Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
 Post subject:
PostPosted: Fri Mar 02, 2012 10:51 pm 
Offline
Senior Newbie

Joined: Fri Mar 02, 2012 8:53 am
Posts: 5
OverlordQ wrote:
Second, no I wouldn't expect to be notifed of that because it doesn't affect me. Critical management infrastructure being broken into, does.


It technically wasn't broken into the same sense as someone hacking it. Someone had login credentials, logged in, did stuff. Linode knows exactly who was affected, and there's no risk at all of this affecting you if you haven't received a notification already. There simply isn't any need for an immediate notification to every customer when we know for sure that only a very specific set was affected and nobody else will be affected in the future.

There is a necessity to give some information to the general public about what had happened, sure, but they did that. Emails should only be used if people are required to take some sort of action. If you want to get status updates in general quickly, subscribe to the feed on status.linode.com. You can probably even get that as an email through some service.


Top
   
 Post subject:
PostPosted: Fri Mar 02, 2012 11:40 pm 
Offline
Junior Member

Joined: Thu Mar 22, 2007 1:39 am
Posts: 23
In that case - how did the attacker(s) gain this level of access? How do we know that they no longer have this level of access? If those credentials are no longer valid, how do we know that the attacker cannot acquire new credentials and wreak more havoc?

Essentially, all we are told is 'someone had access, and did bad things. we removed said access.'

Not very informative.


Top
   
 Post subject:
PostPosted: Sat Mar 03, 2012 3:42 am 
Offline
Senior Newbie

Joined: Wed Feb 29, 2012 7:51 am
Posts: 16
compizjoe wrote:
OverlordQ wrote:
Second, no I wouldn't expect to be notifed of that because it doesn't affect me. Critical management infrastructure being broken into, does.


It technically wasn't broken into the same sense as someone hacking it. Someone had login credentials, logged in, did stuff.


Not to add oil to the fire but as far as I can see, there is nothing in the status update to give the impression that it "wasn't broken into the same sense as someone hacking it."

It could easily have been and the status update would still make sense. I think Linode is being deliberately vague at this point so as not to commit either way.

I do know a bit about this world that we are discussing, from both sides of the coin :twisted:


Top
   
 Post subject:
PostPosted: Sat Mar 03, 2012 4:03 am 
Offline
Senior Newbie

Joined: Fri Mar 02, 2012 8:53 am
Posts: 5
rainkid wrote:
In that case - how did the attacker(s) gain this level of access? How do we know that they no longer have this level of access? If those credentials are no longer valid, how do we know that the attacker cannot acquire new credentials and wreak more havoc?

Essentially, all we are told is 'someone had access, and did bad things. we removed said access.'

Not very informative.


I suspect finding out exactly how the attackers stumbled upon those credentials will take some more research. But it not reasonable to assume every single credential is also vulnerable. If someone gains unauthorized access to my system using credentials one of my users had written down somewhere, I would, as a system administrator, not then assume the login credentials of every account had become vulnerable. If the attackers did have more extensive access than a simple login credential, then it seems foolish to go through a process where their actions are immediately obvious and logged when they could simply just do whatever they wanted directly.

So either they're so smart they've been able to gain some kind of superprivileged access to the system, yet dumb enough to not use it, or this is simply a case of one login credential getting used by the wrong people. My money would be on the latter.

Why does everyone go out of their way to construct a movie plot threat out of this? :-P


Top
   
 Post subject:
PostPosted: Sat Mar 03, 2012 4:06 am 
Offline
Senior Newbie

Joined: Fri Mar 02, 2012 8:53 am
Posts: 5
skn wrote:
Not to add oil to the fire but as far as I can see, there is nothing in the status update to give the impression that it "wasn't broken into the same sense as someone hacking it."

It could easily have been and the status update would still make sense. I think Linode is being deliberately vague at this point so as not to commit either way.

I do know a bit about this world that we are discussing, from both sides of the coin :twisted:


Yes, the status update was a bit vague, I completely agree. After all, it was written only some hours after the event had occured, I suspect it's more a case of limited knowledge at the time rather than a conspiracy to keep people in the dark. :-)


Top
   
 Post subject:
PostPosted: Sat Mar 03, 2012 10:45 am 
Offline
Senior Member
User avatar

Joined: Tue Nov 24, 2009 1:59 pm
Posts: 362
rainkid wrote:
I find the above statement confusing. How does 'support representative' access allow access to 8 unrelated accounts (ie - different account holders, different accounts, probably different datacenters), yet not allow access to all other accounts?

To me, and probably to others, if the intruder(s) can attack 8 independent Linodes, then they can attack them all.

From my understanding, they got a login/password belonging to one of the Linode support reps - the first level of people who receive your support tickets. Logged in as him, and used the "reset root password for node" option for eight nodes. Everything was logged in audit trail, so Linode knows what happened.
I sure hope I'm not mistaken about it, and we should demand a more detailed report - but in a reasonable time from now. Give'em at least a week to respond before starting a riot.

_________________
rsk, providing useless advice on the Internet since 2005.


Top
   
 Post subject:
PostPosted: Sat Mar 03, 2012 3:39 pm 
Offline
Junior Member

Joined: Wed Apr 06, 2011 8:20 am
Posts: 29
Somewhat off topic maybe but Slicehost / Rackspace forum just got rooted

http://www.rackspace.com/knowledge_center/content/slicehost-forum-archive-migration-and-conversion

Need a new best practices manual.


Top
   
 Post subject:
PostPosted: Sat Mar 03, 2012 4:01 pm 
Offline
Senior Member

Joined: Fri Jan 20, 2012 11:19 am
Posts: 100
Quote:
We believe an unauthorized party gained access, for a period of time


Why does this sound familiar?

Two hosting companies within a day of each other... :o

_________________
If all else fails, reboot...
PHP Tutorials and MySQL Tutorials


Top
   
 Post subject:
PostPosted: Sat Mar 03, 2012 9:03 pm 
Offline
Junior Member

Joined: Thu Mar 22, 2007 1:39 am
Posts: 23
The attacker somehow got the login credentials of a Support Rep, yet, knew EXACTLY which eight accounts to target.

How?


It's very likely that the attacker was from the inside, or had MUCH more access than we're told. How else would they know which (independent) accounts to target?

Again, not knocking Linode (they're great and I've told them this many times in the past), but something is amiss here.


Top
   
 Post subject:
PostPosted: Sat Mar 03, 2012 9:08 pm 
Offline
Senior Member

Joined: Fri Jan 20, 2012 11:19 am
Posts: 100
rainkid wrote:
The attacker somehow got the login credentials of a Support Rep, yet, knew EXACTLY which eight accounts to target.

How?


It's very likely that the attacker was from the inside, or had MUCH more access than we're told. How else would they know which (independent) accounts to target?

Again, not knocking Linode (they're great and I've told them this many times in the past), but something is amiss here.


Agreed. Linode may want to give us some more information soon to calm our wild imaginations...

_________________
If all else fails, reboot...

PHP Tutorials and MySQL Tutorials


Top
   
 Post subject:
PostPosted: Sat Mar 03, 2012 9:09 pm 
Offline
Senior Member

Joined: Sun Sep 05, 2010 8:55 pm
Posts: 97
nehalem wrote:
Agreed. Linode may want to give us some more information soon to calm our wild imaginations...


I'm pretty sure there's nothing more they can really say that would quiet the more active imaginations.

See "birthers", for reference.


Top
   
 Post subject:
PostPosted: Sat Mar 03, 2012 9:58 pm 
Offline
Senior Member
User avatar

Joined: Sun Dec 27, 2009 11:12 pm
Posts: 1038
Location: Colorado, USA
nehalem wrote:
Agreed. Linode may want to give us some more information soon to calm our wild imaginations...

My neighbors friend has an uncle that knew someone that read on Hacker News that Linode will be sending out partial rolls of generic tinfoil in the next billing cycle, and will include not three, but four unique ways to fold them into tinfoil hats guaranteed to protect you from the outer space Nargles and the local FBI.


Top
   
 Post subject:
PostPosted: Sun Mar 04, 2012 1:14 pm 
Offline
Senior Member

Joined: Fri May 02, 2008 8:44 pm
Posts: 1121
rainkid wrote:
The attacker somehow got the login credentials of a Support Rep, yet, knew EXACTLY which eight accounts to target.

All of the victims were Bitcoin dealers. Machines running Bitcoin software are readily identifiable through a port scan or through transaction records with other Bitcoin machines. Once you know which IP addresses to target, it would be trivially easy for someone who has the credentials of a support rep to figure out exactly which accounts to break into.


Top
   
 Post subject:
PostPosted: Mon Mar 05, 2012 11:37 am 
Offline
Senior Member

Joined: Sun Sep 05, 2010 8:55 pm
Posts: 97
hybinet wrote:
All of the victims were Bitcoin dealers. Machines running Bitcoin software are readily identifiable through a port scan or through transaction records with other Bitcoin machines.


See what you did? Injected actual facts into the tinfoil hat party, and totally killed it!


Top
   
PostPosted: Thu Apr 05, 2012 7:48 am 
Offline
Senior Member
User avatar

Joined: Thu Jun 21, 2007 7:13 pm
Posts: 100
Website: http://neo101.org
Any updates with more details on what happened?

_________________
My homepage


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: mattltm and 4 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group