Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

Hack the Planet Zine Highlights Compromises at ImageShack and Symantec

A hacker zine has posted details that expose some questionable security practices maintained by image hosting service ImageShack, in addition to source code used by the service. The zine also singled out Symantec and exposed the personal details (dox) for several Anonymous supporters.

A hacker zine has posted details that expose some questionable security practices maintained by image hosting service ImageShack, in addition to source code used by the service. The zine also singled out Symantec and exposed the personal details (dox) for several Anonymous supporters.

When AntiSec (no relation to Anonymous’ incarnation) attacked ImageShack in 2009, the image service said that security was tightened and that user data was secure. In the fourth installment of HTP, the authors tested that claim, three years later. According to the zine, what they discovered is less than flattering when it comes to an information security program.

[…]

Here’s a list of criteria we found that evidenced the hardened security on all of ImageShack’s equipment:

– Run all MySQL instances as root

– Ensure all kernels are 2008 or earlier

– Routers compromisable via /level/16/exec/-/show/run

– Hardcode database passwords into as many files as possible (though we do give them credit, the root MySQL pass ‘mutaborius’ was never cracked by Hashcat.)

Advertisement. Scroll to continue reading.

– Implement a firewall that allows outgoing backconnects

– Add tasks to root’s crontab that regularly run files owned by the www user

– Run outdated Nginx

– Enable register_globals

– Use one $1 shadow hash for everything

Protip, if your security sucks this much, your incoming firewall rules and your keyauth won’t save you.

[…]

“That being said, ImageShack has been completely owned, from the ground up. We have had root and physical control of every server and router they own. For years,” the zine’s authors wrote.

The ImageShack section of HTP includes details that could have only come from access to the server itself, including internal and external IP assignments, SSH logs, source code and hardcoded passwords.

HTP also discloses details taken from Symantec, but unlike the ImageShack section, Symantec’s section only includes database schemas, along with what looks to be a massive marketing and CMS database dump (usernames, passwords, and corporate email) as proof of access.

“Saved by your WAF? You wish. All the other major AV corps are owned too, yours just pissed us off the most. Oh, and if you think we’re listing everything here, take the blue pill…and nice JBoss on VeriSign, by the way. We’ve always been entertained by Symantec partnerships. (especially Huawei…),” the zine’s authors said.

The server breaches were said to have been possible due to (in addition to lax security) four Zero-Days – including shell breakouts and local root escalations. The zine goes on to publish dox and other logs targeting various supporters of Anonymous. This includes the court rulings, and personal information on several people, in addition to more than a dozen NSFW images taken by a 22 year-old female Anon.

“Symantec is aware of the claims being made online,” a Symantec spokesperson told SecurityWeek. “We take each and every claim very seriously and have a process in place for investigating each incident. Our first priority is to make sure that any customer information remains protected. We are investigating these claims and have no further information to provide at this time. ”

SecurityWeek has also contacted ImageShack and will provide an update if a response is received.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...