Hack attack spills web security firm's confidential data
Barracuda Networks injected with ultimate irony
Try this for irony: The website of web application security provider Barracuda Networks has sustained an attack that appears to have exposed sensitive data concerning the company's partners and employee login credentials, according to an anonymous post.
Barracuda representatives didn't respond to emails seeking confirmation of the post, which claims the data was exposed as the result of a SQL injection attack. Screenshots showed what was purported to be names, email addresses and phone numbers for Barracuda partners from organizations including Fitchburg State University in Massachusetts and the UK's Hartlepool College of Further Education.
The spilled contents also included what appeared to be the email addresses and hashed passwords of Barracuda employees authorized to log in to the company's content management system. The passwords appeared to be hashed using the MD5 algorithm that is slowly being phased out in favor of algorithms that are considered more secure alternatives. It was unclear if the hashed passwords were salted to prevent them from being cracked using various free tools available on the internet.
SQL injections are the most common form of web-based attack and have been used as the starting point for an untold number of breaches, including the one that exposed data for more than 130 million credit cards when confessed hacker Albert Gonzalez broke into credit card processor Heartland Payment Systems. SQL injection techniques were also the cornerstone in a recent attack on HB Gary, the disgraced security firm that exposed tens of thousands of proprietary emails.
SQL injection attacks exploit poorly written web applications that fail to scrutinize user-supplied data entered into search boxes and other fields included on the targeted website. By passing database commands to the site's backend server, attackers can harness the vulnerabilities to view and even modify the confidential contents.
In all, 22 databases with names including new_barracuda, information_schema and Marketing were exposed, according to the post, which was published on Tuesday. The post indicated that the company's web apps ran on the ASP.net platform. ®
Late on Monday evening, Barracude issued a response to the hack here.
Check before hiring!
Employment interview for web programmers:
Question 1: Who is little Bobby Tables?
This is almost too unbelievable to be true. A company that sells web application firewalls gets done by SQL injection? Are these guys serious? How are people meant to take the security industry seriously when the very companies peddling this stuff can't get it right?
How about their advice:
"You can’t leave a Web site exposed nowadays for even a day (or less)" Ehh.... you reckon?!
"You can’t be complacent about coding practices, operations or even the lack of private data on your site – even when you have WAF technology deployed" Ehh... you don't say?!
Would you buy balding prevention medicine from a bald sales guy?
Ha, Barracuda is now looking for a Principal WAF Engineer
Hmm, it's interesting the Barracuda is now looking for a Principal Software Engineer- Web Application Firewall Development on craigslist. From the posting:
Design and implement features of Barracuda's Web Application Firewall (WAF) network security product. Improve scalability and performance of network services of Barracuda WAF. ..."