Clock Forwarding HAC
e-risk FAQ
*. Why is mi2g software talking about Clock forwarding "HAC"?
There have been two serious incidents and we would like to warn the world
community about not being prepared for such an eventuality. Both Y2k compliant
and non-compliant systems exhibit varying degrees of vulnerability.
*. Just what is meant by "Hacker Activated Code" and how does
it work?
Hacker Activated Code (HAC) means native / machine code that
is compiled for a specific architecture and is activated remotely through
a signal extraneous to the network.
*. Have you found and isolated this code?
Yes, mi2g software has found two customised end-of-cycle components
that were configured for specific IP addresses on the victim's networks. They
appear to have run once only and they no longer execute the entire sequence
contained in the confidential log files of the infected servers within the
two major victims in October.
*. How far has this thing spread now?
mi2g software has had only two instances.
*. Are you dealing with more than one version?
Yes, the mi2g SIPS engineers are dealing with two distinct end-of-cycle
versions. They are still searching for start-of-cycle codes.
*. Have you taken any other action other than contacting CERT?
Yes, the regulatory authorities in the appropriate jurisdictions have been
informed with the consent and co-operation of the clients involved, whilst
respecting confidentiality and sensitivity to adverse share price movement
in the event of naming specifics.
*. Do you have other information available on this tojan/malicous code?
It appears to be a one-time execution, IP address specific, native code that
forwards the clock of the 80x86 system on which it runs, whilst disabling
any synchronisation protocol with a Central Time Server. It has brought down
all Y2k non-compliant computers/applications on the network.
*. What is the origin of this HAC? Where did the HAC come from?
The two main geographic areas that the victim departments trade with are
Eastern Europe and Scandinavia.
*. How much of the problem came from the HAC?
mi2g software is still trying to identify how much of a threat the
start-of-cycle code is. How much has the code achieved on its own and what
was achieved by unauthorised network accessors in parallel.
*. The use of this term "one-time Hacker Activated Code" means
what exactly?
It executes its payload once and then does not execute.