Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Novell server hacked, used to scan for vulnerable computers
ComputerWorld ^ | Sept 28, 2005 | Jaikumar Vijayan

Posted on 09/29/2005 6:15:26 PM PDT by Golden Eagle

SEPTEMBER 28, 2005 (COMPUTERWORLD) - A company server that some workers at Novell Inc. apparently used for gaming purposes was hacked into and then used to scan for vulnerable ports on potentially millions of computers worldwide, according to an Internet security consultant.

The scans, which have been going on since Sept. 21, are targeted at TCP Port 22 -- the default port for Secure Shell (SSH) services. SSH programs are used to log into other computers over a network or to execute remote commands and move files between machines in a secure fashion. Scans against the port are often an indication that hackers are looking for vulnerable SSH systems that they can break into and take control of.

(Excerpt) Read more at computerworld.com ...


TOPICS: Business/Economy; Crime/Corruption; News/Current Events
KEYWORDS: linux; novell; opensource; security
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-62 next last
Multiple problems for Novell here...
1 posted on 09/29/2005 6:15:28 PM PDT by Golden Eagle
[ Post Reply | Private Reply | View Replies]

To: Golden Eagle

One should avoid Texas Hold 'Em on the job....


2 posted on 09/29/2005 6:17:23 PM PDT by mabelkitty
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce; N3WBI3; Bush2000; Incorrigible; for-q-clinton; BlackbirdSST; Fabozz; softwarecreator; ...

ping


3 posted on 09/29/2005 6:19:52 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle
Convicted hackers should be given two options. Either work in electronic countermeasures for the police, FBI, or Pentagon, or have all the bones in their hands broken and have a restraining order placed on them that prevents them from coming within 20 feet of any electronic device capable of hacking.
4 posted on 09/29/2005 6:21:55 PM PDT by Killborn (God bless the rescuers, God bless the Commander in Chief, and God bless America.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle
On the whole, Netware is much more secure than anything Microsoft has put out.

That said, Netware continues its way out of acceptance and this won't help it.
5 posted on 09/29/2005 6:27:25 PM PDT by ConservativeMind
[ Post Reply | Private Reply | To 1 | View Replies]

To: Killborn
While Novell is certainly guilty of idiocy on several counts here, without question the primary guilt lies with the hackers who not only knocked over this box, were looking for more booty through it's external connections.

You can't trust those guys to work on government computers though when they're caught. I know of one hacker that was being kept at a federal prison, and was allowed to work on the computers there as help, supposedly isolated from anything important. Not too long after that some paperwork showed up saying it was time for his release. Guess where that came from?
6 posted on 09/29/2005 6:30:16 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 4 | View Replies]

To: ConservativeMind

Since you brought up Microsoft, ever heard of anything like this ever happening with them? I don't recall anything like this myself, especially something that was sending out attacks on others.


7 posted on 09/29/2005 6:35:56 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 5 | View Replies]

To: Golden Eagle

Whoah...how stupid can ya be? One of our guys set up a server distributing movies over the internet. We found out later that afternoon and he was shown the door.


8 posted on 09/29/2005 6:36:53 PM PDT by SoDak
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle
Thank you for that vital info. I'll have to put an addendum.

If the perp chooses to work in electronic countermeasures, he will be monitored 24/7, where at the slightest hint of wrong doing, armed guards will come out and pummel the mofo.
9 posted on 09/29/2005 6:39:36 PM PDT by Killborn (God bless the rescuers, God bless the Commander in Chief, and God bless America.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Killborn
Here is what I think should be done with Hackers and Virus Writers:


10 posted on 09/29/2005 6:42:43 PM PDT by rlmorel ("Innocence seldom utters outraged shrieks. Guilt does." Whittaker Chambers)
[ Post Reply | Private Reply | To 4 | View Replies]

To: SoDak

If they have any sort of actual security at the perimeter, somebody with authority to stop this should have been aware of this server long ago. This could indicate bigger problems with their configuration that need correction, in addition to a cleanup of whatever other servers that don't support their business but are out on their network. Wonder if we'll hear much else about it.


11 posted on 09/29/2005 6:43:43 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 8 | View Replies]

To: Golden Eagle

From a news article just this week:

http://www.theinquirer.net/?article=26537


12 posted on 09/29/2005 6:50:00 PM PDT by ConservativeMind
[ Post Reply | Private Reply | To 7 | View Replies]

To: N3WBI3; ShadowAce; Tribune7; frogjerk; Salo; LTCJ; Calvinist_Dark_Lord; Buck W.; clyde asbury; ...

OSS PING

If you are interested in the OSS ping list please mail me


Let this be a lesson to sysadmins, don't set up gaming servers whit access to the outside world on your network, I would boot these jokers to the curb..
13 posted on 09/29/2005 6:52:45 PM PDT by N3WBI3 (If SCO wants to go fishing they should buy a permit and find a lake like the rest of us..)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Killborn

While the guards didn't come pummel this mofo (that I know of), I read his sentence did get changed from 5 years to 30 for attempted escape. Should have been that much to begin with, he had ripped off a school district for $250K somehow.


14 posted on 09/29/2005 6:54:47 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 9 | View Replies]

To: Golden Eagle
"...Going by the large number of IP blocks scanned by the attacking server, it is safe to assume that 'millions' of computers may have been probed for SSH-related weaknesses, he said.

"'The employees that set it up apparently had no idea of security,' Brandon said. 'But what is really surprising is that Novell would allow employees to set up game servers on their corporate network and then allow the public to access it.'"

It's not "surprising" at all, given my same experience by some server-side/network computers doing the very same thing....the better server-admins. in some organizations respond with at least acknowledging the problem and then repairing or taking the offending computer offline until repair, but what is ACTUALLY surprising is how many networks do not even seem to care (that they enable zombie computers, which this article describes). Whether they care or not isn't the important thing here but it is important whether or not they repair the problem. There are so many infected computers that it can be overwhelming to see...well, something like a hit to a website every two minutes for hours on end from state, .gov level IPAs, schools and such. I get the impression that some server admins. can't be bothered.

15 posted on 09/29/2005 6:55:35 PM PDT by BIRDS
[ Post Reply | Private Reply | To 1 | View Replies]

To: ConservativeMind

I don't see where that article indicates anything like this happening to or at Microsoft. Did you have something else, since you seem certain it should have happened to them instead? I guess it seems like it should have, since they have so many more servers, users, administrators, and according to you less secure software.


16 posted on 09/29/2005 6:59:27 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 12 | View Replies]

To: BIRDS

Where I work EVERYTHING going in and out of the perimeter is carefully monitored, and indexed based on requirement down to the port. Either you do that, and maintain control, or you have no control, there really is no middle ground.


17 posted on 09/29/2005 7:02:47 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 15 | View Replies]

To: Golden Eagle

Like I wrote previous, in my experience, with some networks responsible for similar behaviors as here, I actually contact them and send copies of the site stats that evidence one of their IPAs and it's remarkable how few even respond...some do, the better administrated ones, but more don't.

For example, I found an IPA from the Georgia Board of Regents (probably a state library, maybe a school or admin. office, who knows) that was guilty of this and contacted them and they responded, very nicely, that they'd taken the offending terminal down and were repairing; also same from the University of Florida, Deleware state .gov system, places like that that I actually took time to correspond with about their problem, BUT, what's surprising is how many didn't even respond (Cal State Chico didn't, a major university in Canada didn't, etc.).

This zombie behavior is far more prevalent than this article lets on. Doesn't make it right because, in fact, I loathe it and agree that whoever writes malware ought to be in jail for a long time. Unfortunately, spammers even sell malware on the internet calling it "advertising" and "marketing" software but it works on the same principle: infecting any available computer and then using it to infect others, all for access to information and to avoid paying their own way. At least, I guess. I think most of it is done to be destructive, nothing smart or cute about it.


18 posted on 09/29/2005 7:03:56 PM PDT by BIRDS
[ Post Reply | Private Reply | To 11 | View Replies]

To: Golden Eagle
How many Secunia critical advisories do you need?

http://secunia.com/product/22/#advisories
19 posted on 09/29/2005 7:04:44 PM PDT by ConservativeMind
[ Post Reply | Private Reply | To 16 | View Replies]

To: Golden Eagle

I agree with you. And, in which case, you are among the good guys. And I thank you, not that it matters specifically, but it's important that some admins. do their job well, helps the general internet community with each responsible act like yours.


20 posted on 09/29/2005 7:05:18 PM PDT by BIRDS
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-62 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson