Attacks/Breaches
7/11/2011
12:49 PM
50%
50%

AntiSec Hacks FBI Contractor

Hacktivist group posts emails, data related to sensitive government projects, access credentials for VPNs and Department of Energy servers.

The hacktivist group known as AntiSec said on Friday that it had successfully breached the servers of FBI contractor IRC Federal.

"We laid nuclear waste to their systems, owning their pathetic Windows box, dropping their databases and private emails, and defaced their professional looking website," according to the Pastebin post from AntiSec, a loosely affiliated hacking group that's an offshoot of Anonymous and the now defunct LulzSec. The group said it targeted IRC Federal for "selling out their 'skills' to the U.S. empire."

IRC Federal, a government contractor, works with the Army, Navy, NASA, and Department of Justice, among other organizations. As of press time, the IRC Federal website remained offline following the attack. According to statement released by the company, "We reported it to the authorities, and otherwise we have no comment."

Extracts of the material supposedly stolen from IRC Federal were posted to text-snippet-sharing website Pastebin. Meanwhile, a more complete, 107-MB torrent file was shared via the Pirate Bay.

"In their emails we found various contracts, development schematics, and internal documents for various government institutions including a proposal for the FBI to develop a 'Special Identities Modernization (SIM) Project' to 'reduce terrorist and criminal activity by protecting all records associated with trusted individuals and revealing the identities of those individuals who may pose serious risk to the United States and its allies,'" said the AntiSec post.

In addition, AntiSec said it found login information for multiple VPNs, as well as Department of Energy "login access panels," all of which it released in the torrent file, together with "live ASP file browser and upload backdoors." Interestingly, the Pacific Northwest National Labs, operated under contract to the Department of Energy, suffered a sophisticated cyber attack earlier this month.

How was the IRC Federal website breached? AntiSec said it compromised the site via a SQL injection attack, which enabled it to retrieve an administrator's login credentials. AntiSec then used other techniques to grab database information and emails, in part thanks to some administrators having reused their passwords across various systems.

The AntiSec attack against IRC Federal follows recent warnings from auditors over the poor state of government agencies' database security. Notably, government auditors found that numerous Department of Homeland Security databases, storing sensitive citizen data and defense information, were improperly configured or running with known bugs. Likewise, auditors found that despite the $1.1 million it's recently spent on database security tools, nearly all of the IRS's 2,200 databases sport serious security problems.

As illustrated by the attack against IRC Federal, incorrectly configured databases, or databases with known vulnerabilities, give malicious insiders or outsiders an opportunity to steal, alter, or delete the information stored in the database.

In the new, all-digital Dark Reading supplement: What industry can teach government about IT innovation and efficiency. Also in this issue: Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6123
Published: 2014-12-28
IBM Rational AppScan Source 8.0 through 8.0.0.2 and 8.5 through 8.5.0.1 and Security AppScan Source 8.6 through 8.6.0.2, 8.7 through 8.7.0.1, 8.8, 9.0 through 9.0.0.1, and 9.0.1 allow local users to obtain sensitive credential information by reading installation logs.

CVE-2014-6160
Published: 2014-12-28
IBM WebSphere Service Registry and Repository (WSRR) 8.5 before 8.5.0.1, when Chrome and WebSEAL are used, does not properly process ServiceRegistryDashboard logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.