Hackers in the Library

advertisement
Hackers
Creative Commons License: You are
free to share and remix but you must
provide attribution and you must share
alike.
in the
Library
Michael McDonnell
GIAC Certified Intrusion Analyst
michael@winterstorm.ca
Library Website Shutdown by Hacker
ILS Server Hacked
This isn't exactly true: Unix isn't any more or less “hacker friendly”
than any other OS (not at this level of discussion). Beware, this
opinion is expressed in the L.I.S. literature (but contradicted in
I.T. Literature). Don't play the blame game... come up with a
defense-in-depth strategy instead.
Library Phonelines Hacked
Even Library of Congress was Hacked
And More...
Many Library Hacks: Old & New
This talk covers 3 Kinds of
Library Cybersecurity Case Study
1 Libraries as unique targets
2 Libraries as attractive targets
3 Trends in cybercrime
Libraries fit into the
2nd Most Hacked Organization Type
Libraries
Shezaf (2008)
Libraries can be Unique Targets
Public Access Computers
+
Lots of Users
+
Private Records for Large Populations
+
Lots of Bandwidth
+
Access to Valuable Licensed Information
PAC Desktop Wallpaper Defacement
A politically motivated defacement of PAC station desktop
wallpaper. The regular wallpaper was used to provide
instructions for use of the PAC and was “locked down”.
Helpful HOWTO on Library Hacking
Ezproxy Password “Fans”
Academics and Doctors Dedicated to
Hacking Libray Proxy Servers
Forums show why libraries
are being targeted
Typosquatting Virtual Reference
Typosquatters
have websites
with popular
mispellings for
names
In 2006 several
cybersquatters
displayed content
from and links
back to
askaquestion.ab.ca
Is that GOOD
thing or a
BAD thing?
Student Sent a Prank Overdue Notice
First overdue notice:
According to our records, the following library material is overdue.
renew or return as fines may be accruing.
Please
Currently you owe $542.53. If you
do not pay by 10/10/2008, your University degree will be immediately
revoked.
If you wish to renew, you may do so using this link to My Account at
http://catalogue.library.ca/myaccount/
Contact the circulation desk at the above library if you have any questions.
Thank you.
1
call number:Z 699 A1 A61 v.39 2005
ID:0162022610438
$30.00
Annual review of information science and technology.
[Washington, etc.] American Society for Information Science [etc.]
due:8/31/2008,23:59
2
call number:Z 699 A1 A61 v.40 2006
ID:0162022610487
Annual review of information science and technology.
[Washington, etc.] American Society for Information Science [etc.]
due:8/31/2008,23:59
....
$21.00
Library Patron Records Exposed
Libraries are Attractive Targets
Lots of Bandwidth
+
Lots of Users
+
Open Networks
+
Weak I.T. Practices
Turkish Defacers Attack
Museum Greeting Cards
Wordpress Spam Link Injection
Library GIS Station Hacked
Hacked to Serve Illicit French Movies
?
An unpatched server was compromised and used to distributed 20 GB
of videos with French language titles. The problem was discovered
when the server was blocked for excessive bandwidth usage.
French Puppet Videos!
The server was distributing 20 GB of French Puppet Videos. The
cleanup time was 7 hours. If they had just asked we would have
probably found someone to host the videos for them!
Trends in Cybercrime
Will Affect Libraries
Every factor already mentioned
+
Hacker's desire to make money
Hackers are motivated by Money
Defacement
– Propaganda
– Bragging Rights
– Reputation Hijacking
– Ad Revenue
Types of Cyberattacks by Volume
Shezaf (2008)
Stealing Sensitive Info
– Ransom
– Direct Financial Gain
– Information Leaks
– Enable other Attacks
Library Phonelines Hacked
Phishing & Spear-phishing
From: anitajohnsonrosjn@gmail.com
The only money you have to send to the Bank is the account opening fee due to
To: <undisclosed recipients>
my method of deposit. Again, don't be deceived by anybody to pay any other
Subject: (TRANSFER CONTACT)
money except account opening charges.
My Dear,
Please kindly contact the bank on Tel: +13-162-651-1808 /Fax:
+31-847-301-282. OR via E-MAIL: snsregiobktransfers.unit1@hotmail.com with
It`s me Mrs. Anita Johnson Ross, please I have been waiting for you to
your full names contact telephone/fax number and your full address and tell
contact me regarding your willed fund of ($3,500,000.00) (Three million five
them that I have deposited the sum of ($3,500,000.00) in the Unit account of
hundred thousand dollars) but i did not hear from you since the last time.
the bank and you are the present beneficiary to the sum. I will inform the
Well I finally went and deposited the fund in a bank, as I will be going in
bank immediately that I have WILL-IN that amount to you for a specific work.
