Results 1 to 17 of 17

Thread: Someone on our network got hacked!

  1. #1
    Senior Member koldchillah's Avatar
    Join Date
    Apr 2002
    Location
    Orlando, FL
    Posts
    4,628

    Someone on our network got hacked!

    Our lead programmer's PC was hacked into sometime over the weekend and the local user account was deleted along with all his documents and everything for the site that he had been working on.

    This is a strange one. We're not yet sure how this person got into the machine.

    The PC is not on the domain, but rather on a solo workgroup.

    Apparently someone physically accessed his PC b/c someone unlocked his PC, then deleted his account and then logged off or rebooted b/c they apparently left it at the log-in screen with administrator showing as the last person who logged in. (he uses his own account, not admin and we don't have his admin password b/c he changes it himself monthly.)

    I thought there would have been an event of some sort in the event viewer, but no events of any type were logged over the weekend. No strange services or VNC stuff running. No spyware. Clean as a whistle.. as if someone knew exactly how to log-into the PC without the password, then delete the account and vanish without a trace.

    We have ERD Commander and have the ability to reset ANY password for a local account, but nobody in the building has access to ERD except us.

    It all sounds really fishy.. one of the other guys is doing some detective work to find out more info, just thought I'd post to see if anyone out there knows of a way that this person might have gotten into the PC.. It's running windows 2k pro SP3

    TIA
    "Nobody's invincible, no plan is foolproof, We all must meet our moment of truth." - Guru

  2. #2
    Security Specialist greEd's Avatar
    Join Date
    May 2001
    Location
    Maryland
    Posts
    807
    If the intruder had physical access and the ability to access the bios that is all he needs to access any piece of information on the system believe it or not.
    "I'm doing a (free) operating system (just a hobby, won't be big and professional...) for AT clones... It's not portable and it probably [won't ever] support anything other than AT hard disks, as thats all I have :-(." --Posted on Usenet August 1991 by Linus Trovalds
    http://www.computerglitch.net
    curiosity builds security | dd if=/dev/zero of=/dev/hda bs=512 count=100
    EOF

  3. #3
    Senior Member koldchillah's Avatar
    Join Date
    Apr 2002
    Location
    Orlando, FL
    Posts
    4,628
    Originally posted by greEd
    If the intruder had physical access and the ability to access the bios that is all he needs to access any piece of information on the system believe it or not.
    yeah I suppose.. they may have had a boot disk of sorts or a special BIOS tool. However, as we find more info on this we have noticed that the power on password & BIOS password were still intact and unchanged which means they got around that as well somehow..
    "Nobody's invincible, no plan is foolproof, We all must meet our moment of truth." - Guru

  4. #4
    Elite Member TonyT's Avatar
    Join Date
    Jan 2000
    Location
    Fairfax, VA
    Posts
    10,346
    You can log on to and access a win2k workstation with a tweaked win2k cdrom, w/ full admin privledges.
    No one has any right to force data on you
    and command you to believe it or else.
    If it is not true for you, it isn't true.

    LRH

  5. #5
    Elite Member Norm's Avatar
    Join Date
    Mar 2001
    Posts
    14,195
    Originally posted by TonyT
    You can log on to and access a win2k workstation with a tweaked win2k cdrom, w/ full admin privledges.
    I read about that a while ago.

    Have you got a link for that method Tony?

  6. #6
    Elite Member TonyT's Avatar
    Join Date
    Jan 2000
    Location
    Fairfax, VA
    Posts
    10,346
    I think I was mistaken, it's XP that can be exploited.

    Anyone with a Windows 2000 CD can boot up a
    Windows XP box and start the Windows 2000
    Recovery Console. The intruder has Administrator privileges
    even if he or she does not provide a password, and
    can also assume the identity of any other user of the
    machine.
    No one has any right to force data on you
    and command you to believe it or else.
    If it is not true for you, it isn't true.

    LRH

  7. #7
    SG Elite
    Join Date
    Jun 2001
    Posts
    26,793
    Originally posted by TonyT
    I think I was mistaken, it's XP that can be exploited.

    Anyone with a Windows 2000 CD can boot up a
    Windows XP box and start the Windows 2000
    Recovery Console. The intruder has Administrator privileges
    even if he or she does not provide a password, and
    can also assume the identity of any other user of the
    machine.

    I've heard of this as well.

  8. #8
    Elite Member Norm's Avatar
    Join Date
    Mar 2001
    Posts
    14,195
    Thanks, it may come in handy one day.

  9. #9
    Administrator YeOldeStonecat's Avatar
    Join Date
    Jan 2001
    Location
    Somewhere along the shoreline in New England
    Posts
    51,185
    Anyone fired recently, or otherwise disgruntled employee's still around?
    MORNING WOOD Lumber Company
    Guinness for Strength!!!

  10. #10
    SG Enthusiast
    Join Date
    Jan 2001
    Location
    DC
    Posts
    4,717
    Do you use SMS or any other type of remote-installation package? Something similar happened to my laptop. Woke up one morning and only got the old, generic login screen and Administrator as the last login.

    Turns out that they (my corpi helpdesk) had scheduled me for an 'upgrade' of some package on my box. Once I booted to Admin was able to restore my previous profile/accounts
    anything is possible - nothing is free


    Quote Originally Posted by Blisster
    It *would* be brokeback bay if I in fact went and hung out with Skye and co (did I mention he is teh hotness?)

  11. #11
    Senior Member koldchillah's Avatar
    Join Date
    Apr 2002
    Location
    Orlando, FL
    Posts
    4,628
    Originally posted by YeOldeStonecat
    Anyone fired recently, or otherwise disgruntled employee's still around?
    <<<<zips lips>>>>

    :2cool:
    "Nobody's invincible, no plan is foolproof, We all must meet our moment of truth." - Guru

  12. #12
    Senior Member koldchillah's Avatar
    Join Date
    Apr 2002
    Location
    Orlando, FL
    Posts
    4,628
    Originally posted by cyberskye
    Do you use SMS or any other type of remote-installation package?
    nope.. but the recovery console may have been their way of entry. Wouldn't take much for someone to bring in a CD from home. The whole thing stinks of internal betrayal...
    "Nobody's invincible, no plan is foolproof, We all must meet our moment of truth." - Guru

  13. #13
    SG Enthusiast
    Join Date
    Jan 2001
    Location
    DC
    Posts
    4,717
    but the recovery console may have been their way of entry
    Wouldn't that require a reboot? The BIOS-lock is still intact?

    hmm.....I think YOSC is on to something. Maybe he should have his own 80's style cop TV show.

    TJ StoneCat?
    YeOld Stoned Hooker?
    anything is possible - nothing is free


    Quote Originally Posted by Blisster
    It *would* be brokeback bay if I in fact went and hung out with Skye and co (did I mention he is teh hotness?)

  14. #14
    Senior Member koldchillah's Avatar
    Join Date
    Apr 2002
    Location
    Orlando, FL
    Posts
    4,628
    There is definitely something fishy going down.. They won't even let me recover the deleted data.. My boss says not too worry, he's just going to have everyone in the web development team power down when they are not at their PC's and use power-on passwords.

    If thats what they think is the solution then I say good luck to them. Don't come crying to me when it continues, b/c thats what will happen if they don't figure out who the culprit is. I know its not me, but I'm sure curious to find out who. Its too easy to open up these machines and reset the password and whomever is doing this is likely to be smart enough to know that. Like many other things that go on around here, they never learn any lessons until the damage is at its greatest..

    btw, yes, I'm looking for another job. This place pays really good and I'm probably going to have a very hard time finding this kind of pay with such an awesome schedule elsewhere, but there is absolutely no stability and lots of executive-level backstabbing going on and I have a feeling it may be better to jump ship rather than sink with it., Unfortunately, my wife and I are at a time where we can't afford to take any financial hits, which makes my entire job situation very delicate... All of us in the tech dept are sorta in the same boat. Its very fustrating b/c if all this wasn't going on this job would rock.
    "Nobody's invincible, no plan is foolproof, We all must meet our moment of truth." - Guru

  15. #15
    Security Specialist greEd's Avatar
    Join Date
    May 2001
    Location
    Maryland
    Posts
    807
    I have seen some pretty crazy things on some sites I have arrived at.

    You say the system was broken into correct?
    Check the ide cables for any sign that they have been tampered with (dust cleared off when you know the case hasn't been opened in a long time, things like this) once he/she has access to the system why bother trying to bypass anything? ... simply unplug the drive, case it on your laptop, replace ... and walk away whistling dixie. I have seen it done (and have done it) in less than a minute.



    My boss says not too worry, he's just going to have everyone in the web development team power down when they are not at their PC's and use power-on passwords.
    Obscurity as Security is bad.
    "I'm doing a (free) operating system (just a hobby, won't be big and professional...) for AT clones... It's not portable and it probably [won't ever] support anything other than AT hard disks, as thats all I have :-(." --Posted on Usenet August 1991 by Linus Trovalds
    http://www.computerglitch.net
    curiosity builds security | dd if=/dev/zero of=/dev/hda bs=512 count=100
    EOF

  16. #16
    Administrator YeOldeStonecat's Avatar
    Join Date
    Jan 2001
    Location
    Somewhere along the shoreline in New England
    Posts
    51,185
    Originally posted by cyberskye

    TJ StoneCat?
    YeOld Stoned Hooker?
    LOL...William Shatner, Adrian Zmed, and who was the blonde?

    You know that system erase utility Compaq has on their Smart Start CD's? Boot from it...totally erase your system, including the RAID tag files on each hard drive (what are they called, "ris" files?)

    Couple of years ago, I remember this quick boom .COM place that ran an online ordering site, fired the IT guy, well, that was his revenge.

    Oh yeah, the backup hadn't been doing well for a while either.
    MORNING WOOD Lumber Company
    Guinness for Strength!!!

  17. #17
    Second Most EVIL YARDofSTUF's Avatar
    Join Date
    Nov 2000
    Location
    USA
    Posts
    70,013
    Originally posted by koldchillah
    Like many other things that go on around here, they never learn any lessons until the damage is at its greatest..

    my place is like this too. we package refrigerated items for chemo treatment and other things and are main cooler hasnt been working right for 2 months. told managment and they didnt see the problem until yesterday when we ran out of ice. 50 degree ice packs dont count as refrigerated.


    i understand how u feel towards ur boss/bosses.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •