CSIS Report: Securing Cyberspace
Collapse
X
-
Brag about crimes == Jail Time!
http://www.theregister.co.uk/2009/07...cker_arrested/
Not exactly the sharpest tool in the shed. I'll never understand why people feel the need to brag about their crimes, in public no less.
Of course, if criminals were smart, they probably wouldn't be criminals. This is just another example though of an attack that was coming from the inside, I'm just glad that it wasn't an actual IT person. It does make you wonder why he was able to compromise the machines, I'd say the IT department wasn't doing something they should to have prevented such access.
It could be that they were complacent with their 'own' people (even though he was a contract guard), they might not have viewed their security personnel as a threat.A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.Comment
-
Re: Brag about crimes == Jail Time!
I call this the SPECTRE syndrome also known as the Dr. Evil syndrome.http://www.theregister.co.uk/2009/07...cker_arrested/
Not exactly the sharpest tool in the shed. I'll never understand why people feel the need to brag about their crimes, in public no less.
Of course, if criminals were smart, they probably wouldn't be criminals. This is just another example though of an attack that was coming from the inside, I'm just glad that it wasn't an actual IT person. It does make you wonder why he was able to compromise the machines, I'd say the IT department wasn't doing something they should to have prevented such access.
It could be that they were complacent with their 'own' people (even though he was a contract guard), they might not have viewed their security personnel as a threat.
Dr. Evil: Scott, I want you to meet daddy's nemesis, Austin Powers
Scott Evil: What? Are you feeding him? Why don't you just kill him?
Dr. Evil: I have an even better idea. I'm going to place him in an easily escapable situation involving an overly elaborate and exotic death.
Dr. Evil: All right guard, begin the unnecessarily slow-moving dipping mechanism.
[guard starts dipping mechanism]
Dr. Evil: Close the tank!
Scott Evil: Wait, aren't you even going to watch them? They could get away!
Dr. Evil: No no no, I'm going to leave them alone and not actually witness them dying, I'm just gonna assume it all went to plan. What?
Scott Evil: I have a gun, in my room, you give me five seconds, I'll get it, I'll come back down here, BOOM, I'll blow their brains out!
Dr. Evil: Scott, you just don't get it, do ya? You don't.
He forgot to ask for the::
One... Hundred... BILLION DOLLARS!
xor
What is with the younger generation today, they simply don't know how to commit crimes. I guess we have a new politically correct word; the criminally challenged? These guys are like TV criminals.Just because you can doesn't mean you should. This applies to making babies, hacking, and youtube videos.Comment
-
Re: Brag about crimes == Jail Time!
Interesting.http://www.theregister.co.uk/2009/07...cker_arrested/
Not exactly the sharpest tool in the shed. I'll never understand why people feel the need to brag about their crimes, in public no less.
Of course, if criminals were smart, they probably wouldn't be criminals. This is just another example though of an attack that was coming from the inside, I'm just glad that it wasn't an actual IT person. It does make you wonder why he was able to compromise the machines, I'd say the IT department wasn't doing something they should to have prevented such access.
It could be that they were complacent with their 'own' people (even though he was a contract guard), they might not have viewed their security personnel as a threat.
What's even more interesting is the thread on the "Warezscene.org" forums where this clown not only bragged about it, but posted screenshots from the HMI.
http://www.warezscene.org/hacking/79...er-hacked.html
He was clearly looking for bragging rights, but along with the bragging rights, he made himself high profile. If he'd posted posted screen shots of the HVAC controls to the executive offices, probably no one would have cared. However, once he posted showed screenshots of labeled "Surgery Center", "OR-2" through "OR-5", and "Alarm (from) Sterile Storage Humidity", he was bound to attract attention.
Yeah, I've never understood why evil geniuses don't just shoot the good guy. "What shall we kill the hero with? Thirty cent bullet, or million dollar laser? Hmmm.... I know, LASER!"
Of course, it does make for more macho dialog:
Bond is strapped to a table with a very large overhead laser, which will bisect him vertically, starting in his crotch. <ouch!>
James Bond: Do you expect me to talk?
Auric Goldfinger: No, Mr. Bond. I expect you to die!Thorn
"If you can't be a good example, then you'll just have to be a horrible warning." - Catherine AirdComment
-
Re: Brag about crimes == Jail Time!
This is exactly why human security guards need to be replaced with their ED-209 equivalents.
He was clearly looking for bragging rights, but along with the bragging rights, he made himself high profile. If he'd posted posted screen shots of the HVAC controls to the executive offices, probably no one would have cared. However, once he posted showed screenshots of labeled "Surgery Center", "OR-2" through "OR-5", and "Alarm (from) Sterile Storage Humidity", he was bound to attract attention.
I just recompiled my SCADA hacking articles PDF. It's now 484 Pages.
http://members.netjunkies.net/streak...g Articles.zip
Enjoy.Last edited by streaker69; July 2, 2009, 06:28.A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.Comment
-
Re: CSIS Report: Securing Cyberspace
Here's some more info on this case:
Dark Reading article:
http://www.darkreading.com/insiderth...leID=218300006
FBI's Arrest/Search Warrant affidavit:
http://mcgrewsecurity.com/codedump/m..._complaint.pdf
FBI Press Release:
http://dallas.fbi.gov/dojpressrel/pr...9/dl063009.htm
Wesley McGrew's blog: (McGrew is the FBI's "CW-1" or "Confidential Witness #1")
http://www.mcgrewsecurity.com/2009/0...clinic-part-1/
It makes one wonder about what happened. With so much attention paid to the health care system, why and how could a hospital's HVAC system be left that wide open? Is the Carrell Clinic's IT staff completely incompetent when it comes to security or was it a matter of the IT staff focusing on the things like HIIPA compliance for the Electronic Medical Records that they missed other things that need to be secured? The first possibility is downright scary, and hopefully isn't true. The second possibility is probably closer to the truth, and should serve as a remind to all of us not to forget all the "other" attack vectors when we're working on securing one area.
BTW, last week "GhostExodus" took his original posts about the HVAC attack off the AnarchistCookBook.com Forum:
http://anarchistcookbook.com/f25/hva...he-bot-t30304/
But our eveil genius seems to have forgotten Google Cache:
http://74.125.47.132/search?q=cache:...ient=firefox-aThorn
"If you can't be a good example, then you'll just have to be a horrible warning." - Catherine AirdComment
-
Re: CSIS Report: Securing Cyberspace
I can think of two reasons right off the top of my head.
The HVAC system isn't under the domain of the IT department and is administered by an outside firm, and they didn't want to complicate it by adding security because the personnel that normally operate it aren't considered sophisticated enough to understand security.
If it is under the domain of the IT department, they didn't think that it could actually cause any damage if anyone got into it. After all, it's just HVAC, what bad could possibly come of someone messing with it.A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.Comment
-
Re: CSIS Report: Securing Cyberspace
http://www.mcgrewsecurity.com/2009/0...texodus-part2/
The kid was a late night security guard at the hospital. While working he used his access badge to put an IRC bot onto a machine. How he got into the HVAC screens is unknown. Then he videos the exploits using his laptop. I do like that he puts on latex gloves *after* he logs in so that he's not caught. Not like there's any evidence.
Hmm, logon to the machine
His badge being used to get to the floor possibly into the door also
His face
His uniform on under the sweathshirt.
I'll just take a guess and assume he then access the IRC bot from the Hospitals network so that he could get video of it.
Watch the videos they're quite a amusing. This guy is 1337, phear him.Last edited by beakmyn; July 6, 2009, 08:15.Comment
Comment