Return-Path: <sentto-279987-4795-1023762011-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 10 Jun 2002 19:24:16 -0700 (PDT) Received: (qmail 2580 invoked by uid 510); 11 Jun 2002 02:20:27 -0000 Received: from n30.grp.scd.yahoo.com (66.218.66.87) by all.net with SMTP; 11 Jun 2002 02:20:27 -0000 X-eGroups-Return: sentto-279987-4795-1023762011-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.97] by n30.grp.scd.yahoo.com with NNFMP; 11 Jun 2002 02:20:11 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_2); 11 Jun 2002 02:20:11 -0000 Received: (qmail 33753 invoked from network); 11 Jun 2002 02:20:11 -0000 Received: from unknown (66.218.66.216) by m14.grp.scd.yahoo.com with QMQP; 11 Jun 2002 02:20:11 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 11 Jun 2002 02:20:10 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g5B2NWL03088 for iwar@onelist.com; Mon, 10 Jun 2002 19:23:32 -0700 Message-Id: <200206110223.g5B2NWL03088@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 10 Jun 2002 19:23:32 -0700 (PDT) Subject: [iwar] [fc:Hacker.Gurus.Recruit.Unsuspecting.Youth] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: Hacker Gurus Recruit Unsuspecting Youth Ottawa Citizen, 6/6/02 http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8262 Sophisticated online "mentors" are helping unsuspecting young people cause serious damage to personal computers, says an RCMP report. Hackers: a Canadian Police Perspective, says hacking gurus are taking advantage of curious young people, swaying them to try their hand at hacking and virus-writing. Mentors are distributing virus-writing and hacking software on more than 30,000 Web sites. But the report warns that the most dangerous aspect is the potential for a mentor to use inexperienced Internet users to accomplish political or terrorist-minded goals. "The novice hackers may gather information for individuals with malicious intent, for example to blackmail, or to profit financially or politically. The motivations of Internet mentors are largely unknown to Canadian police at this time," says the report. The most famous example of a young Internet wannabe hacker using a mentor's tool kit is Mafiaboy, a Montreal teen who crashed numerous high-profile Web sites using a mentor's malicious software. There are likely more Mafiaboy kid hackers out there, the report says. Although there's little evidence that shows young hackers are being harnessed by terrorists and organized crime, it's only a matter of time, the report says. The online software, or tool-kits, allow people to write malicious code almost as easily as creating a Microsoft Word document. Hackers are using the software to write new variants of viruses, such as Klez or Code Red, or hack into a computer network without realizing how much damage their actions may actually cause. "It's like mischief by a kid who sets a small fire and doesn't realize he is going to burn the whole house down," said Sgt. Paul Poloz, a member of the RCMP's high-tech crime forensics unit. "He tries it and all of a sudden, boom, the whole network has been brought down." Computer viruses cost global business more than $13 billion U.S. in 2001, according to the economic analysts Computer Economics of Carlsbad, California. Hacking and virus-writing has been made popular in books and films such as The Matrix, Hackers and Swordfish. Many teens, looking to mimic what they see in popular culture, join underground hacking groups and quickly realize a mentor's toolkits are the easiest way to break into the world of hacking. "Mafiaboy downloaded software right off the Internet without really understanding the capabilities he had at his fingertips," said Dan Verton, author of The Hacker Diaries: Confessions of Teenage Hackers. "That was a software program that was written by a much more sophisticated hacker based in Germany." The RCMP's report says "unsophisticated or novice hackers" often lack a sense of responsibility. "They are unaware of the capabilities of the hacker tools they use, unaware of the implications of their hacking or unconcerned about the consequences of their actions." "You could take the analogy of the big-time drug dealer that gives his cocaine and other things to the young offender," Sgt. Poloz said. "You've got the hacker genius who gives his stuff to the younger kids, and if the kids get caught, there are not a lot of repercussions." Mr. Verton said almost all of the 14 hackers profiled in his book were introduced to the world of hacking by a mentor. "I think it is becoming more and more of a problem," he said. "The Internet is the biggest library in the world. You can spend the better part of a year sifting through all of the hacker information that you can find, including freely available downloadable tools." Michael Murphy, Canadian general manager of the anti-virus and Internet security firm Symantec Corp., said so far computer users have been very "lucky" because Internet viruses have not lived up to their full, damaging potential. Before long, virus writers will be able to merge the worst qualities of viruses such as Nimda, Code Red, Melissa and the Love Bug to form a franken-virus capable of damaging computer hard drives and distributing mass amounts of personal information to various sources. "If you took the most malicious components (of each virus out there) then you are looking at a threat that would be very severe in its damage," he said. In a bid to address some of these issues, the federal government announced last month it will soon introduce new legislation to attack the problem of cybercrime. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Save 30% on Web addresses! Get with the times, get a web site. Share information, pictures, your hobby, or start a business. Great names are still available- get yours before someone else does! http://us.click.yahoo.com/UBc4BA/nFGEAA/Zr0HAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT