BreachExchange mailing list archives

WHOIS embarrassed about security? APNIC, after database leaks


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Tue, 24 Oct 2017 16:12:40 -0600

https://www.theregister.co.uk/2017/10/24/apnic_plugs_database_leak_resets_
passwords/

Asia's internet numbers registry APNIC has apologised to network owners
after a slip in its WHOIS database config leaked credentials, including
weakly-hashed passwords.

The breach affected those in the regional registry's Maintainer and
Incident Response Team (IRT) database objects. During a June 2017 upgrade,
those details were included in downloadable WHOIS data.

“Maintainer” is the administrative object that restricts who is allowed to
edit other objects in the APNIC database; the IRT object identifies who
receives abuse reports.

Chris Barcellos of eBay's Red Team noticed the data on a third-party
Website on October 12 and notified APNIC. The registry's deputy general
director Sanjaya* writes that the database configuration was fixed on
October 13, and subsequently the relevant passwords were reset.

Had an attacker been able to recover the passwords, they could have altered
WHOIS information or hijacked IP address blocks.

As this configuration guide shows, one of the hash options available is
crypt-pw, a weak and easily-reversed hash because it can only handle
eight-character passwords.

APNIC says it hasn't found evidence of malicious activity as the result of
the breach. Had anybody altered the records, it would not have been
permanent, since “authoritative registry data is held internally by APNIC”.
®

* Sanjaya uses just one name.
_______________________________________________
BreachExchange mailing list sponsored by Risk Based Security
BreachExchange () lists riskbasedsecurity com

If you wish to Edit your membership or Unsubscribe you can do so at the following link:
https://lists.riskbasedsecurity.com/listinfo/breachexchange

Current thread: