[iwar] [fc:Army.Research.Web.Site.Hacked]

From: Fred Cohen (fc@all.net)
Date: 2002-07-22 20:48:31


Return-Path: <sentto-279987-5024-1027396001-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 22 Jul 2002 20:49:10 -0700 (PDT)
Received: (qmail 30366 invoked by uid 510); 23 Jul 2002 03:45:49 -0000
Received: from n31.grp.scd.yahoo.com (66.218.66.99) by all.net with SMTP; 23 Jul 2002 03:45:49 -0000
X-eGroups-Return: sentto-279987-5024-1027396001-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.198] by n31.grp.scd.yahoo.com with NNFMP; 23 Jul 2002 03:46:41 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 23 Jul 2002 03:46:40 -0000
Received: (qmail 16416 invoked from network); 23 Jul 2002 03:46:40 -0000
Received: from unknown (66.218.66.218) by m5.grp.scd.yahoo.com with QMQP; 23 Jul 2002 03:46:40 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 23 Jul 2002 03:46:40 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6N3mVK05710 for iwar@onelist.com; Mon, 22 Jul 2002 20:48:31 -0700
Message-Id: <200207230348.g6N3mVK05710@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 22 Jul 2002 20:48:31 -0700 (PDT)
Subject: [iwar] [fc:Army.Research.Web.Site.Hacked]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=1.6 required=5.0 tests=COPYRIGHT_CLAIMED,RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: *

Army Research Web Site Hacked
Date:  Monday, 22 July 2002
<a href="http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8562">http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8562>

Source:  eWeek

Story:  An attacker defaced a page on the U.S. Army Research
Laboratory's Web site Friday with a message criticizing the military
organization for supplying weapons to Israel.

The attacker, going by the handle Rivver, posted a long, profanity-laced
tirade against the Unites States government and its stance in the Middle
East, the military and India. The same attacker defaced another U.S.
Army Web site last fall.

The Army Research Lab is a collection of labs that do research on
high-tech weapons systems, survivability and information systems, among
other things. It includes the White Sands Missile Rage in New Mexico and
the NASA Langley Research Center in Virginia.

"Oh looky! US Army got owned. I was nice and calm, I left your networks
alone and in peace," the most recent defacement reads. "But no you had
to go and keep supplying [expletive] Israel with newer and badder toys
to use against kids and infants. How about this, you keep doing what
your doing and I'll keep owning your networks."

The message goes on to urge the army to "use your [expletive] toys to
free Kashmir!!! Put a choke hold on Israel," according to a copy of the
defacement archived at Zone-h.org.

Web-site defacements have become a favorite tool of so-called script
kiddies and other low-level attackers looking to draw attention to
themselves. Many defacements simply tout the attacker's skills and
denigrate other Web vandals.

However, some attackers use their defacements as a soapbox, broadcasting
their political and social views. Vandals last week defaced the USA
Today site, replacing its normal content with fake stories about a
supposed Iraqi attack on Israel and calling the Bible a hoax.

Earlier this year, a pair of attackers calling themselves the Deceptive
Duo vandalized dozens of military, government and banking sites as part
of what they called a "patriotic" mission to alert administrators to
vulnerabilities in their networks before "foreign forces" found them.

Copyright (c) 2002: Ziff Davis Media Inc. All rights reserved.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Free $5 Love Reading
Risk Free!
http://us.click.yahoo.com/NsdPZD/PfREAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT