Feeds

Symantec HackIsWack site still open to rickrolling

We know the game and we're gonna play it

Secure remote control for conventional and virtual desktops

Updated Symantec's hapless HackIsWack cybercrime rap competition site can still be rickrolled, despite assurances to the contrary from the security giant.

A web application filter was deployed to block an earlier cross-site scripting attack, but this filter is configured to allow a YouTube video featuring rapper Snoop Dogg, who has been recruited to promote the project, to be displayed. That means that even though the initial attack no longer works, unresolved vulnerabilities on the site mean that it can still be rickrolled onto YouTube videos, as you can see here.

The apt use of Beaker from the Muppets singing Rick Astley is a fitting tribute to the whole HackIsWack endeavour. The rap competition has the laudable aim of raising cybercrime awareness, but is chiefly noteworthy for security snafus that have made Symantec look rather silly, instead of down with the kidz.

The rickrolling cross-site scripting bug was only the most publicised of the site's flaws. Other problems included the caching of potentially sensitive data and upload security problems, among others, according to a write-up by security blogger Mike Bailey last week.

Thus far the contest, which is open to US residents only and closes at the end of the month, has attracted 39 entrants, who have uploaded short self-made rap videos of varying quality to the site. The winner, selected for the best video, earns an all-expense paid trip to LA to see a Snoop Dogg gig along with a laptop running Norton Internet Security.

One wag earlier speculated that Snoop Dogg may have coded up the site as well as acting as a spokesman for the HackIsWack campaign, an outlandish suggestion that is beginning to seem almost plausible. Symantec declined to name and shame HackisWack's clueless coder responding to our questions on the point by saying it's ultimately responsible for the security problems of the site.

Updated</h>

Symantec issued a statement on Friday saying it has fixed the latest set of problems with the HackisWack site.

Ultimately, responsibility for the microsite falls on Symantec and we have addressed the issue.

When Symantec was initially made aware of the reported vulnerabilities to the microsite, we quickly took steps to enhance the site's security. With news of this new vulnerability being found, we quickly resolved the issue and are conducting a thorough review of the site's security.

To date, we can confirm that no company or customer data has been compromised or exposed. Symantec takes the security of our website and microsites very seriously, and we have taken the necessary steps to resolve the issue.

The competition itself has attracted 44 entrants by Friday afternoon possibly rather less than the number of wack-minded individuals who have tried to find security vulns with the site.

Beatnote

Mad props to Derek Kolakowski for being the first to pick up on the latest problems with HackIsWack.

Derek reckons Symantec tried to blacklist HTTP/HTTPS connections in response to the earlier exploits. "This leaves them open to the XSS as well potentially local file access," he told El Reg.

Just as well, then, that there's nothing valuable on the site.

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.