Return-Path: <sentto-279987-4252-1010524653-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 08 Jan 2002 13:20:08 -0800 (PST) Received: (qmail 17289 invoked by uid 510); 8 Jan 2002 21:17:54 -0000 Received: from n9.groups.yahoo.com (216.115.96.59) by all.net with SMTP; 8 Jan 2002 21:17:54 -0000 X-eGroups-Return: sentto-279987-4252-1010524653-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.189] by n9.groups.yahoo.com with NNFMP; 08 Jan 2002 21:17:33 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_1_3); 8 Jan 2002 21:17:33 -0000 Received: (qmail 79049 invoked from network); 8 Jan 2002 21:17:33 -0000 Received: from unknown (216.115.97.167) by m3.grp.snv.yahoo.com with QMQP; 8 Jan 2002 21:17:33 -0000 Received: from unknown (HELO red.all.net) (12.232.125.69) by mta1.grp.snv.yahoo.com with SMTP; 8 Jan 2002 21:17:33 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g08LI7p11244 for iwar@onelist.com; Tue, 8 Jan 2002 13:18:07 -0800 Message-Id: <200201082118.g08LI7p11244@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 8 Jan 2002 13:18:07 -0800 (PST) Subject: [iwar] [fc:Hacker.group.vandalizes.RP.solons'.websites] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Hacker group vandalizes RP solons' websites By Erwin Lemuel G. Oliva, INQ7.net, 1/8/2002 <a href="http://www.inq7.net/inf/2002/jan/09/inf_1-1.htm">http://www.inq7.net/inf/2002/jan/09/inf_1-1.htm> HACKER group Team Asian Pride struck again, this time vandalizing the websites of three Philippine senators, a government office, and a corporate website of a local Internet service provider, hosting the said websites. The group claimed to have defaced last Friday websites hosted by Internet service provider Easynet Internet Services Inc., a Makati-based Easynet Internet Services established in 1995. It currently offers Internet access to individual and corporate clients in the Philippines, apart from its web hosting services. It has around 400 subscribers. Those allegedly hit were the senate websites of Senators Ernesto Maceda, Ernesto Herrera, and Blas Ople, the website of the Manila Economic and Cultural (MECO) office website, and the corporate, chat, and support site of Easynet. In an interview, an Easynet representative claimed that only its corporate website was affected by the attack. "Only one website was hit, our corporate website. The website of our clients were not touched," Bill Tato, system support engineer of Easynet Internet, said, referring to the senators and the Senate website. In an e-mail sent to INQ7.net, Team Asian Pride claimed to have defaced the following: www.sen-maceda.easy.net.ph, www.senate.easy.net.ph, www.sen-ople.easy.net.ph, www.sen-herrera.easy.net.ph, www.meco.easy.net.ph, www.easy.net.ph, chat.easy.net.ph, and support.easy.net.ph. A copy of the message placed on the defaced websites can be viewed at www.safemode.org/mirror/2002/01/04/www.sen-maceda.easy.net.ph. To date, the senators' and the Senate website have been fixed, except for the MECO website and the chat.easy.net.ph. In an e-mail, Team Asian Pride member "Glitch 12" claimed that the server hosting the websites has not been damaged. "We didn't mean no harm. I just want to show the system is vulnerable," the hacker said. Tato confirmed Team Asian Pride's statement. He said that the hacker group only "disabled the website's source code" then modified the home page with their message. "Our system administrator said that no files were deleted. We also have closed all 'open' ports which the hackers use to enter our system," Tato said. Team Asian Pride claims members were able to slip through Easynet's FTP (file transfer protocol) ports. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Tiny Wireless Camera under $80! Order Now! FREE VCR Commander! Click Here - Only 1 Day Left! http://us.click.yahoo.com/WoOlbB/7.PDAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:02 PST