Date: Thu, 11 Dec 1997 23:00:26 -0800 From: Cy Schubert - ITSD Open Systems Group <cschuber@uumail.gov.bc.ca> To: freebsd-security@freebsd.org Cc: security-officer@freebsd.org Subject: Re: Yahoo hacked Message-ID: <199712120700.XAA12938@cwsys.cwsent.com>
next in thread | raw e-mail | index | archive | help
Enclosed is a posting by Aleph One to BUGTRAQ. Considering that a weak password may have contributed to the hack, if the account had access to their Web pages, a root compromise may have not occured. Having said that, the first rule of investigating a compromise is to assume that root had been compromised, until it can be proven otherwise. I don't think this is the time to panic. I'm sure that someone in the core team has already spoken to the Yahoo security officer to find out more and to offer assistance. That's probably the quickest way they will be able to get enough information about the breakin to determine whether a FreeBSD bug had contributed to the breakin. Regards, Phone: (250)387-8437 Cy Schubert Fax: (250)387-5766 UNIX Support OV/VM: BCSC02(CSCHUBER) ITSD BITNET: CSCHUBER@BCSC02.BITNET Government of BC Internet: cschuber@uumail.gov.bc.ca Cy.Schubert@gems8.gov.bc.ca "Quit spooling around, JES do it." ------- Forwarded Message Received: (from uucp@localhost) by passer.osg.gov.bc.ca (8.8.8/8.6.10) id UAA09994 for <cy@passer.osg.gov.bc.ca>; Wed, 10 Dec 1997 20:32:47 -0800 (PST) X-UIDL: 881850684.021 Resent-Message-Id: <199712110432.UAA09994@passer.osg.gov.bc.ca> Received: from localhost(127.0.0.1), claiming to be "passer.osg.gov.bc.ca" via SMTP by localhost, id smtpdaaCmha; Wed Dec 10 20:32:38 1997 Received: (from uucp@localhost) by passer.osg.gov.bc.ca (8.8.8/8.6.10) id UAA02173 for <cschuber@passer.osg.gov.bc.ca>; Wed, 10 Dec 1997 20:32:27 -0800 (PST) Received: from orca.gov.bc.ca(142.32.102.25) via SMTP by passer.osg.gov.bc.ca, id smtpdaacCoa; Wed Dec 10 20:32:17 1997 Received: from brimstone.netspace.org by orca.gov.bc.ca (5.4R3.10/200.1.1.4) id AA10772; Wed, 10 Dec 1997 20:32:10 -0800 Received: from unknown@netspace.org (port 38928 [128.148.157.6]) by brimstone.netspace.org with ESMTP id <69868-6243>; Wed, 10 Dec 1997 22:59:05 -0500 Received: from NETSPACE.ORG by NETSPACE.ORG (LISTSERV-TCP/IP release 1.8c) with spool id 6098196 for BUGTRAQ@NETSPACE.ORG; Wed, 10 Dec 1997 22:55:34 -0500 Received: from brimstone.netspace.org (brimstone.netspace.org [128.148.157.143]) by netspace.org (8.8.7/8.8.2) with ESMTP id WAA29637 for <BUGTRAQ@NETSPACE.ORG>; Wed, 10 Dec 1997 22:54:12 -0500 Received: from unknown@netspace.org (port 38928 [128.148.157.6]) by brimstone.netspace.org with ESMTP id <1668-6242>; Wed, 10 Dec 1997 22:54:11 -0500 Approved-By: aleph1@UNDERGROUND.ORG Received: from dfw.dfw.net (dfw.dfw.net [198.175.15.10]) by netspace.org (8.8.7/8.8.2) with SMTP id WAA29188 for <bugtraq@netspace.org>; Wed, 10 Dec 1997 22:50:50 -0500 Received: from localhost by dfw.dfw.net (4.1/SMI-4.1) id AA10771; Wed, 10 Dec 97 21:50:52 CST Mime-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Message-Id: <Pine.SUN.3.94.971210212410.5437E-100000@dfw.dfw.net> Date: Wed, 10 Dec 1997 21:50:52 -0600 Reply-To: Aleph One <aleph1@dfw.net> Sender: Bugtraq List <BUGTRAQ@netspace.org> From: Aleph One <aleph1@dfw.net> Subject: Re: Yahoo hacked To: BUGTRAQ@netspace.org Resent-To: cy@passer.osg.gov.bc.ca Resent-Date: Wed, 10 Dec 1997 20:32:27 -0800 Resent-From: Cy Schubert - ITSD Open Systems Group <cschuber@passer.osg.gov.bc.ca> Here are some more rumors. It was not DNS related. It seems Yahoo uses a system where different web browsers are sent to different web servers. Thats why only lynx users (and maybe users of very old version versions of Netscape) saw the page. Only the lynx server was affected. The boxes affected where located in the GlobalCenter data center. They provide web hosting for Yahoo (and some other very large web sites). My informant claims that the attack actually came from behind the firewall via a dialup modem. He claimed that password to a users account on the machines had been compromissed. After the web page was modified all types of automatic bells and whistles went off and they restored from backup in fifteen minutes. You can view a copy of the hacked homepage at http://www.clipper.net/~skully/yahoo/ Notice that the page had a link to http://www.yahoo.com/yahooz-el8-search-engine-src.zip Wonder it the source code for yahoo's search engine was really there and if anyone got to download it ;) Aleph One / aleph1@dfw.net http://underground.org/ KeyID 1024/948FD6B5 Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01 ------- End of Forwarded Message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199712120700.XAA12938>