Return-Path: <sentto-279987-1218-989377389-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 08 May 2001 20:04:08 -0700 (PDT) Received: (qmail 2392 invoked by uid 510); 9 May 2001 02:05:06 -0000 Received: from n3.groups.yahoo.com (HELO hj.egroups.com) (216.115.96.53) by 204.181.12.215 with SMTP; 9 May 2001 02:05:06 -0000 X-eGroups-Return: sentto-279987-1218-989377389-fc=all.net@returns.onelist.com Received: from [10.1.4.54] by hj.egroups.com with NNFMP; 09 May 2001 03:03:09 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_2); 9 May 2001 03:03:08 -0000 Received: (qmail 56495 invoked from network); 9 May 2001 03:02:16 -0000 Received: from unknown (10.1.10.26) by l8.egroups.com with QMQP; 9 May 2001 03:02:16 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 9 May 2001 03:02:15 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id UAA27528 for iwar@onelist.com; Tue, 8 May 2001 20:02:15 -0700 Message-Id: <200105090302.UAA27528@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 8 May 2001 20:02:15 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Authorities investigating White House Web attack White House officials are still unsure who is responsible for a denial-of-service attack Friday on the U.S. presidential Web site. The attack caused "some degradation" of service beginning at about 8:00 a.m.Eastern time, and blocked access entirely between about 9:00 a.m. and 11:15 a.m., spokesman Jimmy Orr said Monday. The technical staff is taking measures to beef up security at the White House servers, he said. http://www.cnn.com/2001/TECH/internet/05/07/white.house.dos.idg/index.html US airman nailed for cracking 113 Korean websites A US Air Force employee is in dep trouble for, uh, avidly pursing his hobby on company time. A USAF first class airman posted at Korea's Osan Air Base has been charged with hacking 113 Korean websites. Part of the WHP defacement posse, the 24-year-old loser bragged about his conquests, and often used his office PC for hacking. Last week, Korean police caught 'R' in the act -- hacking a system while at his girlfriend's house. Included in his, uh, hackers' portfolio are 35 Korea-based venture companies. 'R' generally left in his wake a defaced homepage and a backdoor that would let him back into the cracked system at a moment's notice. Korean authorities are investigating whether 'R' obtained any classified company data during his network sojourns. http://www.securitywatch.com/newsforward/default.asp?AID=3D7429 Hackers hit two Indian sites Hackers have infiltrated two Web sites in India, disrupting a software company=92s site and leaving anti-India messages on a government Web page. It=92s unclear whether the two incidents are related. PRO-PAKISTAN HACKERS infiltrated a Web site of India=92s External Affairs Ministry and posted anti- India messages, the Press Trust of India said on Monday. http://www.msnbc.com/news/569903.asp Chinese Hackers Protest India's Missile-Defense Support? Apparently retaliating against India's support of the U.S. national missile defense plans, Chinese hackers are believed responsible for defacing a Web site belonging to India's CMC Ltd., a state-owned software company. CMC said the hackers did not cause serious damage and were not able to access any company secrets. http://www.newsbytes.com/news/01/165375.html Hackers infiltrate Infosys Web site Infosys Technologies Ltd., one of India's biggest software companies, said on Monday computer hackers had infiltrated its Web site and disrupted its banking products site. ``We realized it this afternoon. One section of the Web site, the banking unit, was hacked, '' an Infosys spokeswoman told Reuters. She said the site that was infiltrated contained information about its software products for the banking industry. http://www.siliconvalley.com/docs/news/reuters_wire/1169346l.htm Hackers Step Up Denial-of-Service Attacks - FBI Hackers have stepped up attempts to crash Web sites using distributed denial-of-service (DDoS) attacks, assaults that can disrupt access to or cripple targeted Web sites by flooding them with excess traffic, according to the FBI. In an alert posted over the weekend, the National Infrastructure Protection Center (NIPC) - the FBI's cyber-crime division - said it has witnessed ongoing attempts to conduct DDoS attacks using large user datagram protocol (UDP) packets directed at port 80, the port commonly used by Web servers to send and receive Web page information. http://www.newsbytes.com/news/01/165390.html http://www.nipc.gov/warnings/advisories/2001/01-012.htm NSA Adviser Says Cyber-Assaults On Pentagon Persist With Few Clues A series of sophisticated attempts to break into Pentagon computers has continued for more than three years, and an extensive investigation has produced "disturbingly few clues" about who is responsible, according to a member of the National Security Agency's advisory board. The NSA consultant, James Adams, says U.S. diplomats lodged a formal protest with the Russian government last year after investigators determined that the cyber attacks, which they code-named "Moonlight Maze," appear to have originated from seven Russian Internet addresses. But Russian officials replied that the telephone numbers associated with the sites were inactive and denied any prior knowledge of the attacks, according to Adams. http://washingtonpost.com/wp-dyn/articles/A51965-2001May6.html http://www.newsbytes.com/news/01/165386.html Cyber-Crime Fighter Vatis To Consult FBI Michael A. Vatis, the first head of the FBI's National Infrastructure Protection Center who recently left the agency, says the threat of cyber-terrorism against federal agencies and their employees is lethal and growing daily - despite progress by federal, state and local law enforcement officials in tracking down hackers and cyber-vandals. The center (NIPC) coordinates the cyber-terrorism fighting efforts of the federal government, including the Justice Department, the Pentagon, the CIA, the National Security Agency, the Federal Aviation Administration, the U.S. Postal Service and the General Services Administration. http://www.newsbytes.com/news/01/165399.html Sen. Bennett Plans Cyber-Security Legislation Sen. Robert Bennett, R-Utah, intends to introduce a bill that would make it easier for companies to share information about cyber-security threats away from the public eye, a source close to the planned legislation said today. Although details of the proposal remain unclear, Bennett may introduce legislation similar to a cyber-security bill introduced in the House last year by Reps. Tom Davis, R-Va., and James Moran, D-Va. That bill, the Cyber Security Information Act of 2000, would have provided a limited exemption from the Freedom of Information Act (FOIA) to companies that share information about electronic attacks and vulnerabilities with government agencies. http://www.newsbytes.com/news/01/165404.html Renegade hacker pack cleans up act 2600 Club begins mentoring young computer buffs At 3, Patrick Roanhouse got his first computer. At 7, he figured out how to construct a modem out of scrap parts. By 14, he was running around cyberspace under the alias "Anarchist" and working up all sorts of havoc. Then he met the 2600 Club. The group, which publishes a popular hacker magazine, has an almost mythical reputation. It has been investigated by the Secret Service and inspired monthly gatherings in more than 100 cities worldwide. http://chicagotribune.com/business/businessnews/article/0,2669,SAV-01050702=10,FF.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:12 PDT