The Other Wiki has you covered on Zero-day attacks.
edited 16th Jan '11 7:41:15 AM by AttObl
Shutdown sequence initiated.Major Tom says what I tried to say much better than I did.
If a network is a castle under siege, then a zero-day attack is someone finding a hole in the wall nobody knew about and using it. There's no patch, no official fix, no barricade in the hole to keep people from getting in. I believe there are mailing lists by people (at least one's a government group) who report these things, let people compensate until a patch comes out.
"The fact that your food can be made into makeshift bombs alarms the Hell out of me, Scrye." - CharlatanTo the hackers: You went full-retard. You never go full-retard.
I've got new mythological machinery, and very handsome supernatural scenery. Goodfae: a mafia web serialWhile I'm not saying the hospital in question is blameless in this situation, ultimately it's the crackers * who broke into the system, and not by accident.
As far as I'm concerned, throw the book at them (whichever book applies, not sure off the top of my head).
And then use another book, on the subject of IT security, to whack the hospital's IT staff upside the head.
No, but it is possible that they didn't know that it was a hospital server.
[1] This facsimile operated in part by synAC....unless the security was virtually nil, I don't know how they couldn't. It's not like these things are sitting in the internet, waiting for someone to walk in. The server should have been behind a DMZ and firewalls, IDS/IPS devices, etc. Heck, the fact that they knew the IP Address of the hospital is weird, and they would have known who it was registered to when they looked it up.
Then again, I'm not as big an expert on network security I think I am, but still.
edited 16th Jan '11 9:26:30 PM by TheInferno
"The fact that your food can be made into makeshift bombs alarms the Hell out of me, Scrye." - CharlatanNo, they obviously intended to break into something, but if they were working on a low level, they could have not known that it was a hospital. Possibly.
[1] This facsimile operated in part by synAC.Well, here's a scenario. They find about an exploit in the server software the hospital uses. Like Apache or something. To pick a target, they look up an Apache mailing list and pick a name at random, tracing their info back to the hospital website. Then they launch their exploit, which is probably a command line program. Bam, they're hacked in, without ever looking at a webpage or anything.
[1] This facsimile operated in part by synAC.^^Yeah.
Mind, I don't know much about security either, I'd just rather concoct this sort of scenario than believe that somebody could disable a hospital in order to play a video game.
[1] This facsimile operated in part by synAC.If the hackers wiped the records of their intrusion, which they probably did, the hospital probably can't tell ever.
[1] This facsimile operated in part by synAC.Yes, they were probably just running some script, and it's entirely possible that the hospital's FQDN * didn't even come up, just an IP address.
But they didn't just "accidentally" run the script. They deliberately ran a script/crack that was designed to break into systems over which they have no authority, and give them control (however limited) of the invaded server.
While one could make the argument that not all breaking into servers is necessarily immoral (but I won't, not interested in that conversation, not to mention it's way off topic for not only this thread, but this forum), IMO you'd need a pretty bent moral system to think it's acceptable to do so just for the sake of hosting an FPS game.
edited 17th Jan '11 2:53:44 AM by Nohbody
All your safe space are belong to Trump

For the benefit of the unenlightened, what is a day zero attack?
This "faculty lot" you speak of sounds like a place of great power...