Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Intruder Struck Computers Used to Run Internet
NY Times ^ | May 10, 2005 | By JOHN MARKOFF

Posted on 05/09/2005 7:20:52 PM PDT by Perdogg

SAN FRANCISCO, May 9 - The incident seemed alarming enough: a breach of a Cisco Systems network in which an intruder seized programming instructions for many of the computers that control the flow of the Internet.

Now federal officials and computer security investigators have acknowledged that the Cisco break-in last year was only part of a more extensive operation - involving a single intruder or a small band, apparently based in Europe - in which thousands of computer systems were similarly penetrated.

Investigators in the United States and Europe say they have spent almost a year pursuing the case involving attacks on computer systems serving the American military, NASA and research laboratories.

The break-ins exploited security holes on those systems that the authorities say have now been plugged, and beyond the Cisco theft, it is not clear how much data was taken or destroyed. Still, the case illustrates the ease with which Internet-connected computers - even those of sophisticated corporate and government networks - can be penetrated and also the difficulty in tracing those responsible.

Government investigators and other computer experts sometimes watched helplessly while monitoring the activity, unable to secure some systems as quickly as others were found compromised.

The case remains under investigation. But attention is focused on a 16-year-old in Uppsala, Sweden, who was charged in March with breaking into university computers in his hometown. Investigators in the American break-ins ultimately traced the intrusions back to the Uppsala university network.

The F.B.I. and the Swedish police said they were working together on the case, and one F.B.I. official said efforts in Britain and other countries were aimed at identifying accomplices. "As a result of recent actions" by law enforcement, an F.B.I. statement said, "the criminal activity appears to have stopped."

The Swedish authorities are examining computer equipment confiscated from the teenager, who was released to his parents' care. The matter is being treated as a juvenile case.

Investigators who described the break-ins did so on condition that they not be identified, saying that their continuing efforts could be jeopardized if their names, or in some cases their organizations, were disclosed.

Computer experts said the break-ins did not represent a fundamentally new kind of attack. Rather, they said, the primary intruder was particularly clever in the way he organized a system for automating the theft of computer log-ins and passwords, conducting attacks through a complicated maze of computers connected to the Internet in as many as seven countries.

The intrusions were first publicly reported in April 2004 when several of the nation's supercomputer laboratories acknowledged break-ins into computers connected to the TeraGrid, a high-speed data network serving those labs, which conduct unclassified research into a range of scientific problems.

The theft of the Cisco software was discovered last May when a small team of security specialists at the supercomputer laboratories, trying to investigate the intrusions there, watched electronically as passwords to Cisco's computers were compromised.

After discovering the passwords' theft, the security officials notified Cisco officials of the potential threat. But the company's software was taken almost immediately, before the company could respond.

Shortly after being stolen last May, a portion of the Cisco programming instructions appeared on a Russian Web site. With such information, sophisticated intruders would potentially be able to compromise security on router computers of Cisco customers running the affected programs.

There is no evidence that such use has occurred. "Cisco believes that the improper publication of this information does not create increased risk to customers' networks," the company said last week.

The crucial element in the password thefts that provided access at Cisco and elsewhere was the intruder's use of a corrupted version of a standard software program, SSH. The program is used in many computer research centers for a variety of tasks, ranging from administration of remote computers to data transfer over the Internet.

The intruder probed computers for vulnerabilities that allowed the installation of the corrupted program, known as a Trojan horse, in place of the legitimate program.

In many cases the corrupted program is distributed from a single computer and shared by tens or hundreds of users at a computing site, effectively making it possible for someone unleashing it to reel in large numbers of log-ins and passwords as they are entered.

Once passwords to the remote systems were obtained, an intruder could log in and use a variety of software "tool kits" to upgrade his privileges - known as gaining root access. That makes it possible to steal information and steal more passwords.

The operation took advantage of the vulnerability of Internet-connected computers whose security software had not been brought up to date.

In the Cisco case, the passwords to Cisco computers were sent from a compromised computer by a legitimate user unaware of the Trojan horse. The intruder captured the passwords and then used them to enter Cisco's computers and steal the programming instructions, according to the security investigators.

A security expert involved in the investigation speculated that the Cisco programming instructions were stolen as part of an effort to establish the intruder's credibility in online chat rooms he frequented.

Last May, the security investigators were able to install surveillance software on the University of Minnesota computer network when they discovered that an intruder was using it as a staging base for hundreds of Internet attacks. During a two-day period they watched as the intruder tried to break into more than 100 locations on the Internet and was successful in gaining root access to more than 50.

When possible, they alerted organizations that were victims of attacks, which would then shut out the intruder and patch their systems.

As the attacks were first noted in April 2004, a researcher at the University of California, Berkeley, found that her own computer had been invaded. The researcher, Wren Montgomery, began to receive taunting e-mail messages from someone going by the name Stakkato - now believed by the authorities to have been the primary intruder - who also boasted of breaking in to computers at military installations.

"Patuxent River totally closed their networks," he wrote in a message sent that month, referring to the Patuxent River Naval Air Station in Maryland. "They freaked out when I said I stole F-18 blueprints."

A Navy spokesman at Patuxent River, James Darcy, said Monday said that "if there was some sort of attempted breach on those addresses, it was not significant enough of an action to have generated a report."

Monte Marlin, a spokeswoman for the White Sands Missile Range in New Mexico, whose computers Stakkato also claimed to have breached, confirmed Monday that there had been "unauthorized access" but said, "The only information obtained was weather forecast information."

The messages also claimed an intrusion into seven computers serving NASA's Jet Propulsion Laboratory in Pasadena, Calif. A computer security expert investigating the case confirmed that computers at several NASA sites, including the propulsion laboratory, had been breached. A spokesman said the laboratory did not comment on computer breaches.

Ms. Montgomery, a graduate student in geophysics, said that in a fit of anger, Stakkato had erased her computer file directory and had destroyed a year and a half of her e-mail stored on a university computer.

She guessed that she might have provoked him by referring to him as a "quaint hacker" in a communication with system administrators, which he monitored.

"It was inconvenient," she said of the loss of her e-mail, "and it's the thing that seems to happen when you have malicious teenage hackers running around with no sense of ethics."

Walter Gibbs, in Oslo, and Heather Timmons, in London, contributed reporting for this article.


TOPICS: Government; Miscellaneous; Technical; War on Terror
KEYWORDS: cary; computersecurity
Navigation: use the links below to view more comments.
first 1-2021-27 next last

1 posted on 05/09/2005 7:20:52 PM PDT by Perdogg
[ Post Reply | Private Reply | View Replies]

To: Perdogg; mhking; Petronski

Is it possible to shut down the Internet? I would guess it's not.


2 posted on 05/09/2005 7:27:28 PM PDT by cyborg (Serving fresh, hot Anti-opus since 18 April 2005)
[ Post Reply | Private Reply | To 1 | View Replies]

To: cyborg; Lazamataz

Last year I broke the internet. Laz fixed it.


3 posted on 05/09/2005 7:29:11 PM PDT by Petronski (Pope Benedict XVI: A German Shepherd on the Throne of Peter)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Ernest_at_the_Beach

Tech Ping...


4 posted on 05/09/2005 7:30:07 PM PDT by tubebender (We child proofed our house but they still get in...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Petronski

Could a cyber attack signal that a terror attack may occur?


5 posted on 05/09/2005 7:31:48 PM PDT by Perdogg (Rumsfeld for President - 2008)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Perdogg
Once passwords to the remote systems were obtained, an intruder could log in and use a variety of software "tool kits" to upgrade his privileges - known as gaining root access.

One quibble - gaining a legitimate login is one thing; upgrading privileges another, and attaining root access yet a third. It is these "tool kits" that constitute the real security threat.

Irresponsible brats get their driving privileges taken away, and they ought to be kept from computers as well, for the same reason.

6 posted on 05/09/2005 7:32:47 PM PDT by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies]

To: tubebender

in todays times, if you can control the internet, you 'have control' of the world


7 posted on 05/09/2005 7:37:18 PM PDT by sure_fine (*not one to over kill the thought process*)
[ Post Reply | Private Reply | To 4 | View Replies]

To: cyborg

if it did break, AL Gore would come out of retirement, throw on some coveralls grab a hammer and fix it since he invented it.

