Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It seems like they could have done a lot more damage than just serving browser malware. How many mysql installs could they have rooted?


I think the point was that most of the visitors to mysql.com are developers and system administrators, and compromises to their machines can probably be leveraged into compromises of other sites. I doubt we've heard the last of this.


The problem is, how do you both

(1) Avoid obvious detection in the compromised software?

(2) Put in something that you can actually use for exploits? You have access to many hosts, but how many different configurations are there?

The only thing I can think of is have profiles for several popular packages (e.g. wordpress), and package-specific behavior for them.


Doing this operation require quite an effort. And you do not really know how long it will take till this root access will be fixed (you can not really trust random vendor on hackers forum, this post could be searchable through google by mysql admins, some internal audit program could detect intrusion.)

So easiest to monetize - insert malware to put trojan on visitors machines. Next - hack in to their bank accounts, or use these as part of bot net or whatever. You basically got highly visited place to put classic malware.

The point is... To do such things as replacing mysql source flawlessly is hard, do not underestimate efforts needed to do that.


The attackers were focussing on client workstations to infect with malware, that's where the big money is. Potentially they could have owned some mysql installs by replacing installer binaries but it's less interesting for banking fraud etc.

MySQL.com was successfully attacked earlier this year: http://developers.slashdot.org/story/11/03/27/2058246/mysqlc...


I think that they just have access to 1 or more web servers. The hostname in the screenshot is http3.web.mysql.com. An organization like Oracle would presumably have multiple levels of security. It's likely the web servers would run in a DMZ, i.e. the lowest level of security.


Did you only look at 1/3 of the screenshot or did they update the article?

The screenshot shows

http1

http2

http3

with a root shell on each. Are there more than 3? Maybe. Maybe not.


Uh...

Would not the machines rooted with these exploits be likely to be used to log into many mysql installs?


Don't even the most basic MySQL install tutorials have you create a separate user and group for the database user?

If you're running MySQL as root, you're trying hard to get owned.


Pretty sure he meant "rooted" in the sense of "inserted exploits into the codebase". In some sense that's much worse that mere root access to the host. Such a database could, for example, phone home with all updates to tables named "passwords", etc...

And even in the more banal sense you interpreted, sure: you might not run mysql.com-sourced daemons as root. But you almost certainly run the mysql command line utility as root from time to time.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: