Sieci Playboy.com przełamane!

Z serwera internetowego portalu amerykańskiego Playboy.com, hakerzy wykradli informacje dotyczące zarejestrowanych użytkowników wraz z ich numerami kard kredytowych, którzy korzystali z usług on-line oferowanych przez tą witrynę.

Jak informuje Laura Sigman, rzeczniczka firmy Playboy Enterprises Inc. hakerzy złamali zabezpieczenia stron z numerami kart klientów, jednak na szczęście nie ma jak do tej pory żadnych sygnałów na temat bezprawnego wykorzystania tych kart.

Oprócz tego, hakerzy wysłali listy elektroniczne do części klientów, informując ich o przejęciu zastrzeżonych danych i ostrzegając, że transakcje zawierane z Playboy’em nie są bezpieczne. Oczywiście sprawa włamania została przekazana FBI, natomiast niżej znajduje się treść listu:

dear user,

since the summer of 1998, a shady hacker group known as ‚ingreslock 1524’ have maintained full access to the playboy enterprises inc. (pei) corporate network.

even when the pei websites were defaced by BoW/H4G1S and were ‚secured’, we retained our full access (no, installing ssh doesn’t make you secure).

we did have some very big plans to use the hundreds of thousands of customer details (names, addresses, order history & credit card information) harvested to automatically purchase hundreds of different products from different online companies (amazon, barnesandnoble, qvc, yahoo, even playboy) to be sent to each playboy customer, thus resulting in over 10 million dollars worth of fraud claims being made to credit card and in turn, insurance companies globally.

incase you think this is some kind of hoax, we have included your personal details below –

Name – [REMOVED]

Credit Card Number & Expiry [REMOVED]

your details are currently circulating the underworld of anarchists and credit card fraudsters, so we highly recommend that you contact your bank before much fraud is committed. we have also distributed over a million e-mail addresses to marketing and ‚spam’ organisations, so you will certainly have a lot of fun deleting unwanted e-mail into the future!

online companies can learn many lessons from this compromise –

1. do not use the same root or administrative (oracle, webserv, etc.) user passwords across different hosts on the same network.

2. never assume that by installing the latest security patches and installing ssh, that you are secure.

3. do not use insecure authentication methods, including nis, nis+ or ..rhosts.

4. do not protect your passwords with des in your shadow files, use md5.

end users can learn an important lesson from this compromise –

do not trust companies with your details online.

its been emotional.

its been emotional. we’d like to thank the playboy systems team for providing us with an interesting and challenging target. i’m sure that a big security company will make easy money auditing their systems and hopefully deploying a more secure network – although we’ll be back to test it again.

– m4rty

martyn luther ping

minister of information

ingreslock 1524 µ