Hacks show patterns

Hacks show patterns

They don't all garner headlines, but successful hacks of government Web sites are startlingly common. A successful hack, said Alan Paller, director of the SANS Institute of Bethesda, Md., is one in which an intruder manages to change a page.


Alan Paller


Using reports at a site that tracks hacking incidents, www.attrition.org, Paller calculated that in a four-month period late last year, hackers altered as many as 75 .mil and .gov sites.

The number reflects a systemic problem, not individual errors by webmasters and systems administrators, Paller said at the recent FedWeb conference at the National Institutes of Health campus in Bethesda. He pointed to Web server hardware preloaded with operating systems as the source of the problem.

'Systems are delivered to you broken, accessible to hackers,' Paller said.

He said Microsoft NT and SunSoft Solaris and other Unix versions are equally vulnerable as shipped, and that a SANS test of Solaris out of the box gave the OS a security score of 62 out of 100.
Multiplying the threat is the fact that 'all hack routines are now scripted so they can rapidly scan thousands of sites,' looking for systems to exploit for denial-of-service attacks, Paller said.

'T. Temin

inside gcn

  • blockchain (Immersion Imagery/Shutterstock.com)

    DARPA eyes 'less-explored avenues' of blockchain

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above