker group known as Hack3r.com.
A hacker who goes by the handle Hackah Jak agrees. "I can in minutes code a scanner to scan the internet for two year-old known vulnerabilities," says Hackah Jak, a former member of the web page defacement group Hackweiser. "I've hit a lot of workstations this way and then worked my way through the network to the server."
Although he no longer hacks, Jak says that he has managed to break through the security of major corporations, including Sony, Anheuser-Busch and Jenny Craig International.
A hacker nicknamed RaFa is the ex-leader of the now defunct World of Hell defacement group, which racked up thousands of website defacements before disbanding last year. He says that in addition to making simple configuration mistakes, most administrators don't keep up with updates and patches released by their software vendors.
"They don't update services running on the system, and they set up permissions and software settings the wrong way on the web server," says RaFa. "Think about all of the zero-day exploits I've used. The vendors knew about 90% of those."
However, the real problem is not laziness, it's trust, says Genocide, the leader of the Genocide2600 hacker group. Most administrators and corporate managers simply trust that they are secure, he says.
"That is their first and biggest mistake," says Genocide. "People believe that since their company may not have anything that someone would want that they are free from attack." What administrators really need to do is treat every day as if they were at war and as if the enemy is always planning an attack, he adds.
"It's the companies, administrators and CEOs that don't see it that way who become the easy targets," says Genocide. "They are the ones who don't keep their firewalls, intrusion detection systems and software upgraded." And even if a company's systems are up to date now, eventually, a hole will appear, says Genocide. "Patience comes in handy if there isn't a hole readily exploitable," he says.
ScorpionKTX, a member of the hacker group known as Silver Lords, says there are many other ways administrators can slip up.
"Sometimes, we can access the server because it is configured poorly," he says. "That happens many times in Unix. Administrators also install Linux in the server because it's free, but Linux isn't easy to configure," ScorpionKTX explained.
"People also install software, such as PHP Hypertext Processor [a general purpose scripting language used in Web development], that they don't really need," he says. "Then, it is hard to verify if everything is secure. Administrators should install only the necessary software in their servers."