By using this site, you agree to our Privacy Policy and our Terms of Use. Close

Forums - Sony - Wrongly Jailed Security Whistleblower Caught Up in PlayStation Hacker Hunt

Wired

Armchair cybersleuths on the trail of the PlayStation Network hackers have been focusing attention on a chat log that shows several technically sophisticated PlayStation tinkerers discussing Sony’s security vulnerabilities in knowing detail just two months before the breach.

“If Sony is watching this channel they should know that running an older version of Apache on a RedHat server with known vulnerabilities is not wise, especially when that server freely reports its version and it’s the auth[entication] server,” writes “Trixter,” one of the chatters.

The Feb. 16 chat was held in the IRC channel “#ps3dev.” It’s a gathering spot for people hacking their PlayStations for various purposes not approved by Sony, such as installing custom firmware, trying to restore the console’s ability to run Linux, or working to build a home-brew version of the PlayStation Network.

The parts of the discussion that delve into Sony’s security posture appear eerily prescient in the wake of the intrusion that exposed personal information on 77 million users, and copies of the chats are now lighting up gaming blogs and Twitter feeds. “IRC chat of PlayStation Network hacker!” reads one post.

But in an interview with Threat Level, “Trixter” says he had nothing to do with the breach. He might add, “Here we go again.”

That’s because Trixter is 38-year-old Bret McDanel, who made news in 2003 after serving a 16-month sentence for a computer-hacking crime he didn’t commit.

McDanel got in trouble for warning 5,000 customers of his former employer, Tornado Development, that the company had a serious security hole that made customer e-mail vulnerable to hackers. The government charged and convicted McDanel under the theory that the e-mailed warning itself violated the antihacking Computer Fraud and Abuse Act because it “impaired the integrity” of the vulnerable system.

It was such a bizarre reading of the law that, on appeal, the Justice Department filed a rare “Confession of Error” conceding that McDanel hadn’t committed a crime. The department joined with the defense in asking that his conviction be overturned. It was overturned, but by then he’d already done the time.

McDanel, who now has a small telecom business outside Sacramento, says that despite his past experience, he’s not particularly worried about being linked to the massive PlayStation Network breach.

“I’m willing to bet that the actual intrusion is going to point to somewhere completely different,” he said in a telephone interview Thursday.

McDanel says he got involved in the PlayStation-modding scene about three months ago. He claims his primary interest is user privacy: He wanted to see what information the PlayStation collects and sends to Sony and its partner companies through the PlayStation Network.

To that end, he used a man-in-the-middle hack to monitor the SSL-encrypted traffic from his home console to Sony’s servers. He loaded a self-signed certificate onto the console, and directed the traffic through a proxy server on his own network. When he pored through the traffic, he noticed that Sony was running outdated versions of the Apache web server.

Sony, it turns out, uses a cluster of Apache servers to authenticate PlayStation consoles, a different cluster to serve downloadable content, another to store image files, etc. All of them are directly accessible from the internet, he says –- there’s no VPN between the console and the PlayStation Network. And he claims all the servers were all at least a little out of date.

“Literally everything goes through a web server somewhere,” he says. “Different [Sony] divisions maintain different servers. I never saw a current version of Apache on any of them.”

Sony did not respond to an inquiry from Threat Level on Friday.

McDanel admits he doesn’t know that Sony’s web servers were vulnerable to attack. The authentication server he mentioned in the chats was running Apache 2.2.15, which was superseded in June 2010, but has no remote-access vulnerabilities listed on Apache’s website.

The other main participant in the February chat was “SKFU.” He’s a German engineer who — along with his colleague “iQD” — was analyzing Sony’s protocols with the goal of writing emulation software that could let devices other than a PlayStation use the PlayStation Network. “For example, you could use an Android phone to communicate with your PS3 friends,” says SKFU.

But he adds that he has no plans at the moment to publish his research. “It’s just too risky at this time that Sony could come and say, OK … you’re sued for $10 million.”

SKFU, too, says Sony’s security is poor. By way of example, he says he and other researchers found unused functions buried in the PlayStation firmware that can be executed on the network. “Like, you could join the PlayStation Network as a guest, or access any environment they use.”

But SKFU doesn’t believe the focused work of the modding community would be useful for the kind of broad network-security breach Sony suffered this month, nor that his fellow tinkerers were involved. “This more likely seems to be a hack because of the money behind it,” says SKFU. “Get them to show me the logs and servers, and I will tell you.”

McDanel says he agrees that a profit-oriented intruder was likely behind the attack. “If they were behind on Apache, they were probably behind on their mail server; they were probably behind on their DNS server,” he says. “They were probably behind on everything.”

“It wasn’t an attack against Sony,” he speculates. “It was an attack against a big computer that held a lot of information.”

http://www.wired.com/threatlevel/2011/04/trixter/



Around the Network

Thats was a really great read, thanks for posting.

Really makes you wonder how a multi-billion dollar company could have security so bad that two guys could see such massive weaknesses by just tinkering around with the network from their homes.



                                           

                      The definitive evidence that video games turn people into mass murderers

Its awesome to see that nsanity is dutifully keeping up with any bad news related to sony ( regardless of if its speculation or blown out of proportion or whatever ). Keep us posted man

EDIT: This post has been moderated for spamming. -d1



CGI-Quality said:
RolStoppable said:
CGI-Quality said:
Mendicate Bias said:

Thats was a really great read, thanks for posting.

Really makes you wonder how a multi-billion dollar company could have security so bad that two guys could see such massive weaknesses by just tinkering around with the network from their homes.

It's not so much that the security was bad, but that there are people out there who will go to great lengths to pull off these kinds of deeds. Look at the breaches of other big companies and it's puts the picture in a different light.

But this article makes it sound like hacking PSN didn't require people going to great lengths.

Yep and reading other articles would beg to differ.


Have any of those?  In general, all the speculation i've seen has suggested otherwise so far and that sony was behind the times on security tech. (And that most companies are and this is a ticking timebomb where matters will get worse and laws will get stronger.)  Would be interesting to read articles that suggest the opposite.



CGI-Quality said:
Kasz216 said:
CGI-Quality said:
RolStoppable said:

But this article makes it sound like hacking PSN didn't require people going to great lengths.

Yep and reading other articles would beg to differ.


Have any of those?  In general, all the speculation i've seen has suggested otherwise so far.  Would be interesting to read articles that suggest the opposite.

Google and N4G will be your friends in finding any (and every) thing there is to know about the PSN's situation. There have been discrepancies since the beginning.

I have been using Google News.  Which is why i'm confused on the matter.  In general every single piece of read has suggested that in general, companies are far behind in security protections from where there should be.

As for N4G.... I'd rather stick with credible aggregate news sources.

 

I mean, according to Sony themselves... they exploited a "Known vulnerability".

http://www.theregister.co.uk/2011/05/01/psn_service_restoration/


In otherwords... they did something that had cracked similar systems before, which Sony didn't know about and protect against because they weren't doing their due diligence when it came to security.

They didn't have to go to "great lengths" to hack PSN, because they literally just did what worked in the past on other systems.  It seems like a direct confirmation by sony on that part.

Hence the need for creating new security positions.  I mean, look at all the new security matters they're taking.  They didn't have a program that automatically detects strange network usage. 

It's an issue... far too many buisnesses are being negligent with personal security soley because they can be.



Around the Network

Reading this reminds me of the movie, "Catch Me If You Can"....

 

Sony should try to make some use out of these hacker guys, rather than trying to sue them every chance they get. At this point though, I think these hackers might actually have a fear of being sued by Sony for doing what they do. Now is definitely not the time to be messing with modding the ps3 with all the recent incidents happening.



http://soundcloud.com/cathode

PSN: Parasitic_Link

http://projects.washingtonpost.com/fallen/



EVERY GAMERS WORST NIGHTMARE...THE TANGLING CABLES MONSTER!

            

       Coffee is for closers!

@CGi i wouldnt bother going any further with Kaz you can have 6,000 sources backing you up and he'll still be convinced your wrong.

 

Also ignore my first post this site doesnt work for crap for me anymore



EVERY GAMERS WORST NIGHTMARE...THE TANGLING CABLES MONSTER!

            

       Coffee is for closers!

JamaicameCRAZY said:

@CGi i wouldnt bother going any further with Kaz you can have 6,000 sources backing you up and he'll still be convinced your wrong.

 

Also ignore my first post this site doesnt work for crap for me anymore


I specifically posted an article where Sony themselves say the hacker didn't have to go through great lengths to hack sony... they used a previous known flaw that they didn't keep  up on.

Are you calling Sony a lier?



What the hell?

I had to read this again. Is this article for real? Sony use RedHat for their authentication server?

Correct me if I'm wrong, but 10 years ago RedHat was one of the suites that the people in the business referred to as "Linux for Dummies". Don't get me wrong. It's a very nice system, but it's initial setup can be rather bloated when compared to other kernel distributions.

That was back in the time where if you wanted security, you'd implement an operating system with open, but tight regulations on the source, such as OpenBSD. I dunno. Have RedHat changed their ways and become less bloated? I stopped tracking them after I moved up to Debian.