for an operation any moment from now. I hope you are aware that I have been
diagnosed for cancer about 2 years ago, that was immediately after the death
Let me repeat again, try to contact the Bank as soon as you receive this mail
of my husband before I was touched by God to donate from what I have
to avoid any further delay and remember to pay them their account set up fee
inherited from my late husband to you for the good work of God than allow my
for their immediate action. I will also appreciate your utmost
relatives to use my husband hard earned funds ungodly.
confidentiality in this matter until the task is accomplished as I don't want
anything that will jeopardize my last wish. Also I will be contacting you by
What you have to do now is to contact the Bank as soon as possible to know
email as I don't
when they will Transfer the money to you to start the good work of the lord
want my relation or anybody to know because they are always around me.
as initially arranged, and to help the motherless less privilege also for the
assistance of the widows according to (JAMES 1:27). For your information, I
Yours Faithfully,
have paid all the Charges, Insurance premium and Clearance Certificate
Mrs. Anita Johnson Ross
showing that it is not a Drug Money or meant to sponsor Terrorism in your
Country.
DNS Poisoning
The cyberbrowse
owner gets paid
$$$ when people
view or click on ads.
We found that Big
Public Library's
DNS servers were
being poisoned to
misdirect browsers
to the cyberbrowse
website
How DNS Works
6
1
What is the IP for
www.hotmail.com?
Your
PC
Get the webpage
from 64.4.33.7
www.hotmail.com
64.4.33.7
The IP for hotmail.com
5 is 64.4.33.7
Your
DNS
Server
2
What is the IP for
www.hotmail.com?
4
3
Hotmail's
DNS
Server
Remember
hotmail.com
Is 64.4.33.7
DNS Cache
The IP is 64.4.33.7
How DNS Poisoning Works
3
What is the IP for
www.hotmail.com?
Your
PC
5
Get the webpage
from 69.93.150.59
www.hotmail.com
64.4.33.7
The IP for hotmail.com
4 is 69.93.150.59
Your
DNS
Server
Remember
2 hotmail.com
Is 69.93.150.59
1
Hotmail's
DNS
Server
DNS Cache
The IP for
www.hotmail.com
Is 69.93.150.59!!!
Hostile
DNS
Server
cyberbrowse.com
69.93.150.59
Cyberbrowse attack was widespread
In 2003, others
suffered from the
cyberbrowse
DNS Poisoning
Many mistook the
attack for a
problem with their
own computers
I spoke with
Shaw Bigpipe
and confirmed
that they were
under attack for
months but didn't
know it was an
attack.
The Crimeware Supply Chain
•
How SPAM Makes Money
• Viruses create botnets (networks
of thousands of slave computers)
• Botnet owners pay to have
viruses distributed
• Spammers pay botnet owners to
send spam
• But spamming requires accounts,
which are protected by
CAPTCHAs
• Botnet owners pay CAPTCH
breakers
• How Credit Card Theives Work
• Viruses steal credit card and
identity info
• Card information is sold to others
• Carders use stolen cards to
purchase items
• Remailers ensure shipped items
can be obtain
• Items may be sold
Stealing from your Bank Account
• Banks accounts are broken into
• “Money Mules” accept payments
to their own accounts and then
pay the theives
Breaking CAPTCHAs Pays
This pays about
$2/1000
CAPTCHAs broken
occording to a
presentation at
OWASP 3.0
From Dancho Danchev's Blog: http://ddanchev.blogspot.com/2007/09/spammers-and-phishers-breaking-captchas.html
Affiliate Marketing Pays for Viruses
Cybercrime has grown to include
complete supply chain management
Questions?
email me:
michael@winterstorm.ca
Slides:
http://winterstorm.ca/download/
No virus news is NOT good news
• Problems
• Old anti-virus programs cannot
detect the latest types of
viruses
• Viruses released today cannot
be detected until tomorrow
• Viruses come in clusters: you
might only detect on when you
are infected with 5
• No anti-virus program can
detect all viruses
• “Solutions”
• Update your anti-virus
software, not just the
definitions
• Peform a full-antivirus scan
every few days
• Completely reformat any
computer on which a virus is
detected
• Scan with several different
online scanners (f-secure,
trend at home, stinger).
Questions Asked 2008-10-23
• Questions:
• What are the top 3
things we can do today
to secure our networks
•
Answers:
•
1) Keep your anti-virus up-to-date (both
definitions & software) and do nightly or
weekly scans (see next slide)
•
Use “separation of concerns” in your
network: separate (physically or virtually)
those things that do not need to access
each other. Use different passwords for
every web application instead of a shared
one. Make sure that servers that don't
need to connect cannot connect.
•
Automated Monitoring (I failed to give this
as an example, but it my biggest ally).
This means a lot of things from testing if
servers and services are up to monitoring
and charting bandwidth, CPU, and RAM
usage. Anomolies are a very strong way
to determine if you have a security issue
Download