Date: 03 July 2003
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
AusCERT Update AU-2003.008 - Media Reports on the "DEFACEMENT CHALLENGE"
03 July 2003
AusCERT has observed an increase in the number of media reports regarding
the "defacement challenge". This is a loosely arranged competition where
contestant attackers attempt to deface as many web sites in the shortest
possible time. The competition is scheduled to occur on July 6, 2003.
AusCERT assesses that there is only a negligible increase in the threat
arising from this challenge. This does not mean the threat from web site
defacement itself is negligible; this threat is pre-existing and is
assessed to be medium to high under most circumstances. One of the most
common malicious scanning activities undertaken by attackers includes
conducting scans of broad IP address ranges to identify vulnerabilities
in web servers which can enable an attacker to deface or gain privileged
access to web server data and possibly other network systems.
Web site defacements around the globe, including within Australia and New
Zealand, are a common occurrence for these reasons. The most reliable
indicator of whether an organisation's web site will be defaced or
otherwise compromised is if the organisation's web server is not
appropriately secured or if it exhibits known vulnerabilities which can
be exploited.
It has been reported that the rules of the competition state that credit
will be given on the basis of each website defacement, not single IP
address. Therefore, organisations that host multiple sites from a single
IP, such as web hosting organisations, will be considered more attractive
targets.
AusCERT reminds network security and systems administrators of best
practices for minimising the chances of defacement:
o Ensure system and server software is kept up to date to avoid
previously identified vulnerabilities.
o Disable unnecessary network services and ports.
Also, AusCERT anticipates that most servers will be compromised prior to
the date but defaced during the competition. Therefore, it may be prudent
for administrators to check their systems for signs of compromise by:
o Searching for any new or suspicious user accounts and/or system
processes.
o Examining network traffic for anomalies.
o Utilise vulnerability scanners and/or security checking software.
REFERENCES:
Media Reports:
http://www.zone-h.org/en/news/read/id=2986/
http://www.informationweek.com/story/showArticle.jhtml?articleID=10818007
http://www.eweek.com/article2/0,3959,1175877,00.asp
http://customwire.ap.org/dynamic/stories/H/HACKER_WARNINGS?SITE=DCTMS&SECTION=HOME&TEMPLATE=DEFAULT
AusCERT Checklists:
Steps for Recovering from a UNIX or NT System Compromise:
http://www.auscert.org.au/1974
UNIX Security Checklist v2.0:
http://www.auscert.org.au/1935
Steps for Recovering from a UNIX or NT System Compromise:
http://www.auscert.org.au/1974
System Hardening Resources (Windows):
Microsoft TechNet Security Website
http://www.microsoft.com/technet/security
(Primarily the Tools and Checklists on the left sidebar, but lots more info)
NSA Security Recommendation Guides for Windows XP/2000/NT and Cisco Routers
http://www.nsa.gov/snac/index.html
Windows Server 2003 Security Guide
http://microsoft.com/downloads/details.aspx?FamilyId=8A2643C1-0685-4D89-B655-521EA6C7B4DB&displaylang=en
Threats and Countermeasures: Security Settings in Windows Server 2003 and XP
http://microsoft.com/downloads/details.aspx?FamilyID=1b6acf93-147a-4481-9346-f93a4081eea8&DisplayLang=en
Microsoft Windows 2000 Security Hardening Guide
http://www.microsoft.com/technet/security/prodtech/windows/win2khg.asp
Improving Web Application Security: Threats and Countermeasures
http://www.microsoft.com/downloads/details.aspx?FamilyID=e9c4bfaa-af88-4aa5-88d4-0dea898c31b9&DisplayLang=en
LabMice.net - Windows 2000/XP Security Checklists
http://www.labmice.net/articles/
System Hardening Resources (UNIX and Linux):
http://etherlabs.net/m.werneburg/pro/sysadmin/security/hardening.php
http://dir.securepoint.com/Hardening/Linux/
http://www.linuxsecurity.com/
IDS and security checking software:
http://www.networkintrusion.co.uk/
http://www.snort.org/
http://www.chkrootkit.org/
Regards,
The AusCERT Team
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBPwTKyih9+71yA2DNAQHSsgQAkBJ9zBrnGGEGjdp+19SeNU8px757IQaD
346X5RQgJLcFC0UxYol4j1pFbLfBI6v8+M/4zePEHasZW7VWChmRGJhNyZwJDfMG
0uaUOshdD3Jzj8zuuxwjJvtDIcvHrzdn3zFKqBF4U3nQTWtEa7lZiC8z73rq8dZG
CB1XoUa9Kto=
=UnQ7
-----END PGP SIGNATURE-----
|