Cyber Attack | Data Breach

Published on April 7th, 2015 📆 | 8168 Views ⚑

0

Linux Australia Hit With Server Breach


https://www.ispeech.org/text.to.speech

Linux Australia, a consortium in charge of organizing Linux conferences Down Under, acknowledged over the weekend it was breachedĀ by attackers who were able to secure access toĀ one of its servers, and with it, potential user information.

In a detailed email to users on Saturday, the groupā€™s president Joshua Hesketh, described how in March attackers were able to leverage an unknown vulnerability in its system to trigger a remote buffer overflow and gain root level access to its server. The newsĀ comes about two weeks after the group first noticed the breach andĀ conforms toĀ guidelines provided by the Australian Information Commissioner regarding data breach disclosure.

The breached database contained information about past conference attendees, including their first and last names, their physical and email addresses, and theirĀ phone number if they entered it. Attackers may have also had access to a hashed version of each conference attendeeā€™s password.

[adsense size='1']

Linux Australia insists that sinceĀ attendees pay for conferencesĀ via a third party gateway, userā€™s payment card information was not disclosed in the breach.

Hesketh claims the attacker implemented a remote access tool and rebooted the system to load their software into memory. From there the attacker was able to configure a botnet command and control server to parse data.

The server compromised in the attack belonged to the groupā€™s conference management system, Zookeepr, and hosted information pertaining to the groupā€™s conferences in 2013, 2014, and 2015 (linux.conf.au) along with data from 2013 and 2014ā€™s PyCon Australia, a separate conference the group hosted based around the Python programming language.

Linux Australia developed the system for themselves, so on March 22, when the server began spitting out a large number of error emails, developers didnā€™t think much of it.





ā€œThe error emails were generated by the automatic deployment of code merges to the various Zookeepr instances, and it is not uncommon for large numbers of these to be generated as generalized network routing or other issues occur,ā€ Hesketh wrote.

Two days later however, upon further examination, the groupā€™s administrative team was able to deduce that the server had fallen victim to a malicious attack. In response, developers suspended all non-admin accounts that interacted with the server.

Hesketh claims the groupā€™s admin team was also able to isolate the RAT, the botnet software, and remove any init scripts relating to the attack.Ā Init scripts, used to configure Linux daemons, are run to start required processes as part of its boot process.

[adsense size='1']

Going forward, in order to be more proactive about security the group claims it will expire conference attendee accounts three months after each conference ends, enforce only key-based logins, and deploy a log analysis tool that should tip it off if any suspicious activity isĀ observed.

In addition toĀ discussingĀ Linux issues, the group, comprised of more than 5000 Aussies,Ā also participates in several subcommittees and special interest groups which lobby before the countryā€™s government on behalf of allĀ open source software. While the site is currently offline,Ā the group held its most recent conference,Ā Australasiaā€™s regional Linux and Open Source Conference, in Auckland this past January.

Tagged with: ā€¢ ā€¢ ā€¢



Comments are closed.