It was apparently set up by employees for gaming purposes
A company server that some workers at Novell Inc. apparently used for gaming purposes was hacked into and then used to scan for vulnerable ports on potentially millions of computers worldwide, according to an Internet security consultant.
The scans, which have been going on since Sept. 21, are targeted at TCP Port 22 -- the default port for Secure Shell (SSH) services. SSH programs are used to log into other computers over a network or to execute remote commands and move files between machines in a secure fashion. Scans against the port are often an indication that hackers are looking for vulnerable SSH systems that they can break into and take control of.
Kevan Barney, a Novell spokesman, today confirmed that one of the company’s systems had been compromised. But he added that the server was not part of the company’s corporate network nor was it a production server.
Chris Brandon, president of Brandon Internet Security, an Alexandria, Va.-based firm that reported the problem to Novell yesterday, said he was first alerted to the hack when a client reported scanning activity several days ago.
According to Brandon, the scans were traced back to a server with an IP address assigned to Novell. The hacked system appeared to be running a mail server for a gaming site called Neticus.com, and the main game Web page for Neticus.com was hosted on a separate server that also belonged to Novell.
Going by the large number of IP blocks scanned by the attacking server, it is safe to assume that “millions” of computers may have been probed for SSH-related weaknesses, he said.
“The employees that set it up apparently had no idea of security,” Brandon said. “But what is really surprising is that Novell would allow employees to set up game servers on their corporate network and then allow the public to access it.”
Logs documenting the scans from the Novell-owned computer were made available to Computerworld by Brandon. One of them is available online at www.mynetwatchman.com/LID.asp?IID=178119669.
The source IP address listed in the incident report at that site belongs to Novell, based on Network WhoIS records, he said.
Barney said that both servers -- the one hosting the gaming Web site and the server that scanned for vulnerable ports on other machines -- were test systems outside the company’s firewalls. He also denied that the server hosting the main game Web page was actually being used by gamers. Instead, it appears to have been used only to host game-related information, he said.
“There was no major breach of security here,” Barney said. “Needless to say, we are taking the appropriate steps” to address the situation.
Attempts to access the Neticus.com site this afternoon were unsuccessful. But a Google search for the site yielded references to a group called the Neticus Guild which described itself as a World of Warcraft players. The site appears to have been administered by someone using a Novell.com address.
What’s interesting is that a server under a different domain name appears to have been running on a system with an IP address assigned to Novell, said Pete Lindstrom, an analyst with Spire Security LLC in Malvern, Pa. The incident could put Novell in an awkward situation, he said.
If Novell’s resources were used improperly, the company will need to find out how that happened and take corrective action. he said. But if the server in question was being used with the company’s knowledge, then the question becomes one of acceptable use, Lindstrom said.