iTnews

Linux Australia suffers server breach

By Russell Brown on Apr 7, 2015 7:32AM
Linux Australia suffers server breach

Applauded for response and notification.

Linux Australia has revealed an attack on one of its servers could have provided a "malicious individual" with access to personal member information.

Over the weekend, Linux Australia president Joshua Hesketh notified the Linux-aus mailing list that the organisation had discovered an attack on one of its servers on March 22.

Linux Australia runs the annual Linux Australia conferences and the two-yearly PyCon conference.

The breach occurred in the server hosting the Zookeepr conference management systems for the 2013, 2014, and 2015 national conferences and for two PyCon conferences.

An unknown vulnerability was exploited to cause a buffer overflow that allowed the attacker to gain the highest level of privileges on the server, Hesketh said in the notice.

For the duration of the attack, member details including names and contact information, along with hashed passwords, were exposed – but not any credit card details.

"As Zookeepr uses a third party credit card payment gateway for credit card processing, the database dumps do not contain any credit card or banking details," Hesketh said.

"Whilst Linux Australia do not believe this was a targeted attack against the Zookeepr conference management system, nor an attempt to harvest details from the system, we are taking the necessary precautions."

The compromised host has been decommissioned and the system for PyCon Australia 2015 has been re-deployed to the new Zookeepr host, which is set to enforce key-based logins only.

The new host will have tighter restrictions for services facing the internet and a "far more rigorous operating system schedule", Hesketh said.

Error messages alerted admins to the original breach - these will now be buttressed with a new log analysis tool.

System user accounts on the new server will expire three months after each conference is held, and the linux.conf.au and PyCon Australia sites will be converted to HTML copies six months after the conclusion of the conference, Hesketh said.

Each conference's Zookeepr database will then be archived and stored on a separate server, and the database deleted from the ZooKeepr server.

Hesketh said Linux Australia "strongly encourage you change your passwords on other web services if the same password may have used when registering for our conferences".

"This would also include your Mozilla Persona accounts if you have chosen to use this method for authentication," he said.

"In the interests of improving your online security, it is recommended that a one time password service be used in the future for any accounts you may create on any web services including Linux Australia's conference websites."

At the time of writing linux.conf.au remains offline. Hesketh has been contacted for comment.

Several industry members reacted with praise to the organisation's response to the breach.

"The transparency and disclosure of this email is amazing," tweeted Queensland tech communications specialist David Ryan.

"Exemplary transparency," agreed Paul Gampe, CTO of the US-based peering technology firm IIX.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
breach linux australia security server

Partner Content

MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
MSI launches innovative new laptops
Partner Content MSI launches innovative new laptops
Improving returns from SD-WAN spending
Sponsored Content Improving returns from SD-WAN spending
NCS expands into Australia in partnership with Optus Enterprise
Sponsored Content NCS expands into Australia in partnership with Optus Enterprise

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Ensure your e-signatures are legally binding
Ensure your e-signatures are legally binding
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • Beat the DDoS blackmailers in 2021
By Russell Brown
Apr 7 2015
7:32AM
0 Comments

Related Articles

  • Ubiquiti says cloud-hosted IT systems 'accessed' by unauthorised party
  • US Justice Department says its emails were breached by SolarWinds hackers
  • Suspected Russian hackers used Microsoft vendors to breach customers
  • US Treasury breached by hackers
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra blasts plan to 'set aside' mobile spectrum for Optus and TPG, but not it

Telstra blasts plan to 'set aside' mobile spectrum for Optus and TPG, but not it

Accellion hack behind Reserve Bank of NZ data breach

Accellion hack behind Reserve Bank of NZ data breach

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

Tyro halts trading following week-long outage

Tyro halts trading following week-long outage

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.