Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Linux utility site hacked, infected
ZDNet Australia ^ | 11/14/02 | Patrick Gray

Posted on 11/14/2002 10:48:04 AM PST by Leroy S. Mort

The download site for two very common Linux based utilities, tcpdump.org, was hacked into on Nov. 11, and the software available for download was modified to contain Trojan Horse code.

This Trojan Horse, or "back door" software allows the hacker that wrote it to access any machine on which the modified software is run.

The two software items affected are tcpdump and libpcap, tools commonly used in information security applications. Some Intrusion Detection System (IDS) software requires libpcap.

The identity of the hacker conducting this campaign is unknown, as is whether a connection exists between the separate incidents.

CERT releasedan advisory in which they ".encourage sites using libpcap and tcpdump to verify the authenticity of their distribution, regardless of where it was obtained."

CERT provided the information necessary to determine the authenticity of any libpcap or tcpdump software recently downloaded. The advisory also encourages users to verify all software before installing it. "As a matter of good security practice, the CERT/CC encourages users to verify, whenever possible, the integrity of downloaded software."


TOPICS: Crime/Corruption; Front Page News; Miscellaneous; Technical
KEYWORDS: backdoor; ids; trojan
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-72 next last
Take care, penguin-heads.
1 posted on 11/14/2002 10:48:06 AM PST by Leroy S. Mort
[ Post Reply | Private Reply | View Replies]

To: Bush2000
Ping!
2 posted on 11/14/2002 10:59:41 AM PST by TomServo
[ Post Reply | Private Reply | To 1 | View Replies]

To: Leroy S. Mort
This Trojan Horse, or "back door" software allows the hacker that wrote it to access any machine on which the modified software is run.

One of many strategies hackers use to root boxes. (linux or otherwise)

The advisory also encourages users to verify all software before installing it. "As a matter of good security practice, the CERT/CC encourages users to verify, whenever possible, the integrity of downloaded software."

md5sum your downloads. Don't blindly open attachments. "Be nice to your baby sister. Oh, yeah, never drive on the railroad tracks."

All Operating Systems suck, each in their respective way.

3 posted on 11/14/2002 11:26:53 AM PST by prolusion
[ Post Reply | Private Reply | To 1 | View Replies]

To: Leroy S. Mort
Woooow, ya think Bill Gates would have something better to with his time?
4 posted on 11/14/2002 11:29:04 AM PST by ChadGore
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hap; Bacon Man
Major DRAG ping!
5 posted on 11/14/2002 11:29:36 AM PST by Xenalyte
[ Post Reply | Private Reply | To 1 | View Replies]

To: prolusion
All Operating Systems suck, each in their respective way.

Every OS Sucks

6 posted on 11/14/2002 11:34:50 AM PST by ShadowAce
[ Post Reply | Private Reply | To 3 | View Replies]

To: prolusion
md5sum your downloads.

Sooner or later, that's not going to be good enough. Yes, it worked out this time and with the OpenSSH thing last time. But remember that the sums can be changed too.... we need to start signing the sums with trusted keys.

7 posted on 11/14/2002 11:42:05 AM PST by TechJunkYard
[ Post Reply | Private Reply | To 3 | View Replies]

To: Leroy S. Mort
Take care, penguin-heads.

B-b-b-b-b-but .... that's impossible!!!! Only Microsoft can get hacked. Open-source stuff is inherently secure! All the MS-haters are clear on the point!

The lesson is, of course, that no operating system is safe from a determined person who wants to hack it. If anything, open source provides the hackers a leg up, because they can see exactly what they're trying to hack.

