Based on FBI investigations and other information, the NIPC has observed that there has recently been an increase in hacker activity specifically targeting U.S. systems associated with e-commerce and other Internet-hosted sites. The majority of the intrusions have occurred on Microsoft Windows NT systems, although Unix based operating systems have been victimized as well. The hackers are exploiting at least three known system vulnerabilities to gain unauthorized access and download propriety information. Although these vulnerabilities are not new, this recent activity warrants additional attention by system administrators. In most cases, the hacker activity had been ongoing for several months before the victim became aware of the intrusion. The NIPC strongly recommends that all computer network systems administrators check relevant systems and apply updated patches as necessary. Specific emphasis should be placed on systems related to e-commerce or e-banking/financial business. The following types of exploits have been observed:
Unauthorized Access to IIS Servers through Open Database Connectivity (ODBC) Data Access with Remote Data Service (RDS):
Systems Affected: Windows NT running IIS with
Summary: This vulnerability allows a malicious remote user to use a web browser to force a Windows NT server to return information from Structured Query Language (SQL) databases or to run system commands.
SQL Query Abuse Vulnerability
Affected Software Versions: Microsoft SQL Server
Version 7.0 and Microsoft Data Engine(MSDE)1.0
Summary: This vulnerability could allow the remote author of a malicious SQL query to take unauthorized actions on a SQL Server or MSDE database.
Registry Permissions Vulnerability
Systems Affected: Windows NT 4.0 Workstation,
Windows NT 4.0 Server
Summary: Users can modify certain registry keys
The NIPC is conducting further analysis of this hacker activity and will provide additional information as it becomes available.
Please report any illegal or malicious activities to your local FBI office or the NIPC, and to your military or civilian computer incident response group, as appropriate. Incidents may be reported online at http://www.nipc.gov/incident/cirr.htm.