Feeds

IBM e-commerce platforms vulnerable to password cracker

Danish hackers teach Big Blue to SUQ.DIQ

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

IBM WebSphere and Net.Commerce users have been advised to tighten up cryptographic security after the release on the Internet of a hacking tool that can crack administrator passwords.

Red-faced Big Blue was yesterday forced to rush out a security advisory admitting that a weak encryption methodology might leave users of its ecommerce platforms open to fraud.

Exposure to risk occurs if a site uses a default merchant key in combination with macros that were developed without security in mind. In these cases an easily crackable password is created, which can be broken with a tool called SUQ.DIQ.

The tool was developed by a hackers called xor37h and Darkman of a previously little known Danish group called Smersh.

The hacking tool, which has now been pulled from a US hosted site, relies on a feature of the packages which means passwords are encrypted with a fixed key.

According to Smersh: "IBM Net.Commerce and WebSphere use TripleDES to encrypt the passwords, but instead of encrypting a string with the password as key, IBM encrypts the password using a fixed key. The user can change the default key while installing IBM Net.Commerce and WebSphere in advanced mode. But since it complicates things changing the key, we don't expect this to be a common sight."

In a security advisory, IBM explains how the password cracker works: "When an encrypted shopper or administrator password is obtained and passed through this tool, the decrypted password is returned.

"This allows access to a shopper's or administrator's account," IBM admitted.

If an administrator password is obtained it gives crackers the ability to access confidential data, potentially including credit card records.

Affected sites include those running IBM Net.Commerce and the rebranded WebSphere Commerce Suite version 4.1, or earlier. Users of the current version of WebSphere Commerce Suite, version 5.1, are not believed to be affected.

IBM is advising anybody who suspects they've been infected to change admin passwords and secure macro commands so that strict access checks are enforced. It's also advising users to review Web server access logs and administrator accounts for any signs of tampering. ®

External links

IBM security advisory to users
IBM posting to BugTraq

Related stories

Amazon, despite denials, was warned about hack
Another NT crack (yawn)
'Transitional' IBM faces growth slowdown

Beginner's guide to SSL certificates

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?