Language Selection

English French German Italian Portuguese Spanish

M$ Says MSN Site Hacked in S. Korea

Filed under

Microsoft acknowledged Thursday that hackers booby-trapped its popular MSN Web site in South Korea to try to steal passwords from visitors. The company said it was unclear how many Internet users might have been victimized.

Microsoft said it cleaned the Web site,, and removed the dangerous software code that unknown hackers had added earlier this week. A spokesman, Adam Sohn, said Microsoft was confident its English-language Web sites were not vulnerable to the same type of attack.

South Korea is a leader in high-speed Internet users worldwide. Microsoft’s MSN Web properties — which offer news, financial advice, car- and home-buying information and more — are among the most popular across the Web.

The affected Microsoft site in South Korea offers news and other information plus links to the company’s free e-mail and search services. Its English-language equivalent is the default home Internet page for the newest versions of its flagship Windows software sold in the United States.

The Korean site, unlike U.S. versions, was operated by another company Microsoft did not identify. Microsoft’s own experts and Korean police authorities were investigating, but Microsoft believes the computers were vulnerable because operators failed to apply necessary software patches, said Sohn, an MSN director.

“Our preliminary opinion here was, this was the result of an unpatched operating system,” Sohn said. “When stuff is in our data center, it’s easier to control. We’re pretty maniacal about getting servers patched and keeping our customers safe and protected.”

Microsoft’s acknowledgment of the hacking incident was the latest embarrassment for the world’s largest software company, which has spent hundreds of millions of dollars to improve security and promote consumer confidence in its products.

Security researchers noticed the suspicious programming added to the Korean site and contacted the company Tuesday. Microsoft traced the problem and removed the hacked computers within hours, Sohn said, but it doesn’t yet know how long the dangerous programming was present.

In recent days no customers have reported problems stemming from visits to the Web site, Sohn said.

The hacker program scanned visitors’ computers and tried to activate password-stealing software that was found separately to exist on some hacked Chinese Web sites.

Microsoft said it was trying to decide whether to issue a broad public warning to recent visitors of the Korean site as it examines its own records to attempt to trace anyone who might have been victimized.

© 2005 The Associated Press.

More in Tux Machines

FreeNAS 10 Enters Alpha, Brings Lots of New Technologies, Based on FreeBSD 10.2

FreeNAS' Jordan Hubbard was proud to announce the other day, October 8, the release and immediate availability for download of the first Alpha build of the upcoming FreeNAS open source Network Attached Storage (NAS) solution. Read more

openSUSE Tumbleweed Gets New Major Snapshot, Leap 42.1 RC1 Coming Next Week

On October 9, Douglas DeMaio wrote about the latest major snapshot released for the rolling-release edition of the openSUSE Linux operating system, Tumbleweed, which adds some of the latest software versions. Read more

Amazon’s AWS IoT platform taps three Linux SBCs

Amazon’s new “AWS IoT” cloud IoT platform offers Starter Kits built around Linux-ready SBCs like the BeagleBone Green, DragonBoard 410c, and Intel Edison. Amazon made its first big Internet of Things play by launching an IoT managed cloud platform for aggregating and processing IoT endpoint data, built around its Amazon Web Services (AWS) platform. Available now in beta form, AWS IoT, is being made available in the form of a series of AWS IoT Starter Kits, which bundle popular hacker boards with the AWS IoT Device SDK, and in some cases other hardware such as Grove sensors. Three of the 10 kits runs Linux, including kits for the DragonBoard 410c, BeagleBone Green, and Intel Edison (see farther below). Read more

KDBUS Continues Maturing, But Will We See It For Linux 4.4?

New KDBUS patches continue being published for this in-kernel IPC mechanism based on D-Bus, but it hasn't been communicated yet whether Linux 4.4 is the next target for hoping to mainline this controversial code. Just yesterday was a set of 44 patches in attempting to cleanup the KDBUS code further. There's also been an assortment of other KDBUS patches floating around the kernel mailing list. Read more