Copy Link
Add to Bookmark
Report

Phrack Inc. Volume 02 Issue 25 File 10

eZine's profile picture
Published in 
Phrack Inc
 · 5 years ago

  

==Phrack Inc.==

Volume Three, Issue 25, File 10 of 11

PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN PWN
PWN P h r a c k W o r l d N e w s PWN
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
PWN Issue XXV/Part 2 PWN
PWN PWN
PWN March 29, 1989 PWN
PWN PWN
PWN Created, Written, and Edited PWN
PWN by Knight Lightning PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


German Hackers Break Into Los Alamos and NASA March 2, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Three hours ago, a famous German TV-magazine revealed maybe one of the greatest
scandals of espionage in computer networks: They talk about some (three to
five) West German hackers breaking into several secret data networks (Los
Alamos, Nasa, some military databases, (Japanese) war industry, and many
others) in the interests of the KGB, USSR. They received sums of $50,000 to
$100,000 and even drugs, all from the KGB, the head of the political
television-magazine said.

The following news articles (and there are a lot) all deal with (directly and
indirectly) the recent Spy scandal situation that occurred in West Germany.
The majority of the articles shown here are taken from RISKS Digest, but they
have been edited for this presentation.

This presentation contains some information not previously seen (at least not
in this format).
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Computer Espionage: Three "Wily Hackers" Arrested March 2, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Three hackers have been arrested in Berlin, Hamburg and Hannover, and they are
accused of computer espionage for the Soviet KGB. According to the television
magazine "Panorama" (whose journalists have first published the NASA and SPAN
hacks), they intruded scientific, military and industry computers and gave
passwords, access mechanisms, programs and data to 2 KGB officers; among
others, intrusion is reported of the NASA headquarters, the Los Alamos and
Fermilab computers, the United States Chief of Staff's data bank OPTIMIS, and
several more army computers. In Europe, computers of the French-Italian arms
manufacturer Thomson, the European Space Agency ESA, the Max Planck Institute
for Nuclear Physics in Heidelberg, CERN/GENEVA and the German Electron
Accelerator DESY/Hamburg are mentioned. The report says that they earned
several 100,000 DM plus drugs (one hacker evidently was drug addict) over about
3 years.

For the German Intelligence authorities, this is "a new quality of espionage."
The top manager said that they had awaited something similar but are
nevertheless surprised that it happened so soon and with such broad effects.

Summarizing the different events which have been reported earlier -- NASA and
SPAN hacks, Clifford Stoll's report of the "Wily Hacker" -- I regard this as
essentially the final outcome of the Wily Hackers story (with probably more
than the 3 which have now been imprisoned). It is surprising that the
Intelligence authorities needed so long time (after Cliff's Communications Of
The ACM report, in May 1988) to finally arrest and accuse these crackers.
Moreover, the rumors according to which design and production plans of a
Megabit chip had been stolen from Philips/France computers seems to become
justified; this was the background that CCC hacker Steffen Wernery had been
arrested, for several months, in Paris without being accused. CAD/CAM programs
have also been sold to KBG.

Information Provided By
Klaus Brunnstein
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Computer Spy Ring Sold Top Secrets To Russia March 3, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
West German counter-intelligence has uncovered a spy ring centered on computer
hackers suspected of having supplied the Soviet Union with top secret military
and economic information.

They are said to have penetrated computer networks in the United States,
Western Europe and Japan, according to a television report last night.

In a special program, the North German Broadcasting Network said that thousands
of computer codes, passwords and programs which allowed the Soviet Union access
to major computer centers in the Western world have been passed on by the
hackers. They had been recruited by the KGB in 1985 and are alleged to have
supplied the information in return for money and drugs.

In Karlsruhe, the West German Chief Public Prosecutor's Office, which is in
charge of spy cases, would only confirm last night that three arrests have been
made March 2nd during house searches in Hannover and West Berlin.

Those detained were suspected of "having obtained illegally, through hacking
and in exchange for money, information which was passed on to an Eastern secret
service."

But the spokesman did not share West German television's evaluation, which said
the case was the most serious since the unmasking in 1974 of an East German
agent in the office of ex-Chancellor Willy Brandt. The Interior Ministry in
Bonn last night also confirmed several arrests and said the suspects had
supplied information to the KGB. The arrests followed months of investigations
into the activities of young computer freaks based in Hamburg, Hannover and
West Berlin, the ministry said.

According to the television report, the hackers gained access to the data banks
of the Pentagon, NASA Space Center, and the nuclear laboratory in Los Alamos.

They also penetrated leading West European computer centers and armament
companies, including the French Thomson group, the European Nuclear Research
Center, CERN, in Geneva; the European Space Authority, ESA, and German
companies involved in nuclear research.

The Russians are alleged to have put pressure on the hackers because of their
involvement with drugs, and to have paid several hundred thousands marks for
information, the program said.

West German security experts on the evening of March 2nd described the new spy
case as "extremely grave." The KGB has been provided with a "completely new
possibility of attack" on Western high technology and NATO military secrets.
The sources said it was "sensational" that the hackers should have succeeded in
penetrating the US defense data systems from Western Europe.

The North German Broadcasting Network program said its research was based on
information given by two members of the suspected espionage ring.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
KGB Computer Break-Ins Alleged In West Germany March 3, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taken From the International Herald Tribune

Bonn - Three West German computer hackers have been arrested on suspicion of
infiltrating computer networks worldwide to obtain secret data for an East
block intelligence service, prosecutors said on March 2nd.

A spokesman for the federal prosecutor, Alexander Prechtel, confirmed that
three men were arrested, but did not identify the East Block country involved
or the networks infiltrated.

The ARD television networks "Panorama" program, the thrust of which the
spokesman confirmed, said the hackers had passed secrets from a range of highly
sensitive U.S., French, and West German computer networks to the KGB, the
Soviet secret police.

The television report said it was the worst such espionage case to be uncovered
in West Germany since the 1974 exposure of Guenter Guillaume, an East German
spy who was a top aide to Willy Brandt, then the West German chancellor.

Among the systems believed to have been infiltrated were the U.S.: Defense
Department's staff data bank, the U.S. nuclear arms laboratory in Los Alamos,
New Mexico, the National Aeronautics and Space Administration, and U.S.
military supply depots.

The report said other systems entered were at the French arms and electronics
company Thomson SA, a European nuclear-research center in Geneva, the European
Space Agency and the Max-Planck Institute for Nuclear Physics in West Germany.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
News From The KGB/Wily Hackers March 7, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Now, five days after the "sensational" disclosure of the German (NDR) Panorama
Television team, the dust of speculations begins to rise and the facts become
slowly visible; moreover, some questions which could not be answered in
Clifford Stoll's Communications of the ACM paper may now be answered. Though
not all facts are known publicly, the following facts seem rather clear.

- In 1986, some hackers from West Berlin and Hannover discussed, in "hacker
parties" with alcohol and drugs, how to solve some personal financial
problems; at that time, first intrusions of scientific computers
(probably CERN/Geneva as hacker training camp) and Chaos Computer Club's
spectacular BTX-intrusion gave many hackers (assisted by newsmedia) the
*puerile impression* that they could intrude *into every computer
system*; I remember contemporary discussions on 1986/87 Chaos Computer
Conferences about possibilities, when one leading CCC member warned that
such hacks might also attract espionage (Steffen Wernery recently
mentioned that German counter-espionage had tried several times to hire
him and other CCC members as advisors -- unsuccessfully).

- A "kernel group" of 5 hackers who worked together, in some way, in the
"KGB case" are (according to Der SPIEGEL, who published the following
names in its Monday, March 6, 1989 edition):

-> Markus Hess, 27, from Hannover, Clifford Stoll's "Wily Hacker" who was
often referred to as the Hannover Hacker and uses the alias of Mathias
Speer; after having ended (unfinished) his studies in mathematics, he
works as programmer, and tries to get an Informatics diploma at the
University of Hagen (FRG); he is said to have good knowledge of VMS
and UNIX.

-> Karl Koch, 23, from Hannover, who works as programmer; due to his
luxurious lifestyle and his drug addiction, his permanent financial
problems have probably added to his desire to sell "hacker knowledge"
to interested institutions.

-> Hans Huebner, alias "Pengo," from Berlin, who after having received
his Informatics diploma from Technical University of West Berlin,
founded a small computer house; the SPIEGEL writes that he needed
money for investment in his small enterprise; though he does not
belong to the Chaos Computer Club, he holds close contacts to the
national hacker scenes (Hamburg: Chaos Computer Club; Munich: Bavarian
Hacker Post; Cologne: Computer Artists Cologne, and other smaller
groups), and he was the person to speak about UUCP as a future
communications medium at the Chaos Communication Congress.

-> Dirk Brezinski, from West Berlin, programmer and sometimes
"troubleshooter" for Siemens BS-2000 systems (the operating system of
Siemens mainframe computers), who earned, when working for Siemens or
a customer (BfA, a national insurance for employees) 20,000 DM (about
$10,800) a month; he is regarded (by an intelligence officer) as "some
kind of a genius."

-> Peter Carl, from West Berlin, a former croupier, who "always had
enough cocaine." No information about his computer knowledge or
experience is available.

After successfully stimulating KGB's interest, the group (mainly Hess and Koch)
committed their well-documented hacks [See Clifford Stoll's "Stalking the Wily
Hacker," Communications of the ACM, May 1988]. SPIEGEL writes that the group
*sold 5 diskettes full of passwords*, from May to December 1986, to KGB
officers which they met in East Berlin; when Bremen University computer center,
their favorite host for transatlantic hacks, asked the police to uncover the
reasons for their high telephone bills, they stopped the action.

This statement of Der SPIEGEL is probably wrong because, as Cliff describes,
the "Wily Hacker" successfully worked until early 1988, when the path from his
PC/telephone was disclosed by TYMNET/German Post authorities. The German
public prosecutors did not find enough evidence for a trial, when examining
Hess' apartment; moreover, they had acquired the material in illegal actions,
so the existing evidence could not be used and finally had to be scratched!

In Hess' apartment, public prosecutors found (on March 3, 1989) password lists
from other hacks. On Monday, March 6, 1989, the Panorama team (who had
disclosed the NASA hack and basically the KGB connection) asked Klaus
Brunnstein to examine some of the password lists; the material which he saw
(for 30 minutes) consisted of about 100 photocopied protocols of a hack during
the night of July 27 to 28, 1987; it was the famous "NASA hack." From a VAX
750 (with VMS 4.3), which they entered via DATEX-P (the German packed-switched
data-exchange network, an X.25 version), where they evidently previously had
installed a Trojan horse (UETFORT00.EXE), they tried, via SET HOST... to
log-into other VAXes in remote institutes. They always used SYSTEM account and
the "proper" password (invisible).

Remark: Unfortunately, DEC's installation procedure works only if a SYSTEM
account is available; evidently, most system managers do not change
the preset default password MANAGER; since Version 4.7, MANAGER is
excluded, but on previous VMS versions, this hole probably exists in
many systems!

Since the hackers, in more than 40% of the cases, succeeded to login, their
first activities were to SET PRIV=ALL; SET PRIO=9, and then to install (via
trans-net copy) the Trojan horse. With the Trojan horse (not displayed under
SHow Users), they copied the password lists to their PCs. When looking through
the password list, Klaus observed the well-known facts: More than 25% female
or male first names, historical persons, countries, cities, or local dishes (in
the Universities of Pisa, Pavia, and Bologna, INSALATA was/is a favorite
password of several people). Only in CASTOR and POLLUX, the password lists
contained less than 5% passwords of such nature easy to guess!

Apart from many (about 39) unsuccessful logins, many different CERN/GENEVA,
NASA systems (CASTOR, POLLUX, Goddard and Ames Space Flight Centers), several
USA, GB, French, Italian and some German institutes connected in SPAN were
"visited." The documented session was from July 27, 10 p.m. to July 28, 1 a.m.

The media report that other hacks (probably not all committed by Hess and Koch
themselves) were sold to KGB. Among them, Electronic and Computer Industry
seem to be of dominant interest for the USSR. If special CAD/CAM programs and
Megabit designs (especially from Thomson/France, from VAX systems) have been
stolen, the advantage and value for the USSR cannot be (over)estimated.

In FRG, the current discussion is whether the hackers succeeded to get into
"kernel areas" or only "peripheral areas." This discussion is ridiculous since
most "peripheral systems" contain developments (methods, products) for future
systems, while the "kernel systems" mainly contain existing applications (of
past architectures).

The well-known hackers (especially CCC) have been seriously attacked by some
media. My best guess is that CCC was itself *a victim* because the group
succeeded to informally get much of the information which they needed for some
of the hacks, and which they finally sold to KGB. Apart from "Pengo," there
doesn't seem to be a close relation between CCC and the KGB/Wily Hackers.
Nevertheless, CCC and others, like Cheshire Catalyst in the USA, have prepared
a climate where espionage inevitably sprang-off.

Information Provided By
Klaus Brunnstein
_______________________________________________________________________________

Pengo Speaks Out About The KGB Hackers And More March 10, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The following are statements made by Pengo to Phrack Inc. during an interview
with Knight Lightning;

KL: What is your response to the accusations of being a KGB spy?

P: I have been involved into this espionage circle throughout some months in
1986. I did not actually work for the KGB, nor did I hand out hacker
information to the East. All my hacking activities since then have been
for the pure purpose of personal enlightenment. I never hid my name
before, and I won't go undercover now that the real story comes to the
surface.

In the middle of 1988, I informed the West German authorities (secret
service) about my involvement with the KGB. This is one of the main
reasons for the big busts last week. I have to live with the fact that
some hackers now think I am working for the authorities now. I don't, and
I will try anything to avoid getting into all these secret
service/espionage problems again.

KL: What about the statements made in DER SPIEGEL?

P: They published my name and claimed that I was "very active" for the east,
but also that I am the :most hopeful head in West Berlin's hacking scene."
I now try to make the best out of this publicity.

KL: Klaus Brunnstein made some strong statements about you in RISKS Digest,
what did you think of that?

P: It really upsets me a lot. Klaus Brunnstein doesn't know anything
detailed about this case, but he seems to love seeing himself as the
insider in the German scene. At the last congress I got in kind of a
dispute with him. He could not understand why I, as a computer scientist,
still support hackers. Perhaps this is one of the reasons for his
publication.

KL: Any other comments?

P: What I would be interested in hearing about the reaction to this situation
from the United States hackers' point of view. I have already heard that
most people seem to believe that the whole Chaos Computer Club is an
association of spies. This is of course untrue.

KL: What do you intend to do about the bad press you have received?

P: I have posted a reply to Brunnstein's posting in RISKS (shown in next
article). Apart from Hagbard, those guys never were hackers, and it seems
to turn out that they have really been mere spies.

KL: Were there any other repercussions to this case besides bad publicity?

P: Currently, I'm puzzling out a new way of earning money, since my company
decided to fire me. That's what you get if you play with fire :-)

Luckily, I'm optimist!

-Pengo
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Pengo Speaks In RISKS Digest March 10, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In RISKS Digest, Klaus Brunnstein mentioned my name in the context of the
hacker/espionage case recently discovered by the German authorities. Since Mr.
Brunnstein is not competent to speak about the background of the case, I'd like
to add some clarification to prevent misunderstandings, especially concerning
my role. I think it is a very bad practice to just publish names of people
without giving background information.

I have been an active member of the net community for about two years now, and
I want to explicitly express that my network activities have in no way been
connected to any contacts to secret services, be it Western or Eastern ones.

On the other hand, it is a fact that when I was younger (I'm 20 years old now),
there had been a circle of people which tried to make deals with an eastern
secret service. I have been involved in this, but I hope that I did the right
thing by giving the German authorities detailed information about my
involvement in the case in the summer of 1988.

As long as the lawsuit on this case is still in progress, I am not allowed to
give out any details about it to the public. As soon as I have the freedom to
speak freely about all of this, I'll be trying to give a detailed picture about
the happenings to anyone who's interested.

I define myself as a hacker. I acquired most of my knowledge by playing around
with computers and operating systems, and yes, many of these systems were
private property of organizations that did not even have the slightest idea
that I was using their machines. I think that hackers (people who creatively
handle technology and not just see computing as their job) do a service for the
computing community in general. It has been pointed out by other people that
most of the "interesting" modern computer concepts have been developed or
outlined by people who define themselves as "hackers."

When I started hacking foreign systems, I was 16 years old. I was just
interested in computers, not in the data which has been kept on their disks.
As I was going to school at that time, I didn't even have the money to buy my
own computer. Since CP/M (which was the most sophisticated OS I could use on
machines which I had legal access to) didn't turn me on anymore, I enjoyed the
lax security of the systems I had access to by using X.25 networks.

You might point out that I should have been patient and wait until I could go
to the university and use their machines. Some of you might understand that
waiting was just not the thing I was keen on in those days. Computing had
become an addiction for me, and thus I kept hacking. I hope this clears the
question "why."

It was definitely NOT to give the Russians any advantage over the USA, nor to
become rich and get a flight to the Bahamas as soon as possible. The results
of the court trial will reveal this again, but until then I want to keep rumors
out that the German hackers were just the long (?) arm of the KGB to harm
Western computer security or defense power.

It should also be pointed out that the Chaos Computer Club has in no way been
connected to this recent case, and again, that the CCC as an organization has
never been a "hacker group." The CCC merely handles the press for hackers, and
tries to point out implications of computers and communications for society in
general.

I have already lost my current job, because of my name being published in DER
SPIEGEL and in RISKS. My business partners became anxious about my involvement
in the case. Several projects I was about to complete in the near future have
been cancelled, which forces me to start again at the beginning in some way.

-Hans Huebner
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Klaus Brunnstein Reacts To Pengo In RISKS Digest March 14, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Pengo" Hans Huebner stated that he had no share in the KBG case as I mentioned
in my report. Since I myself had no share in the KGB case (and in this sense,
I am not as good a source as Pengo!), I tried to transmit only information
where I had at least *two independent sources* of *some credibility*. In
Pengo's case (where I was rather careful because I could not believe what I
read), my two sources were:

- The SPIEGEL report (I personally agree that names should be avoided as
long as current investigations are underway; yet in this cases, the names
have been widely published in FRG and abroad);

- A telephone conversation with a leading Chaos Computer Club person after
he had informed me about a public debate at Hannover fair (where the
German daily business newspaper, Wirtschafts, which had organized a
discussion with data protection people and CCC).

I asked him whether he knew of Pengo's contribution; he told me that
he directly asked Pengo, "Did you, without pressure and at your own
will, work for the Russians?" Pengo answered, "Yes." He told me that
he immediately cut-off any contact to Pengo. Evidently, there was a
controversial discussion in Chaos Computer Club whether on should react
in such a strict manner. I understand the strong reaction because the
KGB hackers severely damaged the CCC's attempt to seriously contribute to
the public discussion of some of the social consequences of computers.
They now face, more seriously than before, the problem of being regarded
as members of a criminal gang.

-Klaus Brunnstein
_______________________________________________________________________________

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT