MS hacked once, twice, three, FOUR times
Prime Suspectz takes the IIS out of Microsoft
Notorious hacker Prime Suspectz has gone on a cracking spree against Microsoft servers that has resulted in the defacement of FOUR of the software giant's sites.
Three of the sites hit by the attack (all of which appear to be recently introduced, and under development) are currently inaccessible. A fourth, webcfeedback.msn.com, has been redefaced by hacker group Silver Lords with a protest against human rights abuses in Kashmir after being attacked earlier this morning by Prime Suspectz.
A record of Prime Suspectz's defacements has been recorded on defacement archive Alldas.de and can be seen here (click on arulk.rte.microsoft.com, feeds.mobile.msn.com and redsand.rte.microsoft.com to see the latest attacks). All the sites involved run Microsoft's IIS web server on a Windows platform and add to the lengthening list of the software giant's Web servers to fall victim to s'kiddies.
In the latest defacements, Prime Suspectz taunts Microsoft's Web administrators and brags of his hacking prowess.
"Prime Suspectz again! One, two, three, in only 30 minutes, As we can see, this server IIS is very good!! Micro$oft, where i find secure products made by you? WHERE?," he mocks.
The webcfeedback.msn.com defacement takes up the same theme: "Prime Suspectz is back micro$oft. + one for the collection when your security will go to improve? never hehehe! kisses adm gay!"
Mark Read, a security consultant at MIS Corporate Defence Solutions, said exploits of the recently announced ISAPI (Internet Server Application Programming Interface) bug in IIS were the most probable exploit used in the attack. However he added that since IIS is as full of holes as Swiss cheese other exploits like the Unicode bug couldn't be ruled out.
"Microsoft has released a patch for these exploits but hasn't applied it themselves," said Read. "All it takes is for a system admin to be down the pub when an alert comes out and remote sites, or those used for development, will end up unprotected." ®
MS confronts another IIS system-level hole (ISAPI bug)
Microsoft UK 0wn3d
Microsoft hacked in the Balkans
Microsoft Web site hacked in Kiwiland
Exploit devastates WinNT/2K security
How you hack into Microsoft: a step by step guide
Sponsored: Network DDoS protection