I think the original workshop Al Gore used to create the internet is on display at the Smithsonian.


8 posted on 05/09/2005 7:43:38 PM PDT by Bostton1 (Ted Kennedy's car has killed more people than my guns have!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Perdogg

Of course.


9 posted on 05/09/2005 7:44:24 PM PDT by Petronski (Pope Benedict XVI: A German Shepherd on the Throne of Peter)
[ Post Reply | Private Reply | To 5 | View Replies]

To: cyborg
I don't believe it's very likely that the Internet be shut down per-se. But there's nothing like quite like a BGP "flap" between half a dozen or so core routers on a large portion of the global WAN.

"Route flap" is where the routers never quite "agree" on how to send the packets and under the correct conditions, it can make large portions of the network virtually unuseable.

Having said this...two things are pretty much universally accepted.

1. If not for Cisco routers, the "Internet" wouldn't exist.

2. If not for DNS running on UNIX hosts, the "Internet" as most "normal" people know it wouldn't exist.
10 posted on 05/09/2005 7:45:01 PM PDT by hiredhand (Pudge the Indestructible Kitty lives at http://www.justonemorefarm.com)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Petronski

Don't forget there is always Al Gore who invented the Internet. He might do in a pinch if there were ever serious problem.


11 posted on 05/09/2005 7:45:10 PM PDT by quantim (Victory is not relative, it is absolute.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: cyborg
Is it possible to shut down the Internet?

I'm sure NSA/DOD could do a pretty good job. Anything is possible.

However, I think the chances that a private entity could do it are vanishingly small.

If I were attempt it, I would use the flood gambit. Send a message/virus/process that launches/sends ten more, each of which sends ten more...etc., like the old shampoo commercial (Faberge Organics).

12 posted on 05/09/2005 7:48:17 PM PDT by Petronski (Pope Benedict XVI: A German Shepherd on the Throne of Peter)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Petronski

Let Algore fix it, he created it.


13 posted on 05/09/2005 7:50:09 PM PDT by JustAnotherOkie
[ Post Reply | Private Reply | To 3 | View Replies]

To: Bostton1
I think the original workshop Al Gore used to create the internet is on display at the Smithsonian

Grins 'n' snickers....still smilin'....good one!

14 posted on 05/09/2005 7:53:58 PM PDT by FreeKeys (Running Condi in '08 will destroy the DemocRATS once and for all.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Perdogg
Thanks for posting this story. This is a big deal to me. I (try not to laugh) make a living by going to estate sales and reselling unique items on eBay. These sorts of sales have actually been a great source of wealth creation for me personally, not to mention to other folks as well. And eBay is acting up in a not insignificant way right now. I'm pretty sure they've been hacked.
15 posted on 05/09/2005 7:58:28 PM PDT by jdm (Estoy En Una Radio Mexicana (I'm On A Mexican Radio))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Perdogg

Al Gore seeking revenge for 2000?


16 posted on 05/09/2005 8:07:28 PM PDT by Mad_Tom_Rackham (Delenda est Liberalism!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: cyborg

***Is it possible to shut down the Internet?***


I believe the shut it down once a year for cleaning.


17 posted on 05/09/2005 8:10:02 PM PDT by PetroniusMaximus
[ Post Reply | Private Reply | To 2 | View Replies]

To: jdm

yup ebay has been held at bay for about 20 minutes now...


18 posted on 05/09/2005 8:10:30 PM PDT by rolling_stone
[ Post Reply | Private Reply | To 15 | View Replies]

To: jdm

***And eBay is acting up in a not insignificant way right now.***


Google too - a few days ago.


19 posted on 05/09/2005 8:11:59 PM PDT by PetroniusMaximus
[ Post Reply | Private Reply | To 15 | View Replies]

To: Perdogg

Isn't there something a bit wrong when a 16-year-old Swede can break into internet servers and military computers by the thousands and it takes the FBI a year to figure it out? This doesn't inspire a lot of confidence.


20 posted on 05/09/2005 8:27:44 PM PDT by Cicero (Marcus Tullius)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-27 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson