Please find below an example of UPI's continuing coverage of
cybersecurity and related issues. I hope you find it interesting. You
may link to it on the web here:

http://www.upi.com/view.cfm?StoryID=20050501-062731-3623r

A shorter version of this piece appeared on A6 of Monday's edition of
the Washington Times. UPI Subscribers received this story when it was
first published yesterday evening.

If you have any comments or questions about this piece, need any more
information about UPI products and services, or want to stop receiving
these alerts, please get in touch.

Thank you,

Shaun Waterman
UPI Homeland and National Security Editor
E-mail: [EMAIL PROTECTED] 
Tel: 202 898 8081

Internet survey highlights threat of 'pharming'
By Shaun Waterman
UPI Homeland and National Security Editor

WASHINGTON, May 1 (UPI) -- The nation's largest information security
institute published its quarterly review of Internet threats Monday,
highlighting the Web's growing vulnerability to a new form of online
fraud -- "pharming," where Internet users are diverted to a different
site than the one they typed into their browser.

The data also reveal that, for the first time, some security and
anti-virus software is vulnerable to hackers, creating a dangerous
high-level backdoor into users' systems.

The SANS Institute, the United States' largest cooperative research
effort on information security, publishes its list of the top 20
Internet security vulnerabilities every three months. The survey lists
the 10 most commonly exploited groups of weaknesses in each of the two
major computer operating systems: Windows and UNIX/Linux.

The majority of the thousands of viruses, worms and other Internet
threats identified by the institute's researchers take advantage of one
or more of these weaknesses, SANS Institute Director of Research Alan
Paller told United Press International.

"It's a way of flagging up the vulnerabilities that need to be patched"
both by individuals users and company network security executives, said
Paller, adding that the institute did not list vulnerabilities unless
there was a patch available.

"What's the point?" he asked rhetorically. "You're just letting the bad
guys see there's a problem with no fix."

Paller noted that, to make the list, the vulnerability had to be real,
not just potential, and had to affect large numbers of users. "We don't
list anything unless the code to exploit it is out there," for instance
in one of the chat rooms or bulletin boards used by hackers, he said.

The data for the first three months of 2005 -- drawn from thousands of
security reports compiled by the institute -- reveal a number of trends,
Paller said.

"Two years ago, this list was dominated completely by weaknesses in
operating systems," said Paller, referring to the underlying programs
that run PCs and servers, springing to life when the computer is
switched on. "Now we're seeing more and more vulnerabilities in
applications being exploited."

Applications are the programs that enable users to perform specific
tasks, such as word processing, e-mail or creating spreadsheets, and the
vulnerabilities in their code are more dangerous, according to Paller,
because -- unlike operating system software -- they cannot be set to
update themselves automatically with new security patches.

"Users think they're protected because they've set their operating
systems to automatically update," he said. "But vulnerabilities in
applications can just as easily be exploited."

Another new development, Paller added, was that, for the first time, the
list includes vulnerabilities being exploited in some security and
anti-virus software.

"The problem here," Paller pointed out, "is that such programs operate
with very high level privileges" within computing systems. "If a hacker
gets control of one of these programs, he has much better access" than
he would get by hacking in through, say, a word-processing program.

Paller also said that the data highlighted a new form of security
threat, known as "pharming," where Internet users are forcibly diverted
to sites chosen by the hacker.

Experts say pharming could be used to clandestinely redirect those
visiting online banking or other financial services Web sites to fake
pages, where their personal information could be harvested by identity
thieves.

In this sense, pharming resembles phishing, in which fake e-mail
messages are sent to Internet users. The messages, which appear to come
from banks or commercial sites such as Amazon.com or eBay, urge the
recipient to visit the site to update or confirm personal information.
But the link the message offers actually takes anyone who clicks on it
to a fake site, operated by criminals, which steals the information the
user enters.

The victims' identity, password and other data can then be used to
conduct bogus transactions, or to steal the contents of bank accounts.

But in pharming, Internet users are diverted without receiving a message
or clicking on a bogus link.

"The reason this is so bad," said Paller, "is that users arrive at the
site by typing in the correct address to the browser. ... They are
likely to be very confident that they are in the right place; very
confident and very wrong."

There are several ways such attacks are carried out, but they all rely
on hijacking the link between a computer's Web browser and the Internet
site the user wants to visit.

When users type an Internet site address into a Web browser, the browser
converts those letters into a numerical code, known as an IP address.
This number directs the Web browser to the site. 

IP addresses are stored on large network computers called domain name
service servers. But most browser programs looking for an IP address
will check the computer's records, because if the user has visited the
site before, the IP address will be on file.

Experts say malicious programs can infest a computer and change the IP
addresses it has stored, so that when a user types in an Internet
address, the browser will find its way to a site chosen by the malicious
program's author, rather than the one the user wanted to visit.

But these kinds of malicious programs, known as "malware," affect only
one computer at a time. The phenomenon known as DNS poisoning can affect
thousands of users at once.

Poisoned DNS servers mistranslate Internet addresses and cause users to
be redirected to a site other than the one they chose.

"I liken it to changing the traffic signs on the Internet," Gerhard
Eschelbeck, chief technology officer of computer security firm Qualys,
told UPI. "You change the signs, you misdirect the traffic."

Qualys is one of the four sources for the SANS top 20, and the company
offers a free scan to locate any of them.

In March, the SANS Internet Storm Center, an early warning monitoring
center that scans the Internet for new threats, monitored a DNS
poisoning incident that affected as many as 25,000 users.

"Users were re-directed to a generic-looking search page," said Johannes
Ullrich, the storm center's chief research officer. The page uploaded
various spyware and adware programs to the users' computers.

Ullrich said that the attack took place against a single, poorly
maintained DNS server, but exploited a common vulnerability.

The attack was possible "because of a fairly specific, but fairly common
configuration" used by the attacked server, he said.

Fixing such vulnerabilities, he added "is technically straightforward,
but can be politically difficult" because the company running the
vulnerable server is often unaffected by the attack.

"You have to get the attention of your (Internet service provider),"
said Ullrich, adding that there was no legal obligation on the company
to fix the vulnerability and that some were unwilling to endure the
downtime that would be required to patch their systems.

Although DNS poisoning is technically sophisticated, Paller warned that
it is not beyond the skill of professional, criminal hackers.
Nonetheless, Ullrich added that he was unaware of any pharming attacks
which had been carried out to harvest personal financial information to
facilitate fraud.

--
Copyright (c) 2001-2005 United Press International



------------------------ Yahoo! Groups Sponsor --------------------~--> 
DonorsChoose. A simple way to provide underprivileged children resources 
often lacking in public schools. Fund a student project in NYC/NC today!
http://us.click.yahoo.com/EHLuJD/.WnJAA/cUmLAA/TySplB/TM
--------------------------------------------------------------------~-> 

--------------------------
Want to discuss this topic?  Head on over to our discussion list, [EMAIL 
PROTECTED]
--------------------------
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: osint@yahoogroups.com
  Subscribe:    [EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 



Reply via email to