Australian Stock Exchange Crack Attempt Came From US Military Installation 149
Hamish writes "The Sydney Morning Herald is reporting the US military may have tried to crack the
Australian Stock Exchange (ASX).
Have a look at
the article. No one is actually claiming that the attack was officially sanctioned but the attack did originate from a US military institution. "
Okay... (Score:1)
Hmm... (Score:1)
Australian security (Score:3)
--
wasn't me, honest (Score:2)
phil
(hoping that nobody else in his directorate reads
Two very likely possibilities (Score:3)
or
2. The machine from which the attack oriented was, as they say, owned.
--
That's no good at all (Score:1)
Scary thought about what could happen if this happened to, say, Russia, and cooler heads did not prevail. Or between India and Pakistan, except those two really do assault each other's systems all the time.
Taxes at work (Score:1)
(Note: I don't actually believe the USMil is behind this...)
The power of the Roo (Score:1)
So I guess 100 Kangaroos with 1000 whatever-machine-they-use-down-there can create the server the US Government can't break into.
Fear the power of the Roo.
What sense of the word "military installation"? (Score:2)
What bothers me ... (Score:3)
Of the "plenty of attacks" on the ASX computer system, Mr Humphry said none had been successful, with "amateurs trying fairly frequently".
Why wasn't this just dismissed as another amateur attempt, instead of slandering the US military. I mean, everyone has problems with their government. I'm no huge fan of ours (US), but considering Oz's track record in regards to technology, this just seems to be an outright insult towards the US.
Are you telling me they honestly believed our military was trying to attack their stock exchange? It simply doesn't make sense.
Mr Humphry said authorities were notified after the hackers from the US military installation tried to break into the site and "broke into another site to achieve that objective".
If they had control of a machine between their servers and the supposedly source, someone with enough technical expertise could make the attack seem like it was coming from literally anywhere. As long as the packets route through that machine, it wouldn't matter.
And even if the attacks genuinely came from a US military institution, I doubt it was from anything but an unsecured web server that was cracked. Of course the article doesn't give many details.
It just bothers me that they'd publish this garbage and make it seem as if that was exactly how it happened, when there are numerous possibilities of how the attempt could've occured. And without any details.
You can try to blame this on the Australian media, but I can't, since they should've dismissed this attack, and the media shouldn't even have been notified.
Re:Two very likely possibilities (Score:2)
Re:Okay... (Score:2)
In either case, it's still an interesting case study and really should remind everyone that the main security concern they must face is not the threat to *their* data, but the threate that someone will use their computer illegally to access *other* peoples' data. Therein lies the real problem.
c4hn y00 sai Spo0off? (Score:1)
journalism bwahahahah (Score:1)
Australian censor/ (Score:1)
Its amazing how Americans always seem to come up with the idea that we have really strict censorship in Australia.
I can tell you right now there is more censorship in the US. It is mainly about the application of the laws that matters, and here the laws are applied in an appropriate maner (mostly).
In case you are wondering why this was reported (about 24 hours ago), the guy is supposed to report such attacks and the rest is just a media beatup.
Do I trust the US, not really.
Which is worse? (Score:2)
or,
2. the US Army decided to audit the Aussie stock exchange without authorization.
Quite frankly, I hope it's the latter.
Re:Two very likely possibilities (Score:1)
Not the military (Score:2)
The box the attack was launched from was probably cracked.. Military boxes aren't exactly secure..
If you look at [attrition.org]
http://www.attrition.org/mirror/attrition/stats
Breakout Total
Government Systems 79
NASA Systems 27
ARMY Systems 19
Military Systems 47
.. and that counts only hacked boxes where the webpage was replaced..
is the government really responsiable? (Score:1)
and if it hasnt been said enough yet,
dont go bashing innocent
tyler
Re:Okay... (Score:1)
Forgetting something..? (Score:1)
If a
It makes things more challenging for the hackers, and almost impossible for admins if the owner of any one of those hosts along the line doesn't know what they are doing.
Now if one of those systems was an NT box, or a socks5 proxy (perhaps an open insecure wingate) with open access, then there would be little chance of the hacker/cracker being found.
-zardoz
motives (Score:1)
given the current state of affairs this is a possibility.
Re:Australian censor/ (Score:1)
Re:The power of the Roo (Score:1)
-warren
Re:That's no good at all (Score:1)
Is the publicity just part of a pissing war? (Score:2)
Military Security (Score:1)
Don't suggest spoofing (Score:1)
Re:What bothers me ... (Score:1)
Re:That's no good at all (Score:2)
Israel: light brown people -1, jewish +1, Nuclear weapons +1. Score 2 first world!
India: Dark brown people -2, hindu religion -1, nuclear weapons +1 score -2 second world!.
Khazakistan: light brown people -1, nuclear weapons +1, moslem religion -1, score -1 second world.
Japan: Budhist/shinto -1, no nukes 0, yellow people +3 (Wild card!) score +2 first world!
You can use this simple guide to determine where in the world countries stand. Politicians use a very similar guide to set foreign policy too!.
I hope I was able to clarify this for you. In guess who is coming to dinner there is a quote that I love.
If you're white you're all right
if you're brown stick around
if you're black stay back!
If it were really the US Military... (Score:1)
From an aussie (Score:1)
On top of that.. I'd be willing to bet it was one of our own guys....
in fact.. i'd bet a new athlon that it was one of ours AND either from tasmania/queensland or over here in western australia..
(but that doesn't mean we can turn our backs on you yankees yet... *grin*)
It was the US Government... (Score:1)
Re:What bothers me ... (Score:1)
The media's interpretation? (Score:1)
Pfft, It's all speculation. (Score:2)
Now, chances are the would be cracker targeted the ASX, believing it to be inferior, for personal gains or whatever, but failed.
The fact that it seemed to have come from another source, after originating from the Military base would indicate that the 'owned' box was where the guy was going to have his trail end. I would say he was literally 'caught in the act' before he covered his path at this point. Routers pass a lot of information on and it is oh so possible to link back spoofed IP's to the source route. On a wide area scale, spoofed IP's do not return to the host very easily. If the connection is open, the trace can be made to the source IP.
Now for my 2c worth: It would not surprise me one bit if he just dialed-in to a MIL server that he just 'happened' to have a number for, so was designated an IP in their adress range. If this guy was any good though, he would have removed any evidence of ever actually having dialed in though. IMO, this is about the only plausible explaination.
You can break the law all you like -- until you're caught. Remeber one thing. It is only the dumb criminals that are in jail.
Re:What bothers me ... (Score:1)
Do you seriously believe that simply because a single media outlet gets their hands on some information (info which another poster points out had to be reported to authorities), and then twists it around to try and grab a headline, that all Australians believe it to be true and that the Americans are all against us? Of course we do!! Newspapers and other media outlets would never twist a story or try a bit of scare-mongering to lure in a few extra $$
Shame on them.
Why on Earth? (Score:1)
Most astralians are simple especially our journalists and politicians.
No Body seem's to think that mabey the US didnt do it, mabey it was the bored system administratior?
Australia has every thing to lose here....
Re:What bothers me ... (Score:1)
On a slightly different note, considering our "cyberwar" on Yugoslavia, I'm sure many other governments could be concerned and so are initiating counter attacks( ie, if they're going to get us, we might as well get them ).
Re:Don't suggest spoofing (Score:1)
AFAIK, TCP/IP is a protocol, not a set of laws
Spoofing is very real, and if you believe otherwise, you're being illogical. Think about the essence of data communications, just a bunch of electrical pulses travelling down a wire. If you have access to that wire, you can send anything down it and make it seem like it was coming from anywhere on the other end. You can also deny traffic, or modify it en route. Basically, you can do anything.
Don't kid yourself, spoofing is a common occurance, and those who do it properly are usually not even noticed.
And encryption doesn't help much either, if the format of the data is known (the protocol), you can easily just proxy the authentication and none would be any the wiser. 3rd party authentication is slightly better, but for a determined entity, its really just one more wire to compromise.
Re:Don't suggest spoofing (Score:1)
Re:That's no good at all (Score:2)
The reference to 1st, 2nd, 3rd world date back to a paper by a political geographer (whose name escapes me) he used 1st world to describe the "free nations", 2nd world to describe the USSR and it's children.
And 3rd world was used to describe the "Unaffiliated" countries.
Zl
Re:Hmm... (Score:1)
This is all part of a BIGGER plan by Indonesia (Score:1)
But really and truly the only thing that is stopping Indonesia from declaring war on Australia is the presense of International military espically from the United States, who are believed to be the most powerful military force in the World
Possibly they thought they could piss us Aussies off by *trying* to hack out ASX from The US Military whom we believe to be our friends
Re:It was the US Government... (Score:1)
Come america go back to picking on the Russians
hehehehhe
You're all missing the point (Score:1)
The Australian Government, most notably Senator "dick" Alston are pushing for Internet censorship in Australia. They need media beatup, overkill and sensationalism to push their warped little barrow.
This article is to make the plebs feel that the government is doing the right thing keeping all Australians, especially little children, safe from all us evil paedophile 'net users.
Re:The power of the Roo (Score:1)
Fear the power of the Roo.
Don't you mean "ph33r th3 p0w3r 0f th3 r00"? Our kangaroos are very l33t
fun fun fun (Score:1)
I bet they all use their girlfriend's first name as password too. I know that is how it works in the french army. The sysop is a private, and when you are a private you do not want to tell an officer that 'barbara' is not a secure password.
Not that the french army is connected to the net either but they lock their windows box so that nobody beats their Tetris hi-score.
way too much fun!
---
Re:Okay... (Score:1)
From my personal experience 99.9% of attacks come from an already hacked site. It is interesting that they did not use a university as a staging area which is the usual case.
You guys crack me up (Score:3)
From what I recall of the original story on TV (I was half asleep at the time).
1. The ASX gets loads of people trying to get into it.
2. Almost all of these people are idiots who have seen "Wargames" and think they'll give it a try.
3. There have been a few serious (ie more than clueless) attempts, he mentioned two, one from Victoria (the state, not a person), and another which was traced back to a military installation in the US (via a hacked site in New Zealand IIRC).
4. The ASX has pretty good security, using multiple firewalls through which noone has got further than the first. The guy was also very careful not to boast about how good it was or to go into any great detail. He merely stated a few facts.
A lot of you seem to be saying 'well obviously the military box was compromised' as if such a point had never crossed the guys mind.
It seems to me that they simply went to the right source to stop their problem (unless you expect them to hack back in to the US military box to trace the hacker, news at 10, Australian Stock Exchange hacks into US Military site).
That and the fact that they want local laws changed to make prosecuting local hackers easier (as the person from Victoria was traced but could not be prosecuted because he was not caught 'in the act').
Hardly Earth shattering stuff Slashdot.
The Great Chunder Page - Alcohol Induced Fun!
Re:Okay... (Score:1)
Re:This is all part of a BIGGER plan by Indonesia (Score:2)
Firstly, countries are not "literally at war" until there is a public declaration. Have you heard one of these? Of course, this doesn't exclude a campaign of dirty tricks or covert interfearance like the US involvement in Afghanistan in the mid 80's.
Secondly, the US and Australia are firm allies. This doesn't mean that each country isn't soverign, and sometimes their national interests clash. However, it is on nothing as important as national security. Remember that Australia hosts some important US satellite bases on its soil. Now, of course, the US military will not grind to a halt without these bases, but they are important "assets".
Finally, invasion of Australia from the north is a subject that has engaged the brains of Australian military planners for a long time. Summary: it would be extremely difficult and probably couldn't be done by anyone except the US itself. Remember that after the city of Darwin on the coast, to the south there is 2000km of really nasty desert. To the east there is 2000km of really nasty crocodile infested tropical rainforest. Logistics for supporting an invasion over that kind of terrain is Australia's defense.
Re:Australia is not a developed country. (Score:1)
Re:India is richer than Australia (Score:1)
India has about 50 times as many people
Points system (Score:1)
How about "per capita GNP".
I agree with your sentiment though.
Hackers had not been able to breach the first wall (Score:1)
Similar to: 90% crime is never reported -> 90% of hackers are never detected...
I can understand the reason for using a Multilayer firewall to build a secure demilitarised zone in your network, but if you are accepting incoming packets through both firewalls to your internal network then the method of exploiting is exactly the same, say, as if you have 1,3 or 100 layers of firewalls, because the packets will pass through them all (assuming they match the firewall criteria as valid packets)
I expect plenty of hackers are now also armed with the extra information that there is another firewall beyond the first, because if they get access to a host within the demilitarised zone they now know what to look for (another firewall).
US military cracked. (Score:1)
--
Re:That's no good at all (Score:1)
ermmm... yes, right, hmmm....
did you forget what you were reading?
and....
Japan - no nukes? ha, you DO make me laugh..., plenty of nuclear, perhaps no nukes...
Re:motives (Score:1)
Blah. Blindspoofing a tcpconnection isn't exactly easy. So my guess is that spoofed ip packets are out of the question. The american military got a box cracked again. Or maybe they forgot to close their wingate.
And if you don't think this is a realistic explanation, then start using IRC and visit a couple of "eLiTe takeover-kiddie-channels". you'll be surprised when you see how many who uses
--
Re:What sense of the word "military installation"? (Score:1)
Why should they filter outgoing packets?
And, no, I don't think all US-.mil sites filter outgoing packets. Not when you think about the amount of
--
Re:this is funny.... (Score:1)
You've got to get packets back to yourself, to get to know what ports are open. In other words -- it's not that easy. You've got to be "in between" so that you can packetsniff the packets coming from the host you're scanning, and the address you've spoofed.
(correct me if i'm wrong)
--
Re:Which is worse? (Score:1)
2. the US Army decided to audit [..] Quite frankly, I hope it's the latter.
But, it's probably the first alternative that's correct. The US military have thousands of *nix'es up'n running, some for years without any upgrades. There are bound to be hundreds of easily crackable boxes in the
and the
--
Re:Forgetting something..? (Score:1)
My guess it that he did two or three bounces via insecure @home boxes. (there are hundreds of open wingates there..) Then via some
Of course, just a guess, but thats what I would've done if i wanted to go on a cracking run. (@home really should start blocking port 23, 1080 and so forth)
--
Re:Not the military (Score:2)
While I kept a box on the local Ethernet for four years, there were no successful breakins. On the other hand, considering that almost all the "attempts" were simple probes (as in: "let's portscan 128.2.*.*" etc), it wouldn't be fair to say that my box was more secure than, oh, one with a full-time sysadmin auditing the code. It simply wasn't targetted as much as a
Re:Don't suggest spoofing (Score:1)
Either there need to be a cracked host in the route between the
And, since I guess the
Therefore
--
Re:Don't suggest spoofing (Score:1)
DoS attacks cannot really be called 'cracking'
SYNflooding / smurfing / udp-flooding with spoofed sender-addresses is nothing new. But I really, really doubt that is what this is all about.
--
Is their database really on a public network? (Score:1)
Re:wasn't me, honest (Score:1)
OSI is on its way to your cube...I suggest you panic and run.
Dunno about AFRL but HQ AMC/SC reads. Well, at least one of his staff weenies does.
ObArticle: [...]associated with military activities[...]
This is pretty vague. I don't necessarily read *.mil here. It could be MITRE, or RAND, or a DoD host. I suspect that somebody (maybe an Aussie) broke into the host to perform the attack. If we were really trying to mess up ASX, I assume we'd do it through a front. At least, I hope so.
Next article: Host associated with US Military Posts to Slashdot
Neutron
Re:It was the US Government... (Score:1)
Who says... (Score:1)
Re:this is funny.... (Score:1)
> get to know what ports are open. In other words
> -- it's not that easy. You've got to be "in
> between" so that you can packetsniff the packets
> coming from the host you're scanning, and the
> address you've spoofed.
>
> (correct me if i'm wrong)
What's often overlooked is that 'in between' can be *either* in between the scanner and the victim or the victim and the spoofee. If you do the second part, it's more likely that you'll have a case of denyability if you're also the spoofee if you can route the replies to the spoofed packets out-of-band.
