This page has been archived and commenting is disabled.

NYSE Leaves Confidential Infrastructure Data Exposed

Tyler Durden's picture




 

As the topic of high frequency trading gains attention, Wired magazine has released this stunner about just how "secured" mission-critical data on the world's largest exchange truly is.

Sensitive information about the technical infrastructure of the New York Stock Exchange computer network was left unsecured on a public server for possibly more than a year, Wired.com has learned.

The data was removed after Wired.com disclosed the situation to the NYSE. It included several directories of files containing logs, server names, IP addresses, lists of hardware, lists of software versions running on the network, and configuration and patch histories (including which patches have not yet been installed). It was all available on a publicly accessible, unprotected FTP server maintained by EMC, a company that sells storage systems and managed services to the NYSE and other companies.

The information could allow an intruder to map theNYSE’s network architecture and determine what vulnerabilities exist in the system.

For example, one of the documents posted on the server was an Excel spreadsheet, called a “heat report,” which consisted of a long list of low-level and high-level warnings, some of them indicating where patches had not yet been installed, such as the one below:

WARNING : Solaris 5.9 kernel patch fix 122300 is not installed.

It’s unclear how long the information was left unprotected on the server, but a note posted amid the files by an EMC employee named Dan Sferas read, “This directory contains all relevant data to the NYSE account.” The note was dated April 2, 2008.

A source knowledgeable about the leak, speaking on condition of anonymity, said that the FTP server was used to share configuration information among EMC engineers, vendors and customers. “This was a breakdown of process within EMC, and normally that information would not be accessible to the public,” said the source.

If this was uncovered accidentally and presumably highly sensitive and confidential information infrastructure has been floating around for "more than a year" one can only imagine how many other critical leaks exist within the exchange that trades well over one billion shares daily. It is imperative that the NYSE immediately disclose who has had access to these data, and just what potential abuse this information, floating in cyberspace, may have had on the integrity of capital markets.

Regardless, it merely enforces the notion that concentrating too much capital markets power in the hands of one exchange is simply an unacceptable risk, especially in light of the points brought up by Paul Wilmott in the prior article.

 

- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Wed, 07/29/2009 - 10:14 | 18098 aldousd
aldousd's picture

speechless. emc is the international, government approved, nato used, officially stamped backup / business continuous volume manufacturer of choice. if this is what we can expect from the big guns, kids, lookout.

Wed, 07/29/2009 - 12:35 | 18269 Anonymous
Anonymous's picture

for those of you that do not have to interact with EMC on a professional basis, as i do daily, please note that this does not come as a surprise to me.

while they may 'lead the world' in many areas, professional organization is .... "not" .... one of their strong points. their technology is great but their people are a joke.

Wed, 07/29/2009 - 10:16 | 18100 slore
slore's picture

one word: "Dummies"

Wed, 07/29/2009 - 10:21 | 18105 lizzy36
lizzy36's picture

your call for disclosure from the NYSE based on the integrity of the capital markets presupposes that said integrity exists at this point.

 

Wed, 07/29/2009 - 11:11 | 18160 Anonymous
Anonymous's picture

very correct lizzy36.

Wed, 07/29/2009 - 10:21 | 18106 Anonymous
Anonymous's picture

Odds are improving that a Black Swan wears a Black Hat.

Wed, 07/29/2009 - 11:23 | 18175 Cheeky Bastard
Cheeky Bastard's picture

i think we passed the point where we could only have on black swan, man i can see a whole flock of them on the horizon ...

Wed, 07/29/2009 - 10:24 | 18108 DebtorShredder
DebtorShredder's picture

This ties in beautifully with that POS "Trust Us" video Duncan was rambling about. What a marketing dept. they have!

Hearts and minds, people, hearts and minds....

Wed, 07/29/2009 - 10:28 | 18110 Bob
Bob's picture

Perhaps the FBI should get involved--this is WAY bigger than Sergey. 

