30Apr98 UK: SECURITY - RETURN OF THE HACK.

Even Nasa's security measures aren't always enough to deter hackers.
Sharon Smith outlines a problem that just grows and grows. 
 
Like street muggings, computer hacking has become so ubiquitous that it is
almost accepted as one of those unavoidable facts of modern life. It's a
plague that, in theory at least, afflicts primarily the weakest. 

But a couple of weeks ago, when some of the top US chief executives
gathered for a security convention in Atlanta, the statistics must have
made their hair curl. The figures underlined the vulnerability of even
apparently secure computer systems to cyber attack. 

Last year, the Pentagon was subject to 250,000 hacker attacks, while the
annual cost of hacking to US industry is now reckoned to be a staggering
$10 billion. 

[Quoting the flawed GOA report.]

Worse still, it was revealed, there are now nearly 2,000 Web sites
offering tips, tools and techniques to miscreants who, like mountaineers
scaling Everest, want to conquer any and every system - if only because of
the challenge it presents. 

Kevin Mitnick, the supposed grandmaster of hackers, is languishing in jail
awaiting trial on charges relating to nearly $30 million of alleged
computer and telecoms fraud, but there is a queue of applicants waiting to
follow in his footsteps. Among the more recent headline grabbers was an
attack launched from the Internet last month that froze thousands of
computers running Windows NT. Victims of the attack included 14 of the 15
Web sites operated by Nasa, plus computers operated by the US military and
by many universities. 

[This is the first mention of Mitnick being a 'grandmaster' of
hacking. The damage stats of $30 million seem to be a bit high
considering he sold no information, abused no credit cards, etc.]

The cyber attack crashed the computers by sending out a message which
exploited a flaw in the NT operating system. Microsoft had issued a patch
for the loophole in January, but the victims had not applied it, nor had
they erected firewalls in front of their Web servers. 

Another recent high-profile case involved two US teenagers who roamed
through unclassified military Web servers using a server security hole. 
Again, the Webmasters could have used well-known software patches to keep
the hackers out. 

The duo, who got on to the Internet using service provider Sonic, used
what is known as the statd exploit, which was publicised on the Web in
November 1997 and for which an advisory was issued in December. The
exploit allows hackers to gain root access to Unix machines running Sun
Microsystems' Solaris operating system. Once access has been obtained,
hackers can install programs or delete Web sites. 

In the UK, hacking exploits such as these do not surprise security
experts, who warn that the threat will continue to grow in tandem with the
Internet's own expansion. 

Contrary to popular opinion, the problem will not necessarily be confined
to the US. Industry observers say hacking is already a growing menace in
the UK. 

[Who's popular opinion says hacking will stay confined
to the US?!]

UK organisations, however, have been lulled into a false sense of security
because computer attacks are not always publicised. Bill Brett, sales
director at Hertfordshire-based IT services company Barron McCann,
estimates there are thousands of hacking cases each year in the UK. 
'Hacking is a bigger problem in the UK than companies realise, because the
last thing a company wants everybody else to know is that they have been
hacked into. 

'It's embarrassing for them to admit that their IT system was not secure
enough, and there is the fear that the hacker will return. You wouldn't
advertise the fact that you'd had a burglary at your home, would you?' The
real extent of UK hacking is difficult to gauge. 'Around 5% of our
disaster-recovery cases are known to be due to people getting into company
IT systems via the Internet,' Brett says. 'But the statistics could be
even higher because we don't always know that hacking is the cause of a
problem.'

Outsiders hacking into company IT systems fall into one of two categories. 
Experts say that 95% of cases are of hackers infiltrating systems merely
to show how clever they are or to create havoc, as in the Windows NT
incident in the US. 

[The incident quoted regarding NT did not allow infilitration.
It allowed a remote Denial of Service.]

These incidents are serious enough for the organisations affected to be
heavily inconvenienced, and they can lose money through wasted business
time. But even worse are the 5% of attacks where hackers set out to crack
passwords in order to alter, steal or erase data. Such acts threaten
companies' livelihoods and even peoples' lives. 

[Threaten lives? A bit over-dramatic I think.]

Bernie Dodwell, security products manager at Integralis, says: 'Once
hackers have cracked a password, they are into a system with free range to
do anything they want. If they know where a hospital's patient records are
held, they can go in and change them. They can totally destroy businesses
by altering or wiping out their data.'

[Only if they crack a password of an account that grants them
access to the information. Cracking a password doesn't necessarily mean you
can get ANY access to the system.]

Attacks on Web sites, where mischievous hackers go in and alter
information, are already commonplace. Richard Woods, a representative of
Internet service provider UUNet Pipex, explains: 'They go in and muck
around a bit, then go off again. But it can damage a company's reputation
if obscenities or duff information are left on its Web site.'

Cookies, or information about visitors to Web sites, are another popular
target - hackers can tap into users' browsers to get cookie data. The
technique has also been used by marketing companies intent on poaching
potential customers from rivals, as well as companies aiming to convert
visitors to their Web sites into customers. 

The problem is exacerbated by the fact that the Internet and,
increasingly, corporate IT systems are open systems as opposed to the
closed architecture of the traditional mainframe environment. 

'Security on the mainframe is very well developed because of the time it
has been around, so it's difficult to crack mainframe security measures,'
says Dodwell. 

Unix, as a more open environment, is a different case altogether. Although
security has improved with time, it is still not as good as for
mainframes.  And Windows NT is not much better - it has a reputation of
having little security because it is so new. The same applies to the
Internet: it is such a recent and complex technological achievement that
it, too, has caught many organisations unawares. 

There is a third type of hacking danger - insider attacks by a company's
own employees. Tony Martin, marketing director at router manufacturer
Teltrend, explains: 'In larger organisations, during salary reviews, it
has happened that employees interrupt financial transactions, change the
amount allocated to them, complete the message and get a salary increase
of 100% instead of 10%.'

Experts agree there is no way yet to render a system totally foolproof. 
But there are measures that organisations can adopt to make their systems
secure enough to deter hackers. If an attack does take place, a system
should be secure enough to enable a company to pick up the incident
immediately and act quickly to prevent a return visit. 

To prevent hacking in the first place, says Woods, organisations need to
devise and implement security strategies. 

'One of the biggest problems is that security experts are often not called
in until after the horse has bolted. Companies think that if it hasn't
happened to them yet, it's not going to,' he explains. 

One of the most simple measures is almost universally the most neglected. 
'Organisations don't change their passwords frequently enough,' says
Brett.  'They forget that a lot of people have access to a password,
including former employees who were sacked or made redundant and might be
upset.'

A few other precautionary measures should be enough to safeguard most
corporate systems. The key to combating the problem is to treat like with
like. Hackers are like any other sophisticated criminals: they take pride
in their work, and are up to date with the latest equipment. It is vital
to make sure the system's users do the same. They should know how to
constantly maintain and review any security features. 

One step is to implement sniffer software that can prevent intruders from
reaching designated parts of the system. And Web sites should be monitored
constantly, so any defacement can be immediately rectified.  Encryption,
too, helps prevent interference with messages sent over the Internet and
internal networks. 

[Sniffer software will not prevent intrusion AT ALL. Sniffers
passively monitor information going to and from the system.]

Disaster recovery also plays a part. Brett estimates that a mere 12 to 14%
of UK companies have a recovery plan in place. If a company does become a
victim of hacking, it is essential to have the necessary backup system so
the program can be running again as quickly as possible. 

'We can also examine the hacked system to find out where the holes were,'
says Brett. 

Protection against hackers is the number one priority, warns Dodwell.  Sad
though it sounds, you should trust no one: 'There are going to be 300
million users on the Internet by the end of 1999, and not every one of
them will have no intention of going out to cause mayhem.'.

COMPUTING 30/04/98 P56