Feeds

MS hacked once, twice, three, FOUR times

Prime Suspectz takes the IIS out of Microsoft

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Notorious hacker Prime Suspectz has gone on a cracking spree against Microsoft servers that has resulted in the defacement of FOUR of the software giant's sites.

Three of the sites hit by the attack (all of which appear to be recently introduced, and under development) are currently inaccessible. A fourth, webcfeedback.msn.com, has been redefaced by hacker group Silver Lords with a protest against human rights abuses in Kashmir after being attacked earlier this morning by Prime Suspectz.

A record of Prime Suspectz's defacements has been recorded on defacement archive Alldas.de and can be seen here (click on arulk.rte.microsoft.com, feeds.mobile.msn.com and redsand.rte.microsoft.com to see the latest attacks). All the sites involved run Microsoft's IIS web server on a Windows platform and add to the lengthening list of the software giant's Web servers to fall victim to s'kiddies.

In the latest defacements, Prime Suspectz taunts Microsoft's Web administrators and brags of his hacking prowess.

"Prime Suspectz again! One, two, three, in only 30 minutes, As we can see, this server IIS is very good!! Micro$oft, where i find secure products made by you? WHERE?," he mocks.

The webcfeedback.msn.com defacement takes up the same theme: "Prime Suspectz is back micro$oft. + one for the collection when your security will go to improve? never hehehe! kisses adm gay!"

Mark Read, a security consultant at MIS Corporate Defence Solutions, said exploits of the recently announced ISAPI (Internet Server Application Programming Interface) bug in IIS were the most probable exploit used in the attack. However he added that since IIS is as full of holes as Swiss cheese other exploits like the Unicode bug couldn't be ruled out.

"Microsoft has released a patch for these exploits but hasn't applied it themselves," said Read. "All it takes is for a system admin to be down the pub when an alert comes out and remote sites, or those used for development, will end up unprotected." ®

External Links

Prime Suspectz defacements

Related Stories

MS confronts another IIS system-level hole (ISAPI bug)
Microsoft UK 0wn3d
Microsoft hacked in the Balkans
Microsoft Web site hacked in Kiwiland
Exploit devastates WinNT/2K security
How you hack into Microsoft: a step by step guide

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.