{"id":3570,"date":"2010-12-11T23:04:35","date_gmt":"2010-12-12T04:04:35","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=3570"},"modified":"2022-12-30T15:48:14","modified_gmt":"2022-12-30T20:48:14","slug":"hackers-give-microsoft-their-code","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/hackers-give-microsoft-their-code\/","title":{"rendered":"Hackers Give Microsoft their code"},"content":{"rendered":"<p><a href=\"https:\/\/www.yelp.com\/biz\/webtronics-westlake\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-107293\" title=\"Hackers Give Microsoft their code\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-18.jpg?resize=100%2C100&#038;ssl=1\" alt=\"Hackers Give Microsoft their code\" width=\"100\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-18.jpg?w=116&amp;ssl=1 116w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-18.jpg?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>When hackers crash their systems while developing viruses, the code is often sent directly to <a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>), according to one of its senior security architects, Rocky Heckman recently <a href=\"https:\/\/web.archive.org\/web\/20120604071303\/http:\/\/www.zdnet.com.au:80\/hackers-accidentally-give-microsoft-their-code-339305548.htm?\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <em><a href=\"http:\/\/www.zdnet.com.au\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZDNet Australia<\/a><\/em>.<\/p>\n<p><a href=\"http:\/\/www.microsoft.com\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-107295\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/microsoft_logo_old-3.jpg?resize=150%2C25&#038;ssl=1\" alt=\"\" width=\"150\" height=\"25\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/microsoft_logo_old-3.jpg?resize=150%2C25&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/microsoft_logo_old-3.jpg?resize=75%2C12&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/microsoft_logo_old-3.jpg?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>According to Heckman, when the hacker&#8217;s system crashes in Windows, as with all typical Windows crashes, the user would be prompted to send the error details \u2014 including the malicious code \u2014 to Microsoft. The funny thing is that many say yes Heckman told <em>ZDNet Australia<\/em>. &#8220;<em>People have sent us their virus code when they&#8217;re trying to develop their virus and they keep crashing their systems,<\/em>&#8221; Heckman said. &#8220;<em>It&#8217;s amazing how much stuff we get.<\/em>&#8221;<\/p>\n<p>At a <a href=\"https:\/\/web.archive.org\/web\/20130306121306\/http:\/\/www.microsoft.com:80\/techedonline\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Tech.Ed<\/a> 2010 conference session on hacking Heckman detailed to the delegates the top five hacking methods and the best methods for developers to avoid falling victim to them. According to Heckman, based on the number of attacks on Microsoft&#8217;s website, the company was only too familiar with what types of attacks were most popular.<\/p>\n<p><a href=\"https:\/\/hiphomeschoolmoms.com\/ultimate-black-friday-list-homeschoolers\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107297 size-medium\" title=\"Script kiddie\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Script_kiddie-1.jpg?resize=150%2C100&#038;ssl=1\" alt=\"Script kiddie\" width=\"150\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Script_kiddie-1.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Script_kiddie-1.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Script_kiddie-1.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Script_kiddie-1.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Script_kiddie-1.jpg?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Script_kiddie-1.jpg?w=1440&amp;ssl=1 1440w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>&#8220;<em>The first thing [script kiddies] do is fire off all these attacks at Microsoft.com,<\/em>&#8221; he said. &#8220;<em>On average we get attacked between 7000 and 9000 times per second at Microsoft.com,<\/em>&#8221; said the senior security architect. &#8220;<em>I think overall we&#8217;ve done pretty good, even when <a href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/MafiaBoy\" target=\"_blank\" rel=\"noopener noreferrer\">MafiaBoy<\/a> took down half the Internet, you know, Amazon and eBay and that, we didn&#8217;t go down, we were still up,<\/em>&#8221; he said.<em><br \/>\n<\/em><\/p>\n<p>Heckman told <em>ZDNet Australia <\/em>there were two reasons why the top hacking methods of <a href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Cross-site_scripting\" target=\"_blank\" rel=\"noopener noreferrer\">cross-site scripting<\/a> and <a href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/SQL_injection\" target=\"_blank\" rel=\"noopener noreferrer\">SQL injection<\/a> had not changed in the past six years. &#8220;<em>One, it tells me that the bad guys go with what they know, and two, it says the developers aren&#8217;t listening,<\/em>&#8221; he said. Heckman said that developers should consider all data input by a user as harmful until proven otherwise.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/hubshout.com\/?SQL-Injection-Attack-using-script-from-verynx.cn,-hackers-are-back&amp;AID=23\" target=\"_blank\" rel=\"noopener noreferrer\">SQL Injection Attack using script from verynx.cn, hackers are back<\/a> (hubshout.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When a hacker&#8217;s system crashes many script kiddies send the error details including the malicious code they are developing to Microsoft<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3240,2045,67,82,421,4,2044],"class_list":["post-3570","post","type-post","status-publish","format-standard","hentry","category-security","tag-3240","tag-cross-site-scripting","tag-hack","tag-microsoft","tag-msft","tag-security","tag-sql-injection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/3570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=3570"}],"version-history":[{"count":6,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/3570\/revisions"}],"predecessor-version":[{"id":132338,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/3570\/revisions\/132338"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=3570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=3570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=3570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}