Wed, 07/29/2009 - 10:42 | 18125 Bob Dobbs
Bob Dobbs's picture

Agreed.  A leak like this, if it is true, could be devastating.  The blurb about the kernel patch is alarming - if true the hacker knows at which build level the OS was running at the time of the report.  Solaris is a good OS, but all computer systems are vulnerable at the level of the information that is available.  As ZH found yesterday port scans don't reveal that much about a networked computer, BUT a dedicated black hat with detailed information about the OS can really be destructive.  Root kits, duplicate user accounts, trap doors, DDOS attacks.  You name it, that is where they begin.

Wed, 07/29/2009 - 11:24 | 18176 Bob
Bob's picture

Bob, given the allure of high prestige targets and the sheer number of hackers who love doing this stuff, would it not be virtually certain that they DID get "hacked"?

Wed, 07/29/2009 - 15:31 | 18482 Bob Dobbs
Bob Dobbs's picture

There's an intrusion, and there is the installation of a root kit.  Just getting in usually is not enough.  If the system has few services (ftp was running on this one, how about smtp?) and the permissions are screwed down tight, then maybe an intruder wouldn't get too far.  See:

http://www.snort.org/

 

No computer is completely secure, unless it's turned off.

Wed, 07/29/2009 - 11:44 | 18195 Anonymous
Anonymous's picture

What? There are very accurate remote OS/service guessing algorithms that use things like TCP sequence number fingerprinting. Even if an attacker has no idea what platform a remote target is on, it doesn't take very long to run through an exhaustive list of the most common known exploits for all OS's. This really isn't that big a deal, seriously. There is also a very slim chance that any of these machines were publicly accessible in the first place.

Wed, 07/29/2009 - 11:46 | 18199 Anonymous
Anonymous's picture

And, by the way, devoid of any information of the sort, attackers are blindly trying exploits out on every possible IP address IPv4. This happens all day long, every day. Get a clue. If a machine is vulnerable and outward-facing, it will eventually be compromised -- no list of patch levels required.

Wed, 07/29/2009 - 15:27 | 18473 Bob Dobbs
Bob Dobbs's picture

True.  But your just asking for trouble by running exposed like that.  I guess it was port 21.  That's always a problem.

Wed, 07/29/2009 - 12:02 | 18223 Bob
Bob's picture

According to Wired, "It was all available on a publicly accessible, unprotected FTP server." 

 

Wed, 07/29/2009 - 12:50 | 18283 Anonymous
Anonymous's picture

Hee hee. Unprotected FTP...as if there were any other kind.

Long gone are the days when we should even think of exposing clear text, non-passphrase protected protocols on the Interwebz.

Somebody got caught with their pants down.

Wed, 07/29/2009 - 13:00 | 18296 aldousd
aldousd's picture

I would assume that NYSE has some pretty tough NDA's with the EMC folks, but look, this is the EMC folks fault. But there is also such a thing as common sense, I mean, if microsoft asks you to send a list of passwords to help you figure out 'what's wrong with your servers' they may well intend to use them for the right reasons, but any halfway decent tech would still tell them "no."

Wed, 07/29/2009 - 15:40 | 18495 erich
erich's picture

That is not a high hurdle, is it?

But Sergey can dance!

Wed, 07/29/2009 - 10:29 | 18111 Anonymous
Anonymous's picture

Nothing is secure. It is all just an illusion.

Wed, 07/29/2009 - 10:34 | 18117 Anonymous
Anonymous's picture

Kathleen Hayes (Bloomberg TV reporter extraordinaire) "take transportation out of durable goods orders and they were actually up 1.6%"

I look forward to hearing from Bloomberg contributor Tom Daschle on health care reform.

These guys are actually worse than CNBC - as they have an aura of credibility so some people might actually buy what they are saying.

Wed, 07/29/2009 - 10:37 | 18121 Anonymous
Anonymous's picture

of interest I believe that she and DK get their eye glasses from the same Wal*Mart

Wed, 07/29/2009 - 10:59 | 18141 Anonymous
Anonymous's picture

Kathleen Hays is a university trained economist with experience at the Federal Reserve and who is now an on air financial reporter for Bloomberg Television. She was formerly a reporter for Investor's Business Daily, CNBC's Squawk Box and various CNNfn programming before joining Bloomberg.
---------
from wiki...see fed experience

surprised she's a sheep cheerleader

Wed, 07/29/2009 - 11:20 | 18171 MinnesotaNice
MinnesotaNice's picture

It was interesting to read the unique 'spin' put on Durable Goods this morning by CNBC and Bloomberg:  CNBC says 'Durable Orders Plunge'; Bloomberg says 'U.S. Durable Goods Orders, Excluding Cars and Planes, Unexpectantly Advance'.  They both are enough to give you whiplash... spin is king right now.

Wed, 07/29/2009 - 11:25 | 18177 DebtorShredder
DebtorShredder's picture

They can't spin it because it all feeds into GDP. You know, that number they promised would be positive the second half of the year.

Oops...was Dennis Kneale:

A) wrong? B) premature?  C) clueless? D) all of the above

Wed, 07/29/2009 - 14:30 | 18388 Anonymous
Anonymous's picture

they should exclud all the negative data everything would be positive then. who needs reality?

Wed, 07/29/2009 - 10:37 | 18119 Anonymous
Anonymous's picture

this isnt exactly news and it doesn't really reflect that badly on the NYSE. the data is clearly on an EMC server. and only reflects badly on the NYSE insofar as they have entrusted this confidential infrastructure data to EMC and they have distributed it publicly...

Wed, 07/29/2009 - 10:42 | 18126 DebtorShredder
DebtorShredder's picture

The above post:

"Inner thoughts"

is brought to you by Duncan Niederauer. Enjoy!

Wed, 07/29/2009 - 10:47 | 18127 Ben_the_Bald
Ben_the_Bald's picture

Well, EMC has a lot of explaining to do. In this business your suppliers gather a lot of information about you, especially when they provide you consulting services to setup the equipment or software that they sell you. Those suppliers of course have that information stored somewhere. NYSE, and other EMC clients who had their tech stuff exposed like this should be looking for some recourse to make sure this doesn't happen in the future, or EMC is going to be losing business.

Wed, 07/29/2009 - 11:29 | 18182 channel_zero
channel_zero's picture

Well, EMC has a lot of explaining to do.

No they don't.  Some people at the bottom of the project's food chain will either get a stern talking to or at worst fired. At the service-contract/executive level the blame will be shifted to project workers.

When in fact the *how* it happened is most likely due to service-contract-level people that might need the data for a management meeting find PKI "too complicated." and told the admin to "make it easy."  This scenario is very common.

Wired is merely exploiting what is very common knowledge in IT.

Tyler, you are attempting to write about things for which you have no clue.  It would be an improvement if you would not run stories like this.  Or, maybe run the story by someone who is *in* IT to do a paranoia/reality check.  I'm sure I'm not the only IT person who visits your site.

Wed, 07/29/2009 - 11:58 | 18204 Ben_the_Bald
Ben_the_Bald's picture

In context, EMC has a lot of explaining to do to its clients. Whatever they do internally it's their own business, but in cases like this has to be explained.

But the title of this "Tyler" post makes it sound like it's NYSE who left the data exposed. That's not what happened. And other EMC clients are now probably calling EMC top managment asking them to clean up their act.

Wed, 07/29/2009 - 12:31 | 18261 SWRichmond
SWRichmond's picture

"But the title of this "Tyler" post makes it sound like it's NYSE who left the data exposed. That's not what happened."

 

Try using that defense in court and see what happens.

Wed, 07/29/2009 - 13:21 | 18311 Ben_the_Bald
Ben_the_Bald's picture

OK, suppose that someone exposes all the data about ZH servers that periquito and ecatel have left exposed.  I'm guessing you would blame ZH for that, even though ZH may have some claim against those providers for that breach.

Wed, 07/29/2009 - 13:48 | 18345 SWRichmond
SWRichmond's picture

You can share your responsibility but your portion is not diminshed.

Wed, 07/29/2009 - 11:49 | 18205 Anonymous
Anonymous's picture

Agreed. Why are they using an FTP server in the first place? Some low-level dipshit who doesn't know any better used their anonymous FTP server for something that should have been on a private repository.

