MilitarySingles owned by remote file inclusion hole

Powered by SC Magazine
 

Site hacked, 170,000 unsalted passwords exposed.

A common web application vulnerability, poor detection capabilities and a lack of adequate encryption led to the recent hack of MilitarySingles.com, according to Imperva.

In March, the popular military dating site sustained a security breach carried out by hackers calling themselves "LulzSec Reborn," resulting in the dumping of personal information belonging to 170,000 members. The data included names, usernames, passwords, and IP addresses.

Following the breach, an unidentified administrator for ESingles Inc., the parent company of MilitarySingles.com, posted a comment on a website that records data breaches denying the attack ever occurred.

However, security firm Imperva believes the break-in certainly happened, based on analysis of the published booty and the hijacked website.

According to its "Hacker Intelligence Initiative" monthly trend report, the attackers were able to infiltrate MilitarySingles.com by exploiting a remote file inclusion vulnerability.

In this case, the saboteur posed as a user and may have uploaded a malicious executable disguised as an image, Rob Rachwald, director of security strategy at Imperva, told SCMagazine.com on Thursday.

Since the proper filters were not in place, the poisonous file ran directly on the web server, exposing the database and giving the miscreant the ability to pull out the information, Rachwald said. This could have been prevented had the proper security measures been put in place, he added.

“It's considered common practice to take a file from an external source and quarantine it or run it in a special sandbox where it won't cause too much damage,” he said.

Additionally, improper encryption methods were used to protect users' passwords, Rachwald said. According to the report, site administrators failed to deploy a common encryption best practice known as “salting,” which randomly appends the string of characters in each password.

“That complicates a hacker's life tremendously because it will take them at least a couple of days to go through that process, so they just give up and move on,” Rachwald said. “But that was not done in this case.”

As for motive, Rachwald isn't sure. But he speculates the attack was perpetrated because of the site's tie with the U.S. military, a target of politically motivated hacktivists.

A spokesperson for ESingles Inc. did not respond to an SCMagazine.com request for comment.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


MilitarySingles owned by remote file inclusion hole
 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1069

Vote