Friday, October 11, 2013

Adobe's source code was parked on hackers' unprotected server

Adobe's source code was parked on hackers' unprotected server
The files were encrypted but still sitting on an open Web server, security expert says

By Jeremy Kirk, IDG News Service |  Data Protection
 Hackers capitalize on other people's mistakes. But they make their own as well.

Case in point: A massive breach of Adobe Systems' network was discovered after the source code of numerous products, including the Web application development platform ColdFusion, sat parked on a hacker's unprotected Web server open to the Internet.

The breach, which also encompassed 2.9 million encrypted customer credit card records, was announced by Adobe on Oct. 3. Adobe had already been investigating a breach when Alex Holden, chief information security officer of Hold Security, independently found what turned out to be the company's source code on a hacking gang's server.

Adobe's source code "was hidden, but it was not cleverly hidden," Holden said.

Perusing the directory of the server, Holden found a directory with the abbreviation "ad." It was filled with "interesting" file names, Holden said, including encrypted ."rar" and ".zip" files.

It's not clear if the files were stolen from Adobe in an encrypted format or if the hackers encrypted the files and then uploaded them to their server, Holden said. In either case, Adobe confirmed it was indeed source code.

Source code could make it easier for hackers to find vulnerabilities in Adobe's products, Holden said. But so far, no new zero-day vulnerabilities -- the term for a vulnerability that is already being exploited but doesn't have a patch -- have surfaced in the last couple of months since the source code was taken, Holden said. So far, the source code has not been publicly released.

In an Oct. 3 10-Q filing with the U.S. Securities and Exchange Commission, Adobe acknowledged the breach, but said it did "not believe that the attacks will have a material adverse impact on our business."

But Adobe wrote later in the filing that its efforts to fight cyberattacks "may not be successful" and cause the loss of customers, incur potential liability and cost the company money.

The server had already attracted interest prior to the Adobe find. It was being used as a repository for stolen data by a gang that also broke into the networks of data aggregators LexisNexis, Dunn & Bradstreet and Kroll Background America, as reported by security analyst and journalist Brian Krebs.

The Russian-speaking gang -- which doesn't have a name yet -- is still active. And there's more to come.

View the original article here


No comments:

Post a Comment