The free content management system (CMS) used by the FBI in the official by clicking here του παραβιάστηκε από τον CyberZeist, ο οποίος, κατάφερε να πάρει πρόσβαση σε περισσότερους από 150 λογαριασμούς που συμπεριλαμβάνουν διευθύνσεις ηλεκτρονικού ταχυδρομείου και κρυπτογραφημένους κωδικούς access.
CyberZeist breached it Plone CMS, used by the FBI, in late December using a zero-day, discovered by someone else, and explains that there are still many other organizations and agencies that are vulnerable to attacks, such as the EU Agency for Network Information and Security and the Intellectual Property Rights Coordination Center.
After hacking the FBI.gov site, CyberZeist discovered a dump of the database, which appears to include email addresses and SHA1 encrypted passwords.
Ο hacker αναφέρει ότι ο ιστότοπος ήταν hosted σε ένα VM και αυτό τον σταμάτησε από το να αποκτήσει root πρόσβαση, αλλά ούτως ή άλλως κατάφερε να ανακτήσει κάποιες πληροφορίες του διακομιστή, Ο διακομιστής του FΒI έτρεχε FreeBSD version 6.2_RELEASE του 2007 με το custom settings as the hacker reported.
“With the FBI.GOV breach, it was clearly evident that their webmaster had a very lazy attitude as he had kept the backup files (.bck extensions) in the same folder as the site root (Thanks Webmaster!), but still I haven't leaked all of it content of the backup files. Instead I tweeted my findings and thought I'd wait for the FBI's response,” CyberZeist reported.
In addition, the hacker reported that zero-day exploit has already been sold via Tor, so it will not share more details until it is no longer available for purchase.
https://twitter.com/Amnesty_Schweiz/status/816680016507498497
Amnesty International, one of the organizations using the same CMS software, has already recognized vulnerability. The FBI has not posted any comments for this hack at this time.
CyberZeist, meanwhile, said the FBI was trying to fix the vulnerability on New Year's Eve, so it believes the CMS is now safe.