WEBINAR: Live Date: December 14, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT
Modernizing Authentication — What It Takes to Transform Secure Access REGISTER >
In the past two weeks, Zone-H.org proprietor Roberto Preatoni said defacements have increased to more than 500 separate attacks a day and more than 1,500 over weekends. A year ago, he said, his site got around 30 to 50 defacement notices a day from hackers.
This increasing trend, he said, should put IT managers on notice, because if crackers (malicious hackers) have access to the Web server controlling public pages, they likely have access to the entire network.
"There are some defacements not getting to the root level, but most of the time there is a root privilege access behind the defacement, therefore everything which is contained in the Web server is at danger," he said.
Some of the new hackers are clearly neophytes (called n00bs or script kiddies), with some computer knowledge and virtually no programming experience. Consider one of the "tons" of e-mails Preatoni gets on a daily basis, he said, even though the site only tracks defacements and network breaches:
"Hay, ma name is Artur and i from poland. I have 15 yers and i want ot bo a haker, because i vey like it and not only. I need some good programs or someone who will teach me.
More dangerous are the politically motivated hackers, who break into a site, take information if they can, and leave a "calling card" in their wake, in the form of a diatribe against governments.
Last year, a crew calling themselves PHC claimed they had hacked into the Indian government's nuclear power plant network and stole the plans for India's atomic energy consumption rates for the next 10 years. They further claimed they passed it on to an organization called the Al Qaida Alliance, which has since "officially" disbanded (the group was made up of many pro-Palestinian and pro-Al Qaida hacking groups).
Most of the time, however, defacements are seen as little more than vandalism, with the hackers leaving their mark on the defaced site, like "You've been owned," or their political agenda. In August, the Recording Industry Association of America (RIAA) was subject to a high-profile defacement, which drew a lot of public attention.
Whether these hackers are politically motivated or just looking for a diversion, most of them frequently use known exploits (a.k.a., 0day in hacker parlance), which target an operating system's weaknesses. In many cases, Preatoni said, these exploits can be rendered obsolete with a security patch and pro-active network administration.
But the factor, he said, keeping most administrators from closing down their networks from external attack is, for the most part, budget cuts for IT spending. He also added that it is strange to see SecurityFocus doesn't see the threat. Owned by security software developer Symantec, the site also maintains Bugtraq, a popular e-mail discussion list for security technicians.
Incidentally, the security site was defaced last November indirectly by hacker "fluffi bunny," who hacked into the ad agency serving SecurityFocus' banner ads and inserted his own with a banner sporting a pink bunny rabbit and the slogan, "You think you know? You have no idea - security fluffi."
SecurityFocus also maintains a ThreatCon indicator, which measures the network "danger" level throughout the world. Currently, that indicator is at Level 1, which indicates "no discernible (widespread) network incident activity," according to the Web site.
Preatoni said he doesn't know why the ThreatCon indicator says there is no widespread activity, since his site sees 500 or more defacements a day.
"SecurityFocus needs to wake up," he said. "They chat about security status, but we're hands-on, we see how much of a problem this really is."
In the past 24 hours, he said, he's gotten almost 1,500 defacement notifications and is thinking of expanding his staff of 40 volunteers to 80 in the coming weeks to process all the attacks.