Feeds

Toshiba gets hacked down under

Internet vandals targeting IT sites have a pop at Linux servers

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Toshiba Australian Web site has become the latest high profile victim of Internet vandals.

The site, toshiba.com.au, was defaced by a cracker called BL4F who replaced its content with a series of greetings and profane abuse at various members of the digital underground.

In part the message, which can be seen in full on defacement site Alldas here, said: "Toshiba Australia / New Zealand got owned, okai, over and out, this is BL4F."

Unusually in these cases the site is running Apache 1.3.9 on Red Hat Linux, not a preferred target for crackers, particularly those who target IT industry sites. However an inspection of the site reveals that its protection is inadequate.

Paul Rogers, a network security analyst at MIS Corporate Defence, said the site either has "a misconfigured firewall or there isn't one", a conclusion he was able to draw because a number of ports were open that should be closed if proper security procedures were in place.

"Toshiba's web servers have a weak security level and there are several avenues that could have been exploited," said Rogers.

"On a publicly facing server who can't just run the installation CD and expect it to be secure when you put it on the Internet. Whether you're using NT or Unix, you need to make modifications and go through a hardening procedure to make sure your system is secure as possible."

Toshiba admitted the attack to The Melbourne Age and told the paper it was "taking further steps to prevent this occurrence in the future." ®

Related stories

Intel hacker talks to The Reg
New York Times Web site sm0ked
Hacker defaces Intel's Web site
Microsoft hacked again
Microsoft hacker fired
Gateway web server flaws exposed
Mass hack takes out govt sites

Choosing a cloud hosting partner with confidence

More from The Register

next story
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Mozilla, EFF, Cisco back free-as-in-FREE-BEER SSL cert authority
Let’s Encrypt to give HTTPS-everywhere a boost in 2015
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.