TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The story around the Linode hack

357 点作者 foofoobar大约 12 年前

24 条评论

RoboTeddy大约 12 年前
Here's an attempt at an explanation/translation:<p>HTP ("Hack The Planet") is a group that likes to break into things. Another (unnamed) group of people impersonated a third group of people ("ac1db1tch3z") and tried to cause trouble for HTP.<p>The impersonators located HTP by examining one of HTP's botnets (a collection of compromised computers that are used to launch things like denial of service attacks). Botnets have to receive instructions (e.g., targets to attack) from somewhere, so it's likely that the impersonators followed the path taken by commands to the botnet, and found the network(s) that HTP uses to organize themselves.<p>HTP realized this, and wanted to get back at the impersonators. They found out that the impersonators used an IRC channel (chat room) hosted on a network called SwiftIRC. If HTP could break into SwiftIRC (which is hosted on Linode), they could cause all sorts of trouble for the impersonators. So HTP decided to break into Linode, so they could break into SwiftIRC, so they could break into the group of impersonators.<p>To break into Linode, HTP broke into their domain name registar (name.com). They planned to secretly take control of linode.com, and replace it with a version of linode.com would look and feel and work correctly, but had one additional feature -- it would collect the login information that people typed in. HTP probably hoped to gain the login for SwiftIRC directly, or collect the logins for Linode admins and obtain SwiftIRC's login from there.<p>But, before they enacted the domain takeover (a maneuver that would likely be somewhat difficult to employ without being noticed), an HTP member discovered a new vulnerability in ColdFusion, the server software used by Linode. The ability to discover a new exploit on demand implies a high level of skill within the group. Using this exploit, HTP obtained direct access to Linode. They proceeded to gain access to SwiftIRC, as well as other sites hosted on Linode, including a well-known security site, nmap.org<p>The FBI apparently had a mole in HTP, and they alerted Linode that HTP had access to nmap.org. This posed a bit of a problem for HTP: if it became public knowledge that they had obtained access to Linode, then perhaps they wouldn't have time to go after the impersonators using their newfound access to SwiftIRC. So, HTP tried to strong-arm Linode into staying quiet until May 1st. HTP had obtained the customer information and credit cards of all the Linode customers. HTP threatened to widely publish all this sensitive information if Linode didn't stay quiet. If Linode complied, then HTP would just delete all the info.<p>Linode, though, was forced by the FBI to announce that they'd been broken into. HTP told Linode to just publicly acknowledge that HTP was the group that broke into Linode, and they'd delete the sensitive info. Linode did so (<a href="https://blog.linode.com/2013/04/16/security-incident-update/" rel="nofollow">https://blog.linode.com/2013/04/16/security-incident-update/</a>).<p>HTP conducted an internal investigation to determine which group member(s) were working with the FBI. HTP broke into the mole's computer and turned on their webcam, and saw an FBI employee looking over the shoulder of the mole. They kicked the mole out of the group, so the FBI doesn't have access to HTP anymore.<p>(Remember, this is the story according to HTP.)
评论 #5667407 未加载
评论 #5668077 未加载
评论 #5667417 未加载
评论 #5669231 未加载
评论 #5669266 未加载
ghshephard大约 12 年前
There is a lot of inside-baseball in this, but the one they keep talking about, is, "shred customer data" - as in,<p>" Recognizing their situation, we instead told them that if they acknowledged HTP in their analysis, we'd go ahead and shred their customer data anyway."<p>Do they honestly, for a single second, think that any LEA, corporation, or, well, anyone would believe that once the information was compromised, that there was no putting the genie back in the bottle? Also - I suspect there are probably disclosure laws that had to be followed by Linode anyways.
评论 #5670429 未加载
评论 #5667248 未加载
antihero大约 12 年前
The ColdFusion hack...wow. How is CF engineered so badly? What person nowadays would still think to take paths of <i>anything at all ever</i> in the request parameters? I can sort of understand pre 2003 or something, but CF10 was released in 2012, for Pete's sakes.<p>Also makes you wonder, if there are holes like this, how many more holes like this are there? Especially if this is a pattern across the system.
评论 #5668674 未加载
mappu大约 12 年前
Definitely worth reading the full zine, some scary stuff in there (including very readable python LFI-based exploits for unpatched MoinMoin and ColdFusion).<p>Highlights: 1900+ days uptime on a sparc box somewhere in sourceforge.net, root on ICANN, root on Debian repositories..
评论 #5667402 未加载
评论 #5667852 未加载
tiredofcareer大约 12 年前
Some hopefully-helpful clarifications of the inside baseball talk from just the overview (I haven't read the full zine), enhanced with inside and general knowledge I've gained in my travels on this mortal coil:<p>- HTP claims to have{, had} access to name.com, which Linode currently uses. This access enables an unauthorized party to update authoritative nameservers for your domain; i.e., if you host at Amazon, very likely your authoritative nameservers are Route 53 on your account. HTP would not have access to modify the zone directly through the registrar and would instead have to hijack the entire domain with a working, completely-transferred zone on their own nameservers. For this to go down entirely unnoticed is extraordinarily difficult. I won't say impossible, but damned close without a copy of the zone in hand and with Linode running AXFR disabled (you should be too). There are subzones of linode.com; they wouldn't have gotten them all, and it would have been noticed within minutes.<p>- In order to attack SwiftIRC, to get back at some script kiddies DoS attacking them after their last release (because you know, that's a good target to burn <i>registrar</i> access on and all), HTP decided to backdoor SwiftIRC via their nameservers which are hosted at Linode. That's not the same as the registrar nameservers discussed above, but is instead the DNS data actually stored <i>on</i> a Linode on SwiftIRC's account. They do not hint what they were going to do with it once they had hijacked the nameservers, and I will not theorize. I could guess, though.<p>- Before utilizing their registrar access (from the first bullet point) to hijack the linode.com zone and intercept manager logins silently by redirecting traffic via DNS -- <i>also</i> fairly difficult to pull off without a good linode.com certificate in hand, in terms of keeping the TLS session non-suspicious to a browser -- they instead discovered a zero-day in ColdFusion (Linode's stack) and got in that way. That's much quieter and much more likely to not be noticed. If we take the FBI's actions at HTP's word, the FBI was the only reason Linode was made aware of this outside of HTP's control; a DNS hijack would have been immediately noticed by Linode administrators.<p>- Knowing what I know (let's leave it at that), a successful exploit on Linode's ColdFusion stack entails a database of Linodes, DNS, credit cards, e-mails, addresses, and keys to decrypt the actual card numbers, and a lot more data. You have to decide whether to take HTP at their word that they deleted credit cards. Consider your credit card <i>and</i> all prior credit cards compromised if it were in the system before April.<p>- The access that HTP obtained <i>does not</i>, full stop, lead to root on Linode instances without <i>at least one shutdown job</i> or change of root password job showing up in your Linode's history that you did not ask for. Your Linode's root password is not stored in any Linode system aside from on your Linode itself. Your LISH password, as they say, is, and according to them is stored in plaintext; if you see things on your Linode's console (located under the Remote Access tab) that you did not type, that access was used upon you. If not, it wasn't. If you used the same root password on your Linode that you did for your LISH password, consider that password compromised. I'm suspicious of the claim that they rooted all those (assuming) customers without any of them noticing their Linode being rebooted to apply the new root password to allow HTP in, and I would read that as "potential access" instead of "access". They probably bounced some nmap.org servers to reset their root passwords -- a Linode system requirement -- without fyodor noticing. Which is interesting for a couple reasons.<p>- Also, the access they obtained does <i>not</i> lead to root on the Linode host fleet itself, unless they are holding back some extra access they obtained such as a shared password between the ColdFusion stack and administrator credentials for Linode systems, which I consider unlikely for a couple reasons. With several days to get familiar with the architecture, HTP could have used their database write access to do things on the hosts, but it's a fairly limited set of things. Dumping Linode's database is bad, but root on their hosts is far, <i>far</i> worse, and by indications, I don't think they got it.<p>- How does this relate to the Bitcoin hacks of yesteryear, you ask? The Bitcoin hackers probably got in the exact same way -- Linode hinted at a compromised admin credential, which is close enough to do everything HTP was able to do -- then shut down and reset root passwords on the Bitcoin Linodes they were after, which then gave them filesystem access.<p>So ends clarifications, thus begins conclusions:<p>- <i>PAY ATTENTION WHEN YOUR SERVERS ARE REBOOTED WITHOUT YOUR COMMAND.</i><p>- <i>PAY ATTENTION WHEN YOUR SERVERS ARE REBOOTED WITHOUT YOUR COMMAND.</i><p>- Linode added a feature that shoots you an e-mail when your Linode is manipulated in any way via jobs, such as resetting your Linode's root password (a la Bitcoin/HTP hacks). It's depressing they had to do this, but pay attention if you get the mail. External monitoring like Nagios that pages you when your server goes down is also a good idea, as long as it is hosted at another provider.<p>- EDIT: After reading the zine, yet again, /CFIDE is the vector. There's no excuse for not hiding your administrative tools, generally the soft underbelly of the whole smash, from the Internet. None. It's one rewrite in nginx. Match /CFIDE&#60;anything&#62; from the public, redirect to /. Done.<p>- EDIT: Again, after looking at how trivial the exploit was, it's probably time to reconsider using Adobe ColdFusion from a business continuity standpoint. Half Linode's fault for not hiding /CFIDE, half Adobe's fault for the engineering missteps that lead to this capability for a remote attacker. We should be just as hard on ColdFusion as we are on Rails.<p>- SwiftIRC is a den of inquity, up there with EFnet; if you run a hosting provider, think twice about permitting SwiftIRC anywhere near you. To reiterate that, Linode was a casualty of someone going after SwiftIRC. Delink their nodes, cancel them, and kick them to the curb if you're interested in preserving your business. Not worth the money. Same with damned near all the IRC networks except OFTC and, to a far lesser extent, Freenode. There will always be targets but harboring SwiftIRC is probably a malicious-actor magnet.<p>- Registrars (and CAs, though that's outside this discussion) are the weak point in the entire system. This is not the first time they have been shown to be so. Linode could be Fort Knox of digital security but if name.com falls over, it's all over; that's entirely outside of Linode's, and your, control. Currently, the registrar market is heavily profit-centric and, personally, I think people spend far too little on a domain in the general case. I would happily pay a registrar a lot more money -- hundreds a year or more -- if their offering were run competently, as it is fairly obvious name.com isn't. Compare your hosting bill to your registrar bill; what's wrong with that picture?<p>- HTP is apparently fairly easy to troll into using valuable access for vengeance purposes. Shameful target selection and a burn of a good hack just to root SwiftIRC. That's like pissing in the ocean for a good time.<p>- Linode got railroaded here and the general reaction by folks is a little overdone. You know that's true when even the hackers' overview of the hack specifically calls out people bitching about Linode security on Twitter. All it takes is one zero-day, and you will all be hit by one in your career, so cut Linode a little slack.
评论 #5668240 未加载
评论 #5667486 未加载
评论 #5667554 未加载
评论 #5667471 未加载
评论 #5667722 未加载
评论 #5668921 未加载
评论 #5671234 未加载
评论 #5669506 未加载
评论 #5672467 未加载
评论 #5670559 未加载
评论 #5667484 未加载
评论 #5668403 未加载
runn1ng大约 12 年前
I... don't actually understand most of what they wrote there.
jameswyse大约 12 年前
There's more info about HTP5, including working mirrors of the files linked at the end of the linode document here: <a href="http://straylig.ht/zines/HTP5/" rel="nofollow">http://straylig.ht/zines/HTP5/</a>
评论 #5667213 未加载
kouiskas大约 12 年前
Looking at the hash found in the query HTP ran, 9gag's name.com password was "harry1" at the time of the exploit. It also tells us name.com stores the passwords as unsalted MySQL 4.1 PASSWORD() hashes...
AndyKelley大约 12 年前
What I want to know is, what kind of hacker uses hard tabs in their zero day python script.
评论 #5668296 未加载
评论 #5678359 未加载
评论 #5668090 未加载
blacktulip大约 12 年前
I am not familiar with the crackers' terms. So does this mean that name.com is not safe? All my domains are there...
评论 #5667204 未加载
评论 #5668439 未加载
robk大约 12 年前
That seems somewhat scary if they've compromised domain registrars and are intercepting login data from client sites that way.
评论 #5667228 未加载
sp332大约 12 年前
Anyone care to speculate how likely this account is to be true?
评论 #5672873 未加载
driverdan大约 12 年前
Some of their claims seem a bit far-fetched. Hacking name.com, Xinnet, MelbourneIT, and Moniker? That would be huge. Why haven't we heard more from them?<p>&#62; We identified which users on HTP were involved with the FBI, and promptly gained access to one of their cams.<p>Not sure what they mean here. FBI camera? User's laptop camera? Either way this also seems far-fetched.<p>If everything they said was actually true it's very impressive.
评论 #5669780 未加载
评论 #5668385 未加载
bestham大约 12 年前
So Much Drama in the HTP
评论 #5670044 未加载
peterwwillis大约 12 年前
I can't think of a better classification for a terrorist than people who sit around all day working to destroy credibility of corporations and expose personal and financial information for the sake of their own fucked up moral code and amusement.<p>It would be nice if we had internet role models. IRC is full of low-life degenerates who perpetuate the vitriol that reinforces this way of life as an acceptable pastime. If there were well respected hackers who spoke publicly against this kind of behavior it might make some people think twice. (Unfortunately, most well respected hackers used to be these kids before they got real jobs)<p>HN is full of individuals who try to take the high road, versus the kind of anonymous internet idiocy that exists in nearly every forum and chatroom. I love this about HN. I wish more of the internet took it as an example.
评论 #5668579 未加载
评论 #5668402 未加载
评论 #5669659 未加载
评论 #5672409 未加载
amitdugar大约 12 年前
Slightly OT, Is it possible to have a web application (using popular tech like RoR, PHP etc.) that cannot be cracked by anyone ?
评论 #5668150 未加载
评论 #5667955 未加载
评论 #5668131 未加载
评论 #5671807 未加载
评论 #5667820 未加载
评论 #5667636 未加载
rip747大约 12 年前
i'll never understand why way back in the day, someone thought that it would be a good idea to put all the scripts for the extension tags (like cfform) under the same parent directory (CFIDE) as the administrator.
rth大约 12 年前
These kind of hacks improving the world. Thanks for to the hacks (not for stealing CCs or usernames) that they showed up again there is no f.cking security in the world.
orthecreedence大约 12 年前
First mistake: using Coldfusion. Second mistake: keeping it.
hexonexxon大约 12 年前
Nobody remembers the Linode bitcoin "hack" where it was assumed by bitcointalk that an admin was looting accounts? Im surprised anybody still uses them.
评论 #5668741 未加载
arthulia大约 12 年前
The site appears to be down now, so...<p><a href="http://pastie.org/private/xedrpvi9lbcfwnz7wvb1a" rel="nofollow">http://pastie.org/private/xedrpvi9lbcfwnz7wvb1a</a>
whoowy大约 12 年前
This story can make a movie
rweir大约 12 年前
and today name.com emailed customers admitting they'd been pwned.
orokusaki大约 12 年前
The ability for "hackers" to thrive is a necessary price to pay to secure our rights on the Internet. Trading freedom for security pays nothing, and never will. Let the FBI work their asses off to try to bust these people.