Just so we are all using the same terminology, a backdoor is intentionally 
hidden (although it may be discovered), so anything documented, like Demo, is 
not a backdoor. http://en.wikipedia.org/wiki/Backdoor_(computing)

> Doug Mueller wrote:
> 
> Now, there are a bunch of other security settings that I encourage you to use 
> --
> 
> -- restrict where run processes can run processes
> -- control the shell under which processes can run
> -- use the password management feature to enforce password rules
> -- use the feature that disables an account after x bad password attempts
>       (and make x a relatively small number like 5 or at most 10)
> -- disallow blank passwords (except for AREA cross-reference situations)
> --  and a number of other things

I am sure all of you have used arcache to insert a new admin account into the 
system because [cough] someone ELSE changed the password of the admin account 
and forgot it. That is not a backdoor either, but a well-documented front door 
in breaking into the ARS server. I haven't had to use this in a while, so I 
don't know if the security parameters have changed, but you used to be able to 
install arcache on your laptop and run it against a remote server. One of the 
security measures NOT mentioned above is to secure arcache by using 
"Disable-User-Cache-Utilities: T" in the ar.cfg. This then requires that anyone 
wishing to use the utility must have access to the file ON the server, thus 
providing another layer of security.

> Doug also wrote:
> 
> Remedy should not be vulnerable to attack of the kind described unless you 
> have
> opened your systems to the outside

Unfortunately, firewalls don't always help in this regard. Still waiting for 
details (that may never come), but malware inserted inside the firewall, and 
unfortunately masquerading as another BMC product (Bladelogic), was used as an 
intermediary between the POS malware and dumping the data outside. At least if 
I read the preliminary forensics report correctly. 
http://blogs.mcafee.com/mcafee-labs/analyzing-the-target-point-of-sale-malware

> From the above link
> 
> Note: The reference to “bladelogic” is a method of obfuscation.  The malware 
> does not compromise, or integrate with, any
> BMC products in any way.   The executable name “bladelogic.exe” does not 
> exist in any piece of legitimate BMC software.

Regards,

Dale Hurtt
SPEC IT LLC
Contractor for US Army Information Systems Engineering Command (USAISEC)

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
"Where the Answers Are, and have been for 20 years"

Reply via email to