"We were sniffing our network that day because we seemed to be under some sort of attack, here're the logs and you can see that we didn't send any traffic out, it must have been spoofed" is possibly a good defense in such situations, especially if the spoofee is say a college network with a significant number of hosts and shared media.
Paul
Re:Is their database really on a public network? (Score:1)
Eh. Say you run a company. Your server serves vital information to your employees - so that they can do their work. Your employees also need to use the internet.
Ok, what do you do? Well, you put everything on the same network, and make a hell of a firewall. You should be able to connect out -- but nobody should be able to connect from the outside to any of your machines. If you need a machine to be accessible from the internet, you put it outside the firewall -- or enable special rules for that machine. Furthermore, that machine should now be treated as 'non-trustable' by the rest of your network -- so that if it gets compromised, the rest of your network should not suffer at all.
*puh*
In other words -- the moment you put the host behind a secure firewall, it's not on a "public network" anymore. Now the next question is "what on earth may be looked upon as a 'secure firewall' -- does it exist?
--
i thought... (Score:1)
-----
Re:Don't suggest spoofing (Score:1)
> accomplish on the net (due to lag, and pretty
> random numbers used in the handshakes) -- we can
> pretty much rule that out.
(A) You're missing the fact that TCP isn't the only protocol you can blindly spoof. So, if we're talking about spoofing in general, there's a UDP and ICMP-sized hole there waiting for poorly written applications.
(B) Lag has _nothing_ to do with a blind spoof attack, since you can either flood the spoofee or pick a host that's behind a network that doesn't report unreachables.
(C) Very diffuclt to predict sequence numbers are a relatively new occurance. I wouldn't bet my hard-earned money on everything using them either.
(D) Why are you ok with cracked end-boxes, but not
anything cracked in the path? You wouldn't believe the number of poorly administered routers, older routers with vulnerabilities, and new Web browser configuarble routers set up by morons.
Your conclusion is probably correct, but your premises are flawed.
Paul
Re:Australia is not a developed country. (Score:1)
Re:Don't suggest spoofing (Score:1)
and ICMP-sized hole there waiting for poorly written applications.
This is of course well known to the australians. You've got to be pretty damn stupid if you say that someone was involved in attacking you -- because of the sourceaddress of icmp / udp packets (or tcp-syn packets). I assume that we're talking about a successfull tcp-handshake. If not - I don't get why this got into the media at all.
(B) Lag has _nothing_ to do with a blind spoof attack, since you can either flood the spoofee or pick a host that's behind a network that doesn't report unreachables.
Very wrong. If you've followed bugtraq the last week or so, you would've noticed the "bug" in the linux 2.2 kernel that makes blindspoofing easy on a network with little lag. On the internet the blindspoofing would be difficult, because of lag. Also - if i remember correctly - the two machines would need to have quite syncronized clocks.
(C) Very diffuclt to predict sequence numbers are a relatively new occurance. I wouldn't bet my hard-earned money on everything using them either.
Any recent tcpip implementation should should have difficult to predict sequence numbers. I don't know how older systems works, so you're probably right.
(D) Why are you ok with cracked end-boxes, but not anything cracked in the path? You wouldn't believe the number of poorly administered routers, older routers with vulnerabilities, and new Web browser configuarble routers set up by morons.
I have a tendency to believe that most core-routers are well-configured. Of course, there are extreme amounts of poorly administered routers
Of course, it may be that I'm not paranoid enough about THIS.
--
Tool (Score:1)
An ASX separated from the outside world would be much less useful.
Oh, and what part of the article mentioned 'the ASX database' (whatever that means!) and what bad security practices does it reveal?
Surely you aren't suggesting that using multiple firewalls is a bad idea?
The Great Chunder Page - Alcohol Induced Fun!
WTF? (Score:1)
I mean, multiple firewalls on something pretty important to the economy, who'd a thunk it?
The Great Chunder Page - Alcohol Induced Fun!
Re:Australian censor/ (Score:1)
Scoff, A hack attempt. (Score:1)
Who woulda thought? (Gee) Sure is hard to bust into these mammoth vaults that have similar securities to... "A brick of swiss-cheese". Get with it clan. People have been using military systems and ARPANET for years as not only a target, but a drop point to break into other systems. Not very much news here. What would be the icing is if someone found out it was Kevin Mitnick.
Stick a fork in it: ding I'm done.
-Bf
(US) TLA Envolvement (Score:1)
Hello, I don't want you to think that I am some paranoid phreak. But whom in this country (US) likes to attempt unauthorized and unsanctioned cracks on other country's boxen. Anyone remember the little TLA referred to as the NSA.
Why? Well why not it, was a challenge to their skills and it can give them an insight to depth of security other countries implement.
Why make it appear to originate from a US military installation? Because then it would be easily dismissed as a spoof attack. Because we all believe the US Military is neither intelligent enough to attempt to crack the system, nor do we believe they are stupid enough to try. Also with all of the compromised US military boxen it gives the military a perfect out. This way no one gets blamed except for the Airman acting as sysop over that box who just got demoted for failure to secure it and almost causing an international incident.
Remember US intelligence agencies do some pretty harry stuff afterward they can then classify it without fear of reprisal. Because remember, it is for the sake of national security. Well, that and there is no one in this country with balls enough to keep them in check.
Re:Which is worse? (Score:1)
Re:What bothers me ... (Score:1)
Read the "The Cuckoo's Egg" (Score:1)
Re:That's no good at all (Score:1)
Get off the Aissie's case... (Score:1)
Get off the Ozzie's case... (Score:1)
"US Military launches Minuteman II Missile from Vandenburg Range in the general direction of Australia. US claims that the missile was 'modified' to prevent nuclear detonation, and anyway, they shot it down with an ExoAtmospheric 'Kill' Vehicle. Not many hurt."
Story Two:
"US Military Installation in Western California launches attack on Australian Stock Exchange Server. Not many hurt"
Just what have you guys got against the Ozzies anyway? If I were Australian I'd be starting the get paranoid.
Feed The Hungry. Save the Whales. Free the mallocs
Re:wasn't me, honest (Score:1)
Alumin(i)um (Score:1)
Yeah, Sure, Whatever... (Score:1)
Did you mean 'hacker' or 'cracker'?
Do you know the diffrence? I don't think you do.
Re:This is all part of a BIGGER plan by Indonesia (Score:2)
"The number of suckers born each minute doubles every 18 months."
Re:Military Security (Score:1)
Re:Australian censor/ (Score:1)
His name is Governor Jessie Ventura.
Or that drugs should be legalized.
His name is Governor Jessie Ventura.
oh, and he also wants to legalize prostitution.
Rupert Murdoch (Score:1)
Re:Reason and Sensibility (Score:1)
Not important...? (Score:1)
The ASX survived pretty well and was one of the very few that did. If we fell on our arses now, I can guarantee you in the US would feel the effects.
Mexico and Canada (Score:1)
*Removes tongue from cheek*
Guy Being Interviewed Was A Suit (Score:1)
cheers
marty
Re:This is all part of a BIGGER plan by Indonesia (Score:1)
I believe they wouldnt have to come to Australia, they are believed to have missilies which can reach Darwin
HysteriaMongers == Idiots (Score:1)
$sarcasm on$
The English don't like the Germans. The Belgians don't like the Dutch. Many people don't like the USA. No one likes the French.
$sarcasm off$
But really, it doesn't matter at all whether Indonesians as a race like or dislike Aussies.
What matters somewhat is a country's official foreign policy. What matters a lot from Australia's point of view is the US's official foreign policy. This real-politik has served Australia well since the war.
I agree that having your embassy shot at is not great. However, this is why the people representing Australia over there are called "diplomats". They are supposed to be diplomatic about these kind of things.
If embassies are consistantly shot at, to the outside world, the host nation just looks incompetent for not being able to keep peace on their streets.
Finally, everyone in politics (even Nth Korea) realises that the firing of a missile which hits a foreign country is an act of war - and these days will probably get a multinational force arrayed against them. And anyway, why would Indonesia provoke a shooting war that they could never win with one of their biggest trading partners?