Risk

6/30/2009
05:31 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

'Mafiaboy': Cloud Computing Will Cause Internet Security Meltdown

Notorious black-hat hacker warns that cloud-based computing will be "extremely dangerous," and explains how he got into hacking at age 15

Reformed black-hat hacker Michael Calce, better known as the 15-year-old "mafiaboy" who, in 2000, took down Websites CNN, Yahoo, E*Trade, Dell, Amazon, and eBay, says widespread adoption of cloud computing is going to make the Internet only more of a hacker haven.

"It will be the fall of the Internet as we know it," Calce said today during a Lumension Security-sponsored Webcast event. "You're basically putting everything in one little sandbox...it's going to be a lot more easy to access," he added, noting that cloud computing will be "extremely dangerous."

"This is not the last you're going to hear of this," he said.

Paul Henry, security and forensics expert for Lumension, says cloud computing, indeed, will open up new avenues of risk. "We haven't even handled the fundamentals of [securing it] in our existing environments," Henry said during an interview after the Webcast. "Now we're going to push it up to the cloud?"

Calce, who last year published a book that chronicles how he got into hacking, his infamous, massive distributed denial-of-service (DDoS) attack on the high-profile Websites, his arrest and ultimate guilty plea, as well as his views on the Internet's security problems, said today that the Internet is broken, and he sees the internal threat as one of the bigger problems for businesses.

"Aside from the fact that the fundamental protocols are easily manipulated...social networking and dumpster diving have been going on a long time and are still extremely effective. The scariest aspect for business owners is their own employees compromising [them]," he said. "Dumpster diving, social networking, and internal corporate sabotage will be the No. 1 threat. It's imperative that corporations take a closer look at their employees."

One thing that has definitely changed is hacking, according to Calce. It used to be most hackers were mainly "exploring technology," he said, and only a few were in it for the money. "The intellectual challenge was there. But that all evaporated. Now it's all terrorism and monetary gain," he said. "Every criminal is jumping on this bandwagon...there's less risk than robbing a bank in person. That's why they are leaning toward cybercrime."

Calce also provided some rare insight into the hacker psyche, revealing what ultimately drove him to build a "one-button botnet" that he said pioneered the mass-DDoS concept. "I tumbled down the rabbit hole and found this underground network," he explained. "You don't feel a sense of harm or that you're committing a crime [when you are] behind a computer...it's not the same effect as if you were doing bodily harm to someone, where you could see [their] reaction and get that instant sense of remorse."

The feeling that what you are doing is completely wrong is missing, he added. "You have a sense of empowerment -- that you can't be touched," Calce said. "No one shows up at your door when you press 'enter' and shut down a network."

Calce said the trouble with cloud computing and Web 2.0 is that they are about ease of use, but not about enforcing security. "The same problems are going to exist," he said. "We are moving forward with technology without fixing [previous security issues]," he said. Too many organizations still leave default passwords in place, for instance, he said.

"That's why I wrote the book -- to get the message across to hackers that they could have the same intellectual challenge" by finding security weaknesses and helping prevent them from being exploited, he said.

Calce pled guilty to 55 of 65 charges against him in 2001, and spent eight months in a juvenile group-home facility. He said he got his first taste of hacking while roaming AOL chat rooms and was knocked offline by another user. "I was astounded that someone was able cut my AOL connection...I was fueled by curiosity," he said. He then began posing as an AOL technician to social-engineer logins and passwords from AOL users.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Empathy: The Next Killer App for Cybersecurity?
Shay Colson, CISSP, Senior Manager, CyberClarity360,  11/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Post a Comment
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15759
PUBLISHED: 2018-11-19
Pivotal Cloud Foundry On Demand Services SDK, versions prior to 0.24 contain an insecure method of verifying credentials. A remote unauthenticated malicious user may make many requests to the service broker with different credentials, allowing them to infer valid credentials and gain access to perfo...
CVE-2018-15761
PUBLISHED: 2018-11-19
Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges...
CVE-2018-17190
PUBLISHED: 2018-11-19
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code ...
CVE-2018-1841
PUBLISHED: 2018-11-19
IBM Cloud Private 2.1.0 could allow a local user to obtain the CA Private Key due to it being world readable in boot/master node. IBM X-Force ID: 150901.
CVE-2018-18519
PUBLISHED: 2018-11-19
BestXsoftware Best Free Keylogger 5.2.9 allows local users to gain privileges via a Trojan horse "%PROGRAMFILES%\BFK 5.2.9\syscrb.exe" file because of insecure permissions for the BUILTIN\Users group.