Feeds

IBM e-commerce platforms vulnerable to password cracker

Danish hackers teach Big Blue to SUQ.DIQ

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

IBM WebSphere and Net.Commerce users have been advised to tighten up cryptographic security after the release on the Internet of a hacking tool that can crack administrator passwords.

Red-faced Big Blue was yesterday forced to rush out a security advisory admitting that a weak encryption methodology might leave users of its ecommerce platforms open to fraud.

Exposure to risk occurs if a site uses a default merchant key in combination with macros that were developed without security in mind. In these cases an easily crackable password is created, which can be broken with a tool called SUQ.DIQ.

The tool was developed by a hackers called xor37h and Darkman of a previously little known Danish group called Smersh.

The hacking tool, which has now been pulled from a US hosted site, relies on a feature of the packages which means passwords are encrypted with a fixed key.

According to Smersh: "IBM Net.Commerce and WebSphere use TripleDES to encrypt the passwords, but instead of encrypting a string with the password as key, IBM encrypts the password using a fixed key. The user can change the default key while installing IBM Net.Commerce and WebSphere in advanced mode. But since it complicates things changing the key, we don't expect this to be a common sight."

In a security advisory, IBM explains how the password cracker works: "When an encrypted shopper or administrator password is obtained and passed through this tool, the decrypted password is returned.

"This allows access to a shopper's or administrator's account," IBM admitted.

If an administrator password is obtained it gives crackers the ability to access confidential data, potentially including credit card records.

Affected sites include those running IBM Net.Commerce and the rebranded WebSphere Commerce Suite version 4.1, or earlier. Users of the current version of WebSphere Commerce Suite, version 5.1, are not believed to be affected.

IBM is advising anybody who suspects they've been infected to change admin passwords and secure macro commands so that strict access checks are enforced. It's also advising users to review Web server access logs and administrator accounts for any signs of tampering. ®

External links

IBM security advisory to users
IBM posting to BugTraq

Related stories

Amazon, despite denials, was warned about hack
Another NT crack (yawn)
'Transitional' IBM faces growth slowdown

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.