-Caveat Lector-

 http://year2000.dallasnews.com/1229millen3cyber.htm


 Attack on computer systems feared

 New year provides opportunity, say officials and
 some hackers

 12/29/99
 By Allen Pusey / The Dallas Morning News

 While Y2K-wary Americans ring in the new year with
 champagne and flashlights, computer hackers are set to
 celebrate with what security experts fear will be an
 unprecedented assault on computer systems around the globe.

 The potential assault, as described by hackers and federal
 law enforcement officials, is likely to include
 cybermischief as elemental as Web site defacement or the
 planting of prank programs.

 But far more destructive actions may take place as well.
 Security experts and hackers say those bent on crippling
 computer systems have the tools to copy sensitive data or
 to destroy sophisticated programs and essential information.

 The attacks, if they occur, aren't expected to affect
 consumers and their personal computers so much as
 businesses and their computer networks. Still, average
 Americans could feel the effects if, say, their banks or
 Internet service providers were targeted.

 Even hackers are wary of the expected onslaught.

 "I don't think there is any doubt on anyone's mind that New
 Year's Eve/Day is going to be a mesh of [computer system]
 chaos," said a hacker known as "rain.forest.puppy" in an
 e-mail interview with