8 posted on 11/14/2002 11:45:53 AM PST by r9etb
[ Post Reply | Private Reply | To 1 | View Replies]

To: r9etb
B-b-b-b-b-but .... that's impossible!!!! Only Microsoft can get hacked. I can barely keep my composure, after all the anti MS thread's and all the uppity crap that constantly get's thrown around, it was just a matter of time. I'm personally waiting on that hacker that has nothing better to do with his time than to create a MAC ATTACK (maybe it can be a Big MAC ATTACK, and hit all three or four of them at the same time!), and shut those folk's up too. LMAO. I'll be able to humor myself over this for day's to come. Blackbird.
9 posted on 11/14/2002 12:01:49 PM PST by BlackbirdSST
[ Post Reply | Private Reply | To 8 | View Replies]

To: r9etb
If anything, open source provides the hackers a leg up, because they can see exactly what they're trying to hack

The primary problem to open source is inhouse attacks. Inhouse stealing accounts for more loss than shop lifters today. In the future in house attacks will be the most common form of attack. It is a lot easier with open source code.

Any good programmer can get the source code to Linux or BSD Unux. They can make changes, recompile and install the corrupted code. As far as CRC check sums are concerned, one just makes a corrupt module then play with unused bytes in the module to make both the size in bytes and the MD5 check some the same in both the valid and corruput module.

A person with access to a bank could change the modules so they don't do anything for months after he has left the compaany. Then the code steals the money and immediately erases itsself and all traces of the crime. The real danger is not the guy trying to hack from the net, it is the janitor that cleans the server room.

10 posted on 11/14/2002 12:02:13 PM PST by Common Tator
[ Post Reply | Private Reply | To 8 | View Replies]

To: BlackbirdSST
I'm personally waiting on that hacker that has nothing better to do with his time than to create a MAC ATTACK (maybe it can be a Big MAC ATTACK, and hit all three or four of them at the same time!), and shut those folk's up too. LMAO.

MAC viruses exist, but MAC is the the Switzerland of Operating Systems - an insignificant entity, and not much to be gained by invasion

11 posted on 11/14/2002 12:29:22 PM PST by Leroy S. Mort
[ Post Reply | Private Reply | To 9 | View Replies]

To: Leroy S. Mort
an insignificant entity, and not much to be gained by invasion Except for that one, with nothing better to do with his time. Blackbird.
12 posted on 11/14/2002 12:35:21 PM PST by BlackbirdSST
[ Post Reply | Private Reply | To 11 | View Replies]

To: rdb3; Knitebane; TechJunkYard; HAL9000; Nick Danger
Have you heard anything about this yet?
13 posted on 11/14/2002 1:10:31 PM PST by Bush2000
[ Post Reply | Private Reply | To 1 | View Replies]

To: B Knotts; stainlessbanner; Havoc; dheretic; HamiltonJay; amigatec; JohnathanRGalt; ...
Phew! Thank God the source code for Linux is available for public inspection.

BWAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA!!!!!
14 posted on 11/14/2002 1:21:21 PM PST by Bush2000
[ Post Reply | Private Reply | To 13 | View Replies]

To: Bush2000
No, I haven't. But now that I have, am I supposed to be sad or something?

I have better things to do with my time. This is nothing new.

No mercy.
Coming soon: Tha SYNDICATE.
101 things that the Mozilla browser can do that Internet Explorer cannot.

15 posted on 11/14/2002 1:21:23 PM PST by rdb3
[ Post Reply | Private Reply | To 13 | View Replies]

To: Bush2000
You do realize that you are Harr and two sides of the same coin, don't you?
16 posted on 11/14/2002 1:22:40 PM PST by rdb3
[ Post Reply | Private Reply | To 14 | View Replies]

To: rdb3
You do realize that you are Harr and two sides of the same coin, don't you?

Of course. Like most other people around here, we choose sides.
17 posted on 11/14/2002 1:23:30 PM PST by Bush2000
[ Post Reply | Private Reply | To 16 | View Replies]

To: Incorrigible; You are here
bump
18 posted on 11/14/2002 1:29:50 PM PST by Bush2000
[ Post Reply | Private Reply | To 17 | View Replies]

Comment #19 Removed by Moderator

To: Common Tator
The real danger is not the guy trying to hack from the net, it is the janitor that cleans the server room.

Any server physically accessible to an attacker is insecure. It doesn't matter what operating system it runs, or whether the source code for that OS is open or closed.

20 posted on 11/14/2002 1:39:37 PM PST by Campion
[ Post Reply | Private Reply | To 10 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-72 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson