[iwar] * Denial-Of-Service Attacks May Rise (fwd)


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Wed, 18 Oct 2000 22:51:14 -0700 (PDT)


fc  Wed Oct 18 22:52:15 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Wed, 18 Oct 2000 22:52:15 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Thu Oct 19 05:52:09 2000)
X-From_: sentto-279987-552-971934676-fc=all.net@returns.onelist.com  Thu Oct 19 00:51:17 2000
Received: from c3.egroups.com (c3.egroups.com [208.50.99.225]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id AAA19448 for ; Thu, 19 Oct 2000 00:51:17 -0500
X-eGroups-Return: sentto-279987-552-971934676-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by c3.egroups.com with NNFMP; 19 Oct 2000 05:51:17 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-6_1_0); 19 Oct 2000 05:51:16 -0000
Received: (qmail 12500 invoked from network); 19 Oct 2000 05:51:15 -0000
Received: from unknown (10.1.10.27) by m2.onelist.org with QMQP; 19 Oct 2000 05:51:15 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta2 with SMTP; 19 Oct 2000 05:51:15 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id WAA10582 for iwar@onelist.com; Wed, 18 Oct 2000 22:51:14 -0700
Message-Id: <200010190551.WAA10582@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Wed, 18 Oct 2000 22:51:14 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] * Denial-Of-Service Attacks May Rise (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Per the message sent by cybercrime-alerts:

 Denial-Of-Service Attacks May Rise 

GEORGE V. HULME - InternetWeek  
Copyright 2000 CMP Media Inc. 
October 16, 2000 

Internet Security Systems Inc. last week said more than 800 computers are=
 subject to denial-of-service attacks. 

The computers are infected with the SubSeven DEFCON8 2.1 back door Trojan=
 horse. The Trojan has been distributed on Usenet newsgroups with various=
 file names, including SexxxyMovie.mpeg.exe. According to the ISS research=
 team, known as X-Force, hackers are using infected systems to test new=
 distributed denial-of-service attack methods and strategies. 

This program points to the growing use of back doors and distributed=
 denial- of-service attacks by hackers. Once a system is infected, DEFCON8=
 2.1 joins an Internet Relay Chat (IRC) channel on irc.icq.com to notify=
 the attacker that a machine has been infected. The password for the=
 distributed server is " acidphreak," according to X-Force. 

"Over the past couple of months, we have noticed a dramatic increase in the=
 number of zombies waking on our systems," said a security manager at a=
 large company who wished to remain anonymous. "Based on the activity we've=
 seen here, I'm certain we're on the cusp of seeing another wave of=
 attacks." 

Chris Rouland, director of X-Force, agreed that more attacks are imminent,=
 adding that distributed denial-of-service tool developers are becoming=
 more sophisticated. "They've developed this so that it can't be detected=
 by antivirus software. 

George Hulme writes for sister publication InformationWeek. 

http://www.internetwk.com/ 

Copyright 2000 CMP Media Inc.  

-------------------------- eGroups Sponsor -------------------------~-~>
Get FREE long-distance phone calls on Tellme!
Dial 1-800-555-TELL, say "Phone Booth"
http://click.egroups.com/1/9816/14/_/595019/_/971934676/
---------------------------------------------------------------------_->

------------------
http://all.net/