Update to NIPC Advisory 00-060 "E-Commerce Vulnerabilities"
This advisory is an update to the NIPC Advisory 00-060, "E-Commerce Vulnerabilities," dated December 01, 2000. Since the advisory was published, the FBI has continued to observe hacker activity targeting victims associated with e-commerce or e-finance/banking businesses. In many cases, the hacker activity had been ongoing for several months before the victim became aware of the intrusion. The NIPC emphasizes the recommendation that all computer network systems administrators check relevant systems and consider applying the updated patches as necessary, especially for systems related to e-commerce or e-banking/financial businesses. The patches are available on Microsoft's web site, and users should refer to the URLs listed below.
The following vulnerabilities have been previously reported:
Unauthorized Access to IIS Servers through Open
Database Connectivity (ODBC) Data Access with Remote Data Service (RDS):
Summary: Allows unauthorized users to execute shell commands on the IIS system as a privileged use; Allows unauthorized access to secured, non-published files on the IIS system; On a multi-homed Internet-connected IIS systems, using Microsoft Data Access Components (MDAC), allows unauthorized users to tunnel Structured Query Language (SQL) and other ODBC data requests through the public connection to a private back-end network.
SQL Query Abuse Vulnerability
Summary: The vulnerability could allow the remote author of a malicious SQL query to take unauthorized actions on a SQL Server or MSDE database.
Registry Permissions Vulnerability
Web Server File Request Parsing
While they have not been shown to be a vector for the current attacks, Microsoft has advised us that the vulnerabilities addressed by Microsoft bulletin MS00-086 are very serious, and we encourage web site operators to consider applying the patch provided with this bulletin as well as the three that are under active exploitation.
Summary: The vulnerability could allow a malicious user to run system commands on a web server.
New Information: In addition to the above exploits,
several filenames have been identified in connection with the intrusions,
specific to Microsoft Windows NT systems. The presence of any of these files
on your system should be reviewed carefully because they may indicate that
your system has been compromised:
In addition, system administrators may want to
check for the unauthorized presence of any of the following executable files,
which are often used as hacking tools:
Recipients of this advisory are encouraged to
report computer crime to the NIPC Watch and Warning Unit at (202) 323-3204/3205/3206.
Incidents may also be reported online at www.nipc.gov/incident/cirr.htm.