160 likes | 453 Views
HoTmAil HacKs. The Sneaker Police. Melody Bloxsom Omowumi Fagbami Ryan Gordon John Varghese Myrica Riddick. What is Hotmail?. Bought by Microsoft in 1998 in order to compete with AOL, Yahoo Has over 40 million active users
E N D
HoTmAil HacKs The Sneaker Police Melody Bloxsom Omowumi Fagbami Ryan Gordon John Varghese Myrica Riddick
What is Hotmail? • Bought by Microsoft in 1998 in order to compete with AOL, Yahoo • Has over 40 million active users • Originally configured for UNIX Solaris system, but MS bought it and began the process of converting it to a Windows OS • As a result of this conversion process MS is opening itself to attacks
The 1998 Attack • Trojan Horse virus was created by Paul Cervenka of CSI. • It tells users that access to their accounts has been timed out, and then prompts users to resubmit information • They used JavaScript code in the email header. When the user entered his ID and password and resubmitted the data, the information would be sent to the email address in the JavaScript code.
The 1998 Attack • Microsoft responded by limiting e-mails containing JavaScript in the e-mail headers. • Cervenka modified his code to placing the JavaScript into the HTML image tags, where the Hotmail filter could not detect it • Microsoft’s reaction was to exclude all incoming e-mails including JavaScript in their header files from coming to their servers
Attacks in 1999 • IP Authentication • Trojan Horse virus as an attachment • “Hackers Unite” • JavaScript in “Style” tag
IP Authentication • On March 19th, 1999, IP authentication from publicly shared terminals was discovered. • Hackers realized that information could be retrieved freely from a browser’s history. • Microsoft’s quick-fix was to eliminate all aspects of IP authentication from it’s Hotmail system.
Trojan Horse Virus (1999) • Cause: Virus was spread as an attachment with a Web page link. When clicked, this link caused a script on the hackers’ Web site to negotiate a “change password” request to Hotmail users • Response: Encouraged email users to only open attachments from trusted sources
“Hackers Unite” • A group of 7 Americans and one Swedish person • Sent users to a Web site that mirrored that of the standard Hotmail site • When users entered this site, a small box appeared, followed by the @hotmail.com. If anything was entered before the “@” sign, and submitted, this information would be sent to Hackers Unite • By simply typing the password “eh”, they could gain full access to those accounts
“Hackers Unite” • MS first denied this incident first, then proceeded to block the IPs of the Hackers Unite Web sites • In response, Hackers Unite simply created new Web sites. Due to the difficulties MS eventually reacted by taking their servers offline • MS announced they were hiring an outside firm to examine security issues based on the recommendations of TRUSTe
Firm’s Recommendation • Identify the problem that allowed users access to any valid Hotmail e-mail account • Review documentation on solutions MS implemented to the hacks • Interview MS personnel responsible for identifying and fixing the problem • Review and test the source code
JavaScript in “Style” tag • Cause: A new version of Java Script allowed malicious code to be embedded within a ‘STYLE’ tag • Response: MS Managers suggested that users should disable Java Scripts within the user’s browser.
Who stole the Cookie? • Occurred May 10, 2000 • Hacker sends an email attachment to a user • User opens the attachment from the unknown source. • Once the attachment is open, html code then sends the user’s cookies to the hacker’s web site.
How to protect yourself • Disable JavaScripts and Cookies within the browser • Change the browser options so the pages expire relatively soon • Use an Anti-Virus software, but update the database as often as you can because new viruses are created daily • Create a back-up for your files
Passport • Used to authenticate Hotmail account holders.All passwords are stored at the passport site in a database • The user is issued a one-time key, which encrypts the sign-in name, password, and digital wallet. • They also block login access after X number of incorrect login attempts • No addresses or credit card information is stored in the cookie. Once the session ends, the cookie is deleted
Our Recommendation • Take measures to improve it’s public face, such as accepting responsibility for past mistakes • Offer sincere apologies to those people who’s privacy may have been invaded by Hotmail attacks. • Develop an International forum that will set common laws and restrictions against hackers