Exotically named hacking tools such as Low Orbit Ion Cannon and #RefRef have garnered plenty of headlines over the last few months but a new report suggests that the world’s favourite search engine might be an equally important weapon in the arsenal of cyber-criminals and hacktivists.
The report explains how a simple search on Google Code is all that’s needed to uncover a wealth of information that can be used to break into websites, cloud-based services and secure networks.
Google’s Code Search is a tool that makes it easy for those with technical know-how to search the vast amount of computer code that is publicly available online.
Researchers from IT security consultancy Stach & Lui report that hacking groups such as Anonymous and LulzSec are using Google Code search for a number of nefarious activities.
With a few well-crafted searches they can uncover passwords for cloud services, configuration files for Virtual Private Networks and find code that is vulnerable to common website hacking tactics such as SQL injection.
While the findings provide a much-needed wake up call to online businesses, admins and developers, they also offer a fascinating insight into the motivation of hacking collectives such as Anonymous and LulzSec.
According to Stach & Lui ‘Google Hacking’, as the technique is known, is believed to be Anonymous and LulzSec’s primary means of identifying potential targets.
Rather than being motivated by politics or injustice, hacking groups may simply be targeting organisations because Google Code search has turned up a vulnerability too tempting to ignore, making them less political action groups, more malicious 21st century Wombles.
So what can online businesses do to protect themselves from these online, evil Uncle Bulgarias?
The first line of defence is to make sure that developers are following established best practice and that executives are creating a culture where best practice is encouraged and supported. Including passwords in code has always been a bad idea and techniques to prevent and detect SQL injection vulnerabilities are well established.
Businesses should also prepare so that if they are successfully attacked after a data leak they don’t lose their shirt. Data stored in the cloud can be rendered useless to attackers by the simple expedient of encrypting it.
Stach & Lui warn that in the businesses using cloud services should also take a close look at the small print; many cloud service providers state that they don’t accept responsibility for leaks.
For more on this take a look at the Stach & Lui’s Pulp Google Hacking presentation.