| ==Phrack Inc.== | |
| Volume Three, Issue 25, File 10 of 11 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN P h r a c k W o r l d N e w s PWN | |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN | |
| PWN Issue XXV/Part 2 PWN | |
| PWN PWN | |
| PWN March 29, 1989 PWN | |
| PWN PWN | |
| PWN Created, Written, and Edited PWN | |
| PWN by Knight Lightning PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| German Hackers Break Into Los Alamos and NASA March 2, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Three hours ago, a famous German TV-magazine revealed maybe one of the greatest | |
| scandals of espionage in computer networks: They talk about some (three to | |
| five) West German hackers breaking into several secret data networks (Los | |
| Alamos, Nasa, some military databases, (Japanese) war industry, and many | |
| others) in the interests of the KGB, USSR. They received sums of $50,000 to | |
| $100,000 and even drugs, all from the KGB, the head of the political | |
| television-magazine said. | |
| The following news articles (and there are a lot) all deal with (directly and | |
| indirectly) the recent Spy scandal situation that occurred in West Germany. | |
| The majority of the articles shown here are taken from RISKS Digest, but they | |
| have been edited for this presentation. | |
| This presentation contains some information not previously seen (at least not | |
| in this format). | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Computer Espionage: Three "Wily Hackers" Arrested March 2, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Three hackers have been arrested in Berlin, Hamburg and Hannover, and they are | |
| accused of computer espionage for the Soviet KGB. According to the television | |
| magazine "Panorama" (whose journalists have first published the NASA and SPAN | |
| hacks), they intruded scientific, military and industry computers and gave | |
| passwords, access mechanisms, programs and data to 2 KGB officers; among | |
| others, intrusion is reported of the NASA headquarters, the Los Alamos and | |
| Fermilab computers, the United States Chief of Staff's data bank OPTIMIS, and | |
| several more army computers. In Europe, computers of the French-Italian arms | |
| manufacturer Thomson, the European Space Agency ESA, the Max Planck Institute | |
| for Nuclear Physics in Heidelberg, CERN/GENEVA and the German Electron | |
| Accelerator DESY/Hamburg are mentioned. The report says that they earned | |
| several 100,000 DM plus drugs (one hacker evidently was drug addict) over about | |
| 3 years. | |
| For the German Intelligence authorities, this is "a new quality of espionage." | |
| The top manager said that they had awaited something similar but are | |
| nevertheless surprised that it happened so soon and with such broad effects. | |
| Summarizing the different events which have been reported earlier -- NASA and | |
| SPAN hacks, Clifford Stoll's report of the "Wily Hacker" -- I regard this as | |
| essentially the final outcome of the Wily Hackers story (with probably more | |
| than the 3 which have now been imprisoned). It is surprising that the | |
| Intelligence authorities needed so long time (after Cliff's Communications Of | |
| The ACM report, in May 1988) to finally arrest and accuse these crackers. | |
| Moreover, the rumors according to which design and production plans of a | |
| Megabit chip had been stolen from Philips/France computers seems to become | |
| justified; this was the background that CCC hacker Steffen Wernery had been | |
| arrested, for several months, in Paris without being accused. CAD/CAM programs | |
| have also been sold to KBG. | |
| Information Provided By | |
| Klaus Brunnstein | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Computer Spy Ring Sold Top Secrets To Russia March 3, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| West German counter-intelligence has uncovered a spy ring centered on computer | |
| hackers suspected of having supplied the Soviet Union with top secret military | |
| and economic information. | |
| They are said to have penetrated computer networks in the United States, | |
| Western Europe and Japan, according to a television report last night. | |
| In a special program, the North German Broadcasting Network said that thousands | |
| of computer codes, passwords and programs which allowed the Soviet Union access | |
| to major computer centers in the Western world have been passed on by the | |
| hackers. They had been recruited by the KGB in 1985 and are alleged to have | |
| supplied the information in return for money and drugs. | |
| In Karlsruhe, the West German Chief Public Prosecutor's Office, which is in | |
| charge of spy cases, would only confirm last night that three arrests have been | |
| made March 2nd during house searches in Hannover and West Berlin. | |
| Those detained were suspected of "having obtained illegally, through hacking | |
| and in exchange for money, information which was passed on to an Eastern secret | |
| service." | |
| But the spokesman did not share West German television's evaluation, which said | |
| the case was the most serious since the unmasking in 1974 of an East German | |
| agent in the office of ex-Chancellor Willy Brandt. The Interior Ministry in | |
| Bonn last night also confirmed several arrests and said the suspects had | |
| supplied information to the KGB. The arrests followed months of investigations | |
| into the activities of young computer freaks based in Hamburg, Hannover and | |
| West Berlin, the ministry said. | |
| According to the television report, the hackers gained access to the data banks | |
| of the Pentagon, NASA Space Center, and the nuclear laboratory in Los Alamos. | |
| They also penetrated leading West European computer centers and armament | |
| companies, including the French Thomson group, the European Nuclear Research | |
| Center, CERN, in Geneva; the European Space Authority, ESA, and German | |
| companies involved in nuclear research. | |
| The Russians are alleged to have put pressure on the hackers because of their | |
| involvement with drugs, and to have paid several hundred thousands marks for | |
| information, the program said. | |
| West German security experts on the evening of March 2nd described the new spy | |
| case as "extremely grave." The KGB has been provided with a "completely new | |
| possibility of attack" on Western high technology and NATO military secrets. | |
| The sources said it was "sensational" that the hackers should have succeeded in | |
| penetrating the US defense data systems from Western Europe. | |
| The North German Broadcasting Network program said its research was based on | |
| information given by two members of the suspected espionage ring. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| KGB Computer Break-Ins Alleged In West Germany March 3, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Taken From the International Herald Tribune | |
| Bonn - Three West German computer hackers have been arrested on suspicion of | |
| infiltrating computer networks worldwide to obtain secret data for an East | |
| block intelligence service, prosecutors said on March 2nd. | |
| A spokesman for the federal prosecutor, Alexander Prechtel, confirmed that | |
| three men were arrested, but did not identify the East Block country involved | |
| or the networks infiltrated. | |
| The ARD television networks "Panorama" program, the thrust of which the | |
| spokesman confirmed, said the hackers had passed secrets from a range of highly | |
| sensitive U.S., French, and West German computer networks to the KGB, the | |
| Soviet secret police. | |
| The television report said it was the worst such espionage case to be uncovered | |
| in West Germany since the 1974 exposure of Guenter Guillaume, an East German | |
| spy who was a top aide to Willy Brandt, then the West German chancellor. | |
| Among the systems believed to have been infiltrated were the U.S.: Defense | |
| Department's staff data bank, the U.S. nuclear arms laboratory in Los Alamos, | |
| New Mexico, the National Aeronautics and Space Administration, and U.S. | |
| military supply depots. | |
| The report said other systems entered were at the French arms and electronics | |
| company Thomson SA, a European nuclear-research center in Geneva, the European | |
| Space Agency and the Max-Planck Institute for Nuclear Physics in West Germany. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| News From The KGB/Wily Hackers March 7, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Now, five days after the "sensational" disclosure of the German (NDR) Panorama | |
| Television team, the dust of speculations begins to rise and the facts become | |
| slowly visible; moreover, some questions which could not be answered in | |
| Clifford Stoll's Communications of the ACM paper may now be answered. Though | |
| not all facts are known publicly, the following facts seem rather clear. | |
| - In 1986, some hackers from West Berlin and Hannover discussed, in "hacker | |
| parties" with alcohol and drugs, how to solve some personal financial | |
| problems; at that time, first intrusions of scientific computers | |
| (probably CERN/Geneva as hacker training camp) and Chaos Computer Club's | |
| spectacular BTX-intrusion gave many hackers (assisted by newsmedia) the | |
| *puerile impression* that they could intrude *into every computer | |
| system*; I remember contemporary discussions on 1986/87 Chaos Computer | |
| Conferences about possibilities, when one leading CCC member warned that | |
| such hacks might also attract espionage (Steffen Wernery recently | |
| mentioned that German counter-espionage had tried several times to hire | |
| him and other CCC members as advisors -- unsuccessfully). | |
| - A "kernel group" of 5 hackers who worked together, in some way, in the | |
| "KGB case" are (according to Der SPIEGEL, who published the following | |
| names in its Monday, March 6, 1989 edition): | |
| -> Markus Hess, 27, from Hannover, Clifford Stoll's "Wily Hacker" who was | |
| often referred to as the Hannover Hacker and uses the alias of Mathias | |
| Speer; after having ended (unfinished) his studies in mathematics, he | |
| works as programmer, and tries to get an Informatics diploma at the | |
| University of Hagen (FRG); he is said to have good knowledge of VMS | |
| and UNIX. | |
| -> Karl Koch, 23, from Hannover, who works as programmer; due to his | |
| luxurious lifestyle and his drug addiction, his permanent financial | |
| problems have probably added to his desire to sell "hacker knowledge" | |
| to interested institutions. | |
| -> Hans Huebner, alias "Pengo," from Berlin, who after having received | |
| his Informatics diploma from Technical University of West Berlin, | |
| founded a small computer house; the SPIEGEL writes that he needed | |
| money for investment in his small enterprise; though he does not | |
| belong to the Chaos Computer Club, he holds close contacts to the | |
| national hacker scenes (Hamburg: Chaos Computer Club; Munich: Bavarian | |
| Hacker Post; Cologne: Computer Artists Cologne, and other smaller | |
| groups), and he was the person to speak about UUCP as a future | |
| communications medium at the Chaos Communication Congress. | |
| -> Dirk Brezinski, from West Berlin, programmer and sometimes | |
| "troubleshooter" for Siemens BS-2000 systems (the operating system of | |
| Siemens mainframe computers), who earned, when working for Siemens or | |
| a customer (BfA, a national insurance for employees) 20,000 DM (about | |
| $10,800) a month; he is regarded (by an intelligence officer) as "some | |
| kind of a genius." | |
| -> Peter Carl, from West Berlin, a former croupier, who "always had | |
| enough cocaine." No information about his computer knowledge or | |
| experience is available. | |
| After successfully stimulating KGB's interest, the group (mainly Hess and Koch) | |
| committed their well-documented hacks [See Clifford Stoll's "Stalking the Wily | |
| Hacker," Communications of the ACM, May 1988]. SPIEGEL writes that the group | |
| *sold 5 diskettes full of passwords*, from May to December 1986, to KGB | |
| officers which they met in East Berlin; when Bremen University computer center, | |
| their favorite host for transatlantic hacks, asked the police to uncover the | |
| reasons for their high telephone bills, they stopped the action. | |
| This statement of Der SPIEGEL is probably wrong because, as Cliff describes, | |
| the "Wily Hacker" successfully worked until early 1988, when the path from his | |
| PC/telephone was disclosed by TYMNET/German Post authorities. The German | |
| public prosecutors did not find enough evidence for a trial, when examining | |
| Hess' apartment; moreover, they had acquired the material in illegal actions, | |
| so the existing evidence could not be used and finally had to be scratched! | |
| In Hess' apartment, public prosecutors found (on March 3, 1989) password lists | |
| from other hacks. On Monday, March 6, 1989, the Panorama team (who had | |
| disclosed the NASA hack and basically the KGB connection) asked Klaus | |
| Brunnstein to examine some of the password lists; the material which he saw | |
| (for 30 minutes) consisted of about 100 photocopied protocols of a hack during | |
| the night of July 27 to 28, 1987; it was the famous "NASA hack." From a VAX | |
| 750 (with VMS 4.3), which they entered via DATEX-P (the German packed-switched | |
| data-exchange network, an X.25 version), where they evidently previously had | |
| installed a Trojan horse (UETFORT00.EXE), they tried, via SET HOST... to | |
| log-into other VAXes in remote institutes. They always used SYSTEM account and | |
| the "proper" password (invisible). | |
| Remark: Unfortunately, DEC's installation procedure works only if a SYSTEM | |
| account is available; evidently, most system managers do not change | |
| the preset default password MANAGER; since Version 4.7, MANAGER is | |
| excluded, but on previous VMS versions, this hole probably exists in | |
| many systems! | |
| Since the hackers, in more than 40% of the cases, succeeded to login, their | |
| first activities were to SET PRIV=ALL; SET PRIO=9, and then to install (via | |
| trans-net copy) the Trojan horse. With the Trojan horse (not displayed under | |
| SHow Users), they copied the password lists to their PCs. When looking through | |
| the password list, Klaus observed the well-known facts: More than 25% female | |
| or male first names, historical persons, countries, cities, or local dishes (in | |
| the Universities of Pisa, Pavia, and Bologna, INSALATA was/is a favorite | |
| password of several people). Only in CASTOR and POLLUX, the password lists | |
| contained less than 5% passwords of such nature easy to guess! | |
| Apart from many (about 39) unsuccessful logins, many different CERN/GENEVA, | |
| NASA systems (CASTOR, POLLUX, Goddard and Ames Space Flight Centers), several | |
| USA, GB, French, Italian and some German institutes connected in SPAN were | |
| "visited." The documented session was from July 27, 10 p.m. to July 28, 1 a.m. | |
| The media report that other hacks (probably not all committed by Hess and Koch | |
| themselves) were sold to KGB. Among them, Electronic and Computer Industry | |
| seem to be of dominant interest for the USSR. If special CAD/CAM programs and | |
| Megabit designs (especially from Thomson/France, from VAX systems) have been | |
| stolen, the advantage and value for the USSR cannot be (over)estimated. | |
| In FRG, the current discussion is whether the hackers succeeded to get into | |
| "kernel areas" or only "peripheral areas." This discussion is ridiculous since | |
| most "peripheral systems" contain developments (methods, products) for future | |
| systems, while the "kernel systems" mainly contain existing applications (of | |
| past architectures). | |
| The well-known hackers (especially CCC) have been seriously attacked by some | |
| media. My best guess is that CCC was itself *a victim* because the group | |
| succeeded to informally get much of the information which they needed for some | |
| of the hacks, and which they finally sold to KGB. Apart from "Pengo," there | |
| doesn't seem to be a close relation between CCC and the KGB/Wily Hackers. | |
| Nevertheless, CCC and others, like Cheshire Catalyst in the USA, have prepared | |
| a climate where espionage inevitably sprang-off. | |
| Information Provided By | |
| Klaus Brunnstein | |
| _______________________________________________________________________________ | |
| Pengo Speaks Out About The KGB Hackers And More March 10, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| The following are statements made by Pengo to Phrack Inc. during an interview | |
| with Knight Lightning; | |
| KL: What is your response to the accusations of being a KGB spy? | |
| P: I have been involved into this espionage circle throughout some months in | |
| 1986. I did not actually work for the KGB, nor did I hand out hacker | |
| information to the East. All my hacking activities since then have been | |
| for the pure purpose of personal enlightenment. I never hid my name | |
| before, and I won't go undercover now that the real story comes to the | |
| surface. | |
| In the middle of 1988, I informed the West German authorities (secret | |
| service) about my involvement with the KGB. This is one of the main | |
| reasons for the big busts last week. I have to live with the fact that | |
| some hackers now think I am working for the authorities now. I don't, and | |
| I will try anything to avoid getting into all these secret | |
| service/espionage problems again. | |
| KL: What about the statements made in DER SPIEGEL? | |
| P: They published my name and claimed that I was "very active" for the east, | |
| but also that I am the :most hopeful head in West Berlin's hacking scene." | |
| I now try to make the best out of this publicity. | |
| KL: Klaus Brunnstein made some strong statements about you in RISKS Digest, | |
| what did you think of that? | |
| P: It really upsets me a lot. Klaus Brunnstein doesn't know anything | |
| detailed about this case, but he seems to love seeing himself as the | |
| insider in the German scene. At the last congress I got in kind of a | |
| dispute with him. He could not understand why I, as a computer scientist, | |
| still support hackers. Perhaps this is one of the reasons for his | |
| publication. | |
| KL: Any other comments? | |
| P: What I would be interested in hearing about the reaction to this situation | |
| from the United States hackers' point of view. I have already heard that | |
| most people seem to believe that the whole Chaos Computer Club is an | |
| association of spies. This is of course untrue. | |
| KL: What do you intend to do about the bad press you have received? | |
| P: I have posted a reply to Brunnstein's posting in RISKS (shown in next | |
| article). Apart from Hagbard, those guys never were hackers, and it seems | |
| to turn out that they have really been mere spies. | |
| KL: Were there any other repercussions to this case besides bad publicity? | |
| P: Currently, I'm puzzling out a new way of earning money, since my company | |
| decided to fire me. That's what you get if you play with fire :-) | |
| Luckily, I'm optimist! | |
| -Pengo | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Pengo Speaks In RISKS Digest March 10, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| In RISKS Digest, Klaus Brunnstein mentioned my name in the context of the | |
| hacker/espionage case recently discovered by the German authorities. Since Mr. | |
| Brunnstein is not competent to speak about the background of the case, I'd like | |
| to add some clarification to prevent misunderstandings, especially concerning | |
| my role. I think it is a very bad practice to just publish names of people | |
| without giving background information. | |
| I have been an active member of the net community for about two years now, and | |
| I want to explicitly express that my network activities have in no way been | |
| connected to any contacts to secret services, be it Western or Eastern ones. | |
| On the other hand, it is a fact that when I was younger (I'm 20 years old now), | |
| there had been a circle of people which tried to make deals with an eastern | |
| secret service. I have been involved in this, but I hope that I did the right | |
| thing by giving the German authorities detailed information about my | |
| involvement in the case in the summer of 1988. | |
| As long as the lawsuit on this case is still in progress, I am not allowed to | |
| give out any details about it to the public. As soon as I have the freedom to | |
| speak freely about all of this, I'll be trying to give a detailed picture about | |
| the happenings to anyone who's interested. | |
| I define myself as a hacker. I acquired most of my knowledge by playing around | |
| with computers and operating systems, and yes, many of these systems were | |
| private property of organizations that did not even have the slightest idea | |
| that I was using their machines. I think that hackers (people who creatively | |
| handle technology and not just see computing as their job) do a service for the | |
| computing community in general. It has been pointed out by other people that | |
| most of the "interesting" modern computer concepts have been developed or | |
| outlined by people who define themselves as "hackers." | |
| When I started hacking foreign systems, I was 16 years old. I was just | |
| interested in computers, not in the data which has been kept on their disks. | |
| As I was going to school at that time, I didn't even have the money to buy my | |
| own computer. Since CP/M (which was the most sophisticated OS I could use on | |
| machines which I had legal access to) didn't turn me on anymore, I enjoyed the | |
| lax security of the systems I had access to by using X.25 networks. | |
| You might point out that I should have been patient and wait until I could go | |
| to the university and use their machines. Some of you might understand that | |
| waiting was just not the thing I was keen on in those days. Computing had | |
| become an addiction for me, and thus I kept hacking. I hope this clears the | |
| question "why." | |
| It was definitely NOT to give the Russians any advantage over the USA, nor to | |
| become rich and get a flight to the Bahamas as soon as possible. The results | |
| of the court trial will reveal this again, but until then I want to keep rumors | |
| out that the German hackers were just the long (?) arm of the KGB to harm | |
| Western computer security or defense power. | |
| It should also be pointed out that the Chaos Computer Club has in no way been | |
| connected to this recent case, and again, that the CCC as an organization has | |
| never been a "hacker group." The CCC merely handles the press for hackers, and | |
| tries to point out implications of computers and communications for society in | |
| general. | |
| I have already lost my current job, because of my name being published in DER | |
| SPIEGEL and in RISKS. My business partners became anxious about my involvement | |
| in the case. Several projects I was about to complete in the near future have | |
| been cancelled, which forces me to start again at the beginning in some way. | |
| -Hans Huebner | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Klaus Brunnstein Reacts To Pengo In RISKS Digest March 14, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| "Pengo" Hans Huebner stated that he had no share in the KBG case as I mentioned | |
| in my report. Since I myself had no share in the KGB case (and in this sense, | |
| I am not as good a source as Pengo!), I tried to transmit only information | |
| where I had at least *two independent sources* of *some credibility*. In | |
| Pengo's case (where I was rather careful because I could not believe what I | |
| read), my two sources were: | |
| - The SPIEGEL report (I personally agree that names should be avoided as | |
| long as current investigations are underway; yet in this cases, the names | |
| have been widely published in FRG and abroad); | |
| - A telephone conversation with a leading Chaos Computer Club person after | |
| he had informed me about a public debate at Hannover fair (where the | |
| German daily business newspaper, Wirtschafts, which had organized a | |
| discussion with data protection people and CCC). | |
| I asked him whether he knew of Pengo's contribution; he told me that | |
| he directly asked Pengo, "Did you, without pressure and at your own | |
| will, work for the Russians?" Pengo answered, "Yes." He told me that | |
| he immediately cut-off any contact to Pengo. Evidently, there was a | |
| controversial discussion in Chaos Computer Club whether on should react | |
| in such a strict manner. I understand the strong reaction because the | |
| KGB hackers severely damaged the CCC's attempt to seriously contribute to | |
| the public discussion of some of the social consequences of computers. | |
| They now face, more seriously than before, the problem of being regarded | |
| as members of a criminal gang. | |
| -Klaus Brunnstein | |
| _______________________________________________________________________________ | |