Wed, 07/29/2009 - 13:08 | 18301 zeropointfield (not verified)
zeropointfield's picture

that's very common, for example the Cisco IOS for routers and switches is upgraded via tftp from some unsecured tftp server.

security in IT is still an afterthought. functionality first, lets worry about security later or not at all.

Wed, 07/29/2009 - 11:50 | 18207 Anonymous
Anonymous's picture

THIS JUST IN -- CHUCK SCHUMER REQUESTING BAN ON FTP SERVERS.

Wed, 07/29/2009 - 12:03 | 18224 agrotera
agrotera's picture

high five anony!

Wed, 07/29/2009 - 13:36 | 18332 poydras
poydras's picture

Anyone with a backgound in large infrastucture IT knows that detailed info on the infrastructure is in many hands.  This is embarrassing for EMC.  Beyond that, you have to build and protect infrastructure assuming your worst threat is in fact inside the corporation with detailed knowledge.  Settle down TD.

Wed, 07/29/2009 - 10:39 | 18122 Anonymous
Anonymous's picture

One luxury home sold in Florida yeh the Housing market is recovering.

woops sorry it dropped out of escrow. Buyer lost their job at Goldman Sachs.

Wed, 07/29/2009 - 11:13 | 18163 deadhead
deadhead's picture

WalMart has a sale on compaq laptops for 298.....the ten minimum/store deal, starting 7-26. I saw ad yesterday and figured "they're gone" as I am looking for a cheap laptop.  wife calls today and the local walmart says they have at least 20 and nobody is buying them

I guess this is my anecdotal deflation story of the day.

Also, with all of this computer security talk going on, I'm feeling pretty confident that none of these hacking phucks will be able to break into my brand spanking new $298 laptop. 

Wed, 07/29/2009 - 11:34 | 18186 channel_zero
channel_zero's picture

I'm feeling pretty confident that none of these hacking phucks will be able to break into my brand spanking new $298 laptop.

Seriously?  If it runs Windows and you are using it to connect to the  Internet they own it at will.

FYI: A meaningful improvement to your situation would be switching to a Linux distro.  Ubuntu is good for newbies like you.  http://ubuntu-releases.eecs.wsu.edu/hardy/ubuntu-8.04.3-desktop-i386.iso

Wed, 07/29/2009 - 12:31 | 18259 deadhead
deadhead's picture

CZ...thank you....though I was being tongue in cheek, i genuinely appreciate the ubunto info and thank you for it.  what thinx about avoiding the vista and putting in firefox?  thanks!

Wed, 07/29/2009 - 16:03 | 18520 channel_zero
channel_zero's picture

what thinx about avoiding the vista and putting in firefox?

Erm.  Well, you see even if you switch to firefox, your operating system is *still* Vista.  It helps, but you are still at the mercy of the operating system security that hasn't changed since windows 2000.  They've added more cruft on top of the system to give the appearance that it's somehow different, but really?  it's about the same.

The digital restrictions management (drm) in Vista is enough to give me a rash.

Linux is different in some important ways. When you get comfortable with the idea that it's possible to safely do many things that Visa nags or prevents you from doing.  Then the potential of the Internet beyond the media controlled sh!t pipe it has become opens up.

Wed, 07/29/2009 - 13:13 | 18304 zeropointfield (not verified)
zeropointfield's picture

For the fun of it, I reckon you have at least linked to the DVD and not to the CD iso image?

Wed, 07/29/2009 - 16:14 | 18554 channel_zero
channel_zero's picture

hahaha. 

No idea.  It should be enough to get anyone going though.

If you are running on old hardware,(IDE drives.  SATA isn't well supported!) you can go here for a Debian online install.  http://goodbye-microsoft.com/

Thu, 07/30/2009 - 08:40 | 19122 Bob Dobbs
Bob Dobbs's picture

Or, buy a cheap used laptop and put any version of Linux you care for on it.  Slackware rules.

Wed, 07/29/2009 - 11:20 | 18169 SWRichmond
SWRichmond's picture

"Sensitive information about the technical infrastructure of the New York Stock Exchange’s computer network was left unsecured on a public server for possibly more than a year, Threat Level has learned."

"...logs; server names; IP addresses; lists of hardware; lists of software versions running on the network; and configuration and patch histories, including what patches have not yet been installed. It was all available on a publicly accessible, unprotected FTP server..."

omfg.  So much for secure access to or from that network. 

Those of you not in the biz: the process of scanning the Internet for possible connections is automated, and has been for more than a decade.  Give scanner a range of IP's to scan, preferred ports, and go to work / school.  When you return, you are presented with a list of found open ports for "further investigation" (old way).  Attacks / compromises can also be automated, so now you could come home and have a list of new toys to play with.  I can confidently predict that the information from the ftp server was found and copied within hours after it was actually posted there, a year ago or more.  Since the data contain patch histories, compromising listed boxes is child's play if they are publicly accessible or can be reached through other boxes that are themselves both compromised and publicly accessible. 

In other words, if Fred uses his workstation to control the HFT box, and Fred can also surf the Internet, if this data includes patch history on the HFT box then the HFT box is in serious jeopardy because Fred's workstation is pwnable.  Even better scenario is one where Fred uses his workstation to configure real time trading data accessibility.  You see where I'm going with this.

This is inexcusible.  Whose goddamned brother-in-law got this contract?

Given the nature of the network, the possibilities here are mind-boggling.  And given the facts of this disclosure, it seems safe to assume that the managers of this network are not up to the task.

Wed, 07/29/2009 - 11:34 | 18187 Bob
Bob's picture

With virtual certainty that the info got out, is it not almost as likely that it was exploited for some kind of concrete gain?  In the hacker world, somebody's gonna see the opportunity and make sure they get PAID somehow, right?

Wed, 07/29/2009 - 11:40 | 18192 SWRichmond
SWRichmond's picture

IMO yes.

Wed, 07/29/2009 - 12:40 | 18271 Bob
Bob's picture

Does that make you wanna get a full look at Sergey's code? 

Could bring things full circle, with the crooks using the FBI to cover their own crime . . .

 

Wed, 07/29/2009 - 12:53 | 18287 SWRichmond
SWRichmond's picture

comms guy, not a coder.

Wed, 07/29/2009 - 11:20 | 18170 Miles Kendig
Miles Kendig's picture

NEVER think that just because some entity is structurally important or even if it isn't that it conducts its affairs as if it is.  This provides just one more example of how different the view can be from various vantage points.  In this it is prudent to remember that in the quest for data one should always look everywhere one might be able to develop it and to check how folks respond to differing data stimulus.

Wed, 07/29/2009 - 11:21 | 18172 Cheeky Bastard
Cheeky Bastard's picture

there is only one thing to say; MASSIVE FAIL

 

bunch-a-n00bs ...

Wed, 07/29/2009 - 11:28 | 18180 Anonymous
Anonymous's picture

Look - we have two choices: We either come up new Ponzi scheme to swallow up the current ponzi scheme or we slowly unravel and crash over the next three years. That's it. There is no equilibrium, no balancing the weight of infinite greed. The tsunami wave is oscillating and building up strength.

Wed, 07/29/2009 - 11:30 | 18181 Mazarin
Mazarin's picture

Homeland Insecurity. Glad Cheney's Goons are so worried about listening in on sex-chat and dial-a-porn while the nation's largest financial exchange runs around with its pants down grabbing its ankles.

Wed, 07/29/2009 - 11:42 | 18193 ShankyS
ShankyS's picture

Most likely discussion is all we'll get from the 20 senate hearings we'll get on this topic over the next 5 years as they pass the buck around while GS grandly greases the wheels funding lobbyists, campaigns and paying massive bonuses with the "winnings" all the while government is finding the right way to politicize the issue so some party can gain a power base out of this mess which will happen only after the fact and GS has been destroyed (akin to shooting someone that is already dead).

I think I got that right? Wash, rinse, repeat. 

 

Wed, 07/29/2009 - 11:51 | 18210 silencedogood
silencedogood's picture

The most important information that report could give is an internal diagram of server IP's, OS's (versions, service pack level), and types of network equipment would be stunningly valuable for a cracker.  Do a driveby with a laptop with netsumbler and GPS and you could quickly find out if they are stupid enough to have wireless access (not easily hacked BUT doable).  If they have wireless access points, a short hop into th heart of the network.  Now I have all of the wired news information and I know what servers to after, what root kits or software needed to crack the servers.  The information is an information loss of incredible magnitude.  Here's how a hack would work:

1) If you dont know NYSE...check netsol and arin for their IP's and webserver URLs and info.

2) DNS lookups for all IPs located. Map out their external connections to the Internet

3)  Well, since Wired was kind enough to give me a plethora of internal information , I would hope some of that info would include IP's of all IDS systems (OS's thereof!), list of network and host based systems, IP of  routers and IOS's (assuming Cisco), IP's of all Servers, and if they have VLAN's....etc  That kind of information is extremely hard to get unless you have an inside guy.  THIS IS WHY THE WIRED INFORMATION IS CRITICAL.

4) Using all of the above information, ALL I NEED is a SINGLE entry point...a rogue WAP, a rogue modem, send someone in the office a trojan that creates a tunnel thru the network to their machine so I can use it as a launching platform for attacks.  There is 50 different ways to get into a network and never have to worry about going thru their phalanx of firewalls and what not.

The wired news article gives STUNNING good Intel for attackers.  A moderate hacker instead of a highspeed hacker could now damn near crack them.

-Silence Dogood

Wed, 07/29/2009 - 12:02 | 18216 silencedogood
silencedogood's picture

FYI to my fellow IT Pro's, to lock down wireless: I put my WAP's OUTSIDE my firewall and VPN thru my AES encrypted tunnel into my personal network.  WAP's SHOULD NOT BE in a network in my humble opinion.  I demonstrated to a client how I could figure out how to crack his wireless network as he had it "secured".  Took me 30 mins.

-Silence Dogood

Wed, 07/29/2009 - 12:35 | 18270 deadhead
deadhead's picture

thanks again silence...very, very interesting.

Thu, 07/30/2009 - 08:38 | 19120 Bob Dobbs
Bob Dobbs's picture

That's right. Wire is still the best.  None of the wireless encryption protocols that are commercially available are secure enough.  You are correct thirty minutes would be all that is needed.  Of course any sensitive traffic should be going through https anyway.

Wed, 07/29/2009 - 11:51 | 18211 chumbawamba
chumbawamba's picture

Time to stir the pot again...

Gold does not require an exchange to trade.  Just an exchange of goods between two people.

I am Chumbawamba.

Wed, 07/29/2009 - 12:24 | 18247 Dr Hackenbush
Dr Hackenbush's picture

I'm convinced that information 'leaked' on retail traders is immense and in-depth. 

It’s OBVIOUS that there is more money to be made by pounding day traders, than by legitimate investing and speculation on business growth.

And there's your sign...

 

Wed, 07/29/2009 - 13:25 | 18317 MsCreant
MsCreant's picture

I wonder if this kind of a thing provides a "cover" or "back story" for those doing bad things to then say "hey, it wasn't us, everyone had access since April 2008." In otherwords, leave this out deliberately as a defense.

Wed, 07/29/2009 - 17:03 | 18628 Anonymous
Anonymous's picture

Agreed, along with the Goldman Sachs code. The two go nicely together and both have G.S. fingerprints and the same theme - they can both be used to manipulate the market.

Wed, 07/29/2009 - 20:55 | 18827 Anonymous
Anonymous's picture

I was waiting for someone to tie this story into GS. Nicely done, but you did make me wait for it.

Wed, 07/29/2009 - 14:59 | 18435 BorisTheBlade
BorisTheBlade's picture

No way. Basically, this thing is a biggest present you can make to a hacker: network topology, equipment and vulnerabilities all in one place. Normally it would a considerable amount of time to accumulate such data having risk of exposing yourself.

If that's true, than that could be huge.

Do NOT follow this link or you will be banned from the site!