Hackers breach wayback machine, exploiting open-source vulnerabilities
651 views

Hackers breach wayback machine, exploiting open-source vulnerabilities

Cybersecurity experts underscore the need for vigilant asset protection and rapid response.

A recent hack targeting the Internet Archive’s Wayback Machine has exposed 31 million passwords, highlighting ongoing security vulnerabilities in web applications and the challenges of securing open-source components.

Cybersecurity experts say the breach, which involved defacing the website and subsequent denial-of-service (DDoS) attacks, points to critical weaknesses in current cybersecurity practices.

“Sadly, not a lot has changed,” stated Phillip Ivancic, Head of Solutions Engineering, APAC at Black Duck. “It's probably the same advice that has been around for a very long time, that individuals should not reuse passwords in case they are compromised and then hackers could use them on different sites.”

Steven Sim, a member of the ISACA Information Security Advisory Group, echoed Ivancic's concerns, highlighting the importance of protecting development servers and networks. “There are quite a few lessons that definitely can be learned in this incident,” said Sim. “How Incident Response itself is handled, as well as...identifying your critical assets, protecting them adequately, and having adequate detection, response, and recovery.”

The motivation behind the Wayback Machine hack remains speculative, with theories ranging from “cyber street cred” to political motivations. Ivancic noted that the Wayback Machine holds potentially sensitive information that could be of interest to certain groups.

“Whoever the attacking group was was really determined to disrupt the Internet Archive,” Ivancic explained. “They not only stole passwords, they defaced the web application...it was persistent and deliberate and really designed to try and, for lack of a better word, punish the Internet Archive.”

Sim added that non-financial motivations likely drove the attackers. “One of the strongest [theories] that stood out was...to gain cyber street credibility, or cyber street cred,” Sim said. He noted that this achievement could enhance the hacker’s reputation in the cyber community, as financial extortion was unlikely, given the Internet Archive’s non-profit status.

In terms of the breach specifics, Ivancic highlighted that the initial vulnerability stemmed from an open-source component in the Internet Archive’s authentication process. “Scanning your websites for insecure, open-source components remains one of the most important things that organisations should do,” Ivancic explained.

The breach expanded further when hackers accessed an API token that compromised the email server. “You do need to automate your processes to find [vulnerabilities] and hopefully fix them,” he said, suggesting that tools like software composition analysis could prevent similar attacks.

Sim detailed further entry points discovered by the hackers, including an exposed configuration file that contained sensitive credentials. This file allowed attackers to download the Archive’s source code, which included authentication tokens and database credentials.

“Very often, many end user companies fall into the trap of thinking that these are non-life systems...and as a result, becomes a conduit or pivoting point into more critical resources and assets in the environment,” Sim explained, underscoring the importance of securing development systems.

To prevent similar incidents, Ivancic and Sim emphasised the importance of incident response, regular credential rotations, and thorough communication with users. As Sim noted, effective cybersecurity governance involves robust risk assessment and ensuring “even development servers, development systems are secure,” an area where many companies fall short.

Follow the link for more news on

Join Asian Business Review community
Since you're here...

...there are many ways you can work with us to advertise your company and connect to your customers. Our team can help you dight and create an advertising campaign, in print and digital, on this website and in print magazine.

We can also organize a real life or digital event for you and find thought leader speakers as well as industry leaders, who could be your potential partners, to join the event. We also run some awards programmes which give you an opportunity to be recognized for your achievements during the year and you can join this as a participant or a sponsor.

Let us help you drive your business forward with a good partnership!

Top News

10 capabilities driving delivery predictability according to McKinsey
Agile funding, product management, and iterative controls are top capabilities driving effectiveness.
Global coal demand to plateau through 2027
Consumption is projected to level off in major market China.
Low carbon energy amongst trends to watch in 2025
Battery and solar markets are projected to remain oversupplied.

Exclusives

Hyper-personalised shopping rules in Southeast Asia
Data and analytics allow brands to optimise customer experience both online and in-store.
Citibank expects increased funding for Indonesia’s infra, energy sectors
President Prabowo’s infrastructure projects present opportunities for investors and banks.
Trump 2.0 could thump India's solar ambition
Its solar companies may need to set up manufacturing plants in the US to bypass tariffs.