[scripts-announce] scripts.mit.edu security incident in December

Geoffrey Thomas geofft at mit.edu
Fri Jan 8 02:48:00 EST 2010


On December 4, an outside attacker gained privileged access to one of the 
scripts.mit.edu web servers. The attacker replaced the 'sshd' SSH server binary 
on cats-whiskers.mit.edu with a modified version, and then logged into that 
server. The attacker set off an automated tripwire that we have in place to 
catch this sort of attack as well as generated remote syslog messages when 
replacing the sshd binary, and a scripts administrator who was online at the 
time was able to immediately block the attacking server's IP address from all 
servers and shut down the compromised server.

The scripts team went through forensics and logs from the server; although 
the on-disk logs were removed, we had access to remote syslog data, and we 
were able to get in contact with the owner of the machine that accessed 
ours. That machine had not been well-maintained, and we believe that this 
is merely the result of a botnet attempting to gain access to as many 
servers as it can rather than a targeted attack on scripts. (That machine 
has now been shut down.) We watched the other servers and their logs 
carefully and did not see signs of an attack, and we reinstalled 
cats-whiskers.mit.edu from scratch before returning it to the server pool.

scripts.mit.edu uses industry-standard best practices for security, including 
taking software updates promptly and requiring privilege separation (suEXEC) 
for all web and other content hosted on our servers, in addition to various 
security, logging, and alert mechanisms of our own. The nature of Linux is that 
there are, periodically, local privilege escalation attacks, some publicly 
known and some not. We try to do all that we can to reduce the likelihood of 
successful attacks, either targeted or untargeted, against scripts.mit.edu 
servers. We regret that an attacker successfully gained access to our server, 
but we do not believe that the attacker was able to access any keys or user 
data before being blocked.

Feel free to contact the scripts team at scripts at mit.edu if you have any 
questions about this security incident or about the scripts.mit.edu service.

-- 
Geoffrey Thomas
scripts.mit.edu project architect
scripts at mit.edu



More information about the scripts-announce mailing list