Something to raise network security paranoia, from today's NY Times:
LAS VEGAS -- A group of computer hackers, one of whose members recently spoke to Congress about vulnerabilities in the national computer infrastructure, said they planned to release on Monday a program they say can be used to hack into and wreak havoc on machines that use the Windows operating systems.
Members of the hacker group, known as "Cult of the Dead Cow," said they are releasing the program to encourage Microsoft Corp. to pay closer attention to computer security issues.
However, a Microsoft spokesman said the company is not concerned about the program and that it does not expose or create any new vulnerabilities. "This is not a tool we should take seriously, or our customers should take seriously," said Edmund Muth, who oversees security for Microsoft's enterprise marketing group.
He said Microsoft has not yet seen the program, but that it is working with a computer security company that has seen it. The company, Atlanta-based Internet Security Systems Inc., said it is working with Microsoft to develop software so companies can determine if the program has been installed on one of their computers.
Other computer security consultants acknowledged the program does not expose any new vulnerabilities in Microsoft operating systems. However, they said it makes it much easier to exploit those holes, meaning that computer running Windows 95 or 98 could be vulnerable to a wider group of those with ill intentions.
"It's not going to change the balance of power overnight," said Robert J. Stratton, a consultant for Security Design International in Falls Church, Va. "But it could be disconcerting if people decide to employ it."
The program is called "Back Orifice," which is meant as a play on words parodying Microsoft's Office suite. Members of the hacker group said that an outsider who gains access to a computer using their program would be able to control the computer and its software just as if they were sitting at the actual terminal.
In other words, the remote user would be able to see what's on the screen, install and download files, delete or edit text and view or manipulate databases and spreadsheets.
According to Microsoft, programs that allow this type of access already exist for use within networks by company system administrators. However, the hackers, and some computer security consultants, say this is the first time such a tool has been widely and freely distributed to the public.
"Once it is installed, a remote administrator has more control over the computer than the person sitting at the console," said DilDog, a hacker who helped write some of the Dead Cow group's coding. He said the reason the remote user would have more control is because they would have access to base-level commands, enabling them to manipulate more information than if they used the Windows graphical user interface.
There is at least one factor that may limit how much damage the program can cause. In order for a person to take control of a computer using Back Orifice, they must first install a copy of the program on the target computer. This could be done by physically loading the program, or by sending an e-mail attachment or other electronic file that would have to be downloaded and opened.
Stratton, the security consultant, said that one way companies can further guard against any attacks is to make sure they don't leave their "file sharing" program open to the Internet. When that particular program is open, it permits employees to freely exchange files over the Internet, but also makes it possible for outside users to send in unwanted files.
Stratton said it may also be possible for companies to modify their virus scanners to look for and block incoming files that contain the program.
Allan Bailey, a product operations engineer for the search service Excite, described the program as a "very, very bad exploit." "It means we're going to have to batten down the hatches and make secure our PC networks."
At the same time, he said he believes some good could come of the program because it will force Microsoft to pay closer attention to network security. He said Microsoft has been criticized for not reacting quickly enough to vulnerabilities, "and this could force the issue."
Cult of the Dead Cow members said it took a year to write the program, which was created predominately by Josh Buchbinder, a hacker who goes by the name "Sir Dystic." They said the program is meant as a viable network tool but also as a way to raise awareness about security problems with Microsoft programs.
* * *
How are these hackers going to get through if there is a biometric ID required to pose as a network administrator? And does this imply that at the network level, the first people to go to biometric sign-in will be the administrators? I think it does. |