[Infowarrior] - Hackers Hijacked Large E-Bill Payment Site

Richard Forno rforno at infowarrior.org
Thu Dec 4 16:13:01 UTC 2008


Hackers Hijacked Large E-Bill Payment Site

http://voices.washingtonpost.com/securityfix/2008/12/hackers_hijacked_large_e-bill.html?hpid=sec-tech

Hackers on Tuesday hijacked the Web site CheckFree.com, one of the  
largest online bill payment companies, redirecting an unknown number  
of visitors to a Web address that tried to install malicious software  
on visitors' computers, the company said today.

The attack, first reported by The Register, a security news Web site,  
began in the early morning hours of Dec. 2, when Checkfree's home page  
and the customer login page were redirected to a server in the Ukraine.

CheckFree spokeswoman Melanie Tolley said users who visited the sites  
during the attack would have been redirected to a blank page that  
tried to install malware. Tolley added that CheckFree regained control  
over its site by 5 a.m. on Dec. 2. The company said it was still  
having the malware analyzed by experts.

"The degree of exposure to users is dependent on how current their  
anti-virus software is and what browser they used to connect with,"  
Tolley said, adding that the company will release more information  
about the attack as it becomes available.

But Paul Ferguson, a threat researcher with anti-virus firm Trend  
Micro, said Trend's analysis of the malware indicates that it is a new  
strain of Trojan horse program designed to steal user names and  
passwords.

It appears hackers were able to hijack the company's Web sites by  
stealing the user name and password needed to make account changes at  
the Web site of Network Solutions, CheckFree's domain registrar. Susan  
Wade, a spokeswoman for the Herndon, Va., based registrar, said that  
at around 12:30 a.m. Dec. 2, someone logged in using the company's  
credentials and changed the address of CheckFree's authoritative  
domain name system (DNS) servers to point CheckFree site visitors to  
the Internet address in the Ukraine. DNS servers serve as a kind of  
phone book for Internet traffic, translating human-friendly Web site  
names into numeric Internet addresses that are easier for computers to  
handle.

"Someone got access to [CheckFree's] account credentials and was able  
to log in," Wade said. "There was no breach in our system."

Among the 330 kinds of bills you can pay through CheckFree are  
military credit accounts, utility bills, insurance payments, mortgage  
and loan payments. Browsing through the first few letters of the  
company's alphabetized customer list reveals some big names, including  
Allegheny Power, Allstate Insurance AT&T, Bank of America, and  
Chrysler Financial. See the full list of companies here.

CheckFree's Tolley stressed that the attack occurred during off-peak  
hours when customer traffic to its Web site is typically low. Still,  
CheckFree has a huge customer base: The company claims that some 24.7  
million consumers initiate payments through its services.

CheckFree declined to say how many of its customers and companies it  
handles payments for may have been affected by the attack. But this  
thread over at an Ubuntu Linux mailing list suggests that U.S. Bank  
may also have been affected by this attack. U.S. Bank did not return  
calls seeking comment.


More information about the Infowarrior mailing list