[iwar] [fc:Hacker.group.vandalizes.RP.solons'.websites]

From: Fred Cohen (fc@all.net)
Date: 2002-01-08 13:18:07


Return-Path: <sentto-279987-4252-1010524653-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 08 Jan 2002 13:20:08 -0800 (PST)
Received: (qmail 17289 invoked by uid 510); 8 Jan 2002 21:17:54 -0000
Received: from n9.groups.yahoo.com (216.115.96.59) by all.net with SMTP; 8 Jan 2002 21:17:54 -0000
X-eGroups-Return: sentto-279987-4252-1010524653-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.189] by n9.groups.yahoo.com with NNFMP; 08 Jan 2002 21:17:33 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 8 Jan 2002 21:17:33 -0000
Received: (qmail 79049 invoked from network); 8 Jan 2002 21:17:33 -0000
Received: from unknown (216.115.97.167) by m3.grp.snv.yahoo.com with QMQP; 8 Jan 2002 21:17:33 -0000
Received: from unknown (HELO red.all.net) (12.232.125.69) by mta1.grp.snv.yahoo.com with SMTP; 8 Jan 2002 21:17:33 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g08LI7p11244 for iwar@onelist.com; Tue, 8 Jan 2002 13:18:07 -0800
Message-Id: <200201082118.g08LI7p11244@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 8 Jan 2002 13:18:07 -0800 (PST)
Subject: [iwar] [fc:Hacker.group.vandalizes.RP.solons'.websites]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Hacker group vandalizes RP solons' websites 
By Erwin Lemuel G. Oliva, INQ7.net, 1/8/2002
<a href="http://www.inq7.net/inf/2002/jan/09/inf_1-1.htm">http://www.inq7.net/inf/2002/jan/09/inf_1-1.htm>

HACKER group Team Asian Pride struck again, this time vandalizing the
websites of three Philippine senators, a government office, and a
corporate website of a local Internet service provider, hosting the said
websites. 
The group claimed to have defaced last Friday websites hosted by
Internet service provider Easynet Internet Services Inc., a Makati-based
Easynet Internet Services established in 1995. It currently offers
Internet access to individual and corporate clients in the Philippines,
apart from its web hosting services. It has around 400 subscribers. 
Those allegedly hit were the senate websites of Senators Ernesto Maceda,
Ernesto Herrera, and Blas Ople, the website of the Manila Economic and
Cultural (MECO) office website, and the corporate, chat, and support
site of Easynet. 
In an interview, an Easynet representative claimed that only its
corporate website was affected by the attack. 
"Only one website was hit, our corporate website. The website of our
clients were not touched," Bill Tato, system support engineer of Easynet
Internet, said, referring to the senators and the Senate website. 
In an e-mail sent to INQ7.net, Team Asian Pride claimed to have defaced
the following: www.sen-maceda.easy.net.ph, www.senate.easy.net.ph,
www.sen-ople.easy.net.ph, www.sen-herrera.easy.net.ph,
www.meco.easy.net.ph, www.easy.net.ph, chat.easy.net.ph, and
support.easy.net.ph. 
A copy of the message placed on the defaced websites can be viewed at
www.safemode.org/mirror/2002/01/04/www.sen-maceda.easy.net.ph. 
To date, the senators' and the Senate website have been fixed, except
for the MECO website and the chat.easy.net.ph. 
In an e-mail, Team Asian Pride member "Glitch 12" claimed that the
server hosting the websites has not been damaged. 
"We didn't mean no harm. I just want to show the system is vulnerable,"
the hacker said. 
Tato confirmed Team Asian Pride's statement. He said that the hacker
group only "disabled the website's source code" then modified the home
page with their message. 
"Our system administrator said that no files were deleted. We also have
closed all 'open' ports which the hackers use to enter our system," Tato
said. 
Team Asian Pride claims members were able to slip through Easynet's FTP
(file transfer protocol) ports.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Tiny Wireless Camera under $80!
Order Now! FREE VCR Commander!
Click Here - Only 1 Day Left!
http://us.click.yahoo.com/WoOlbB/7.PDAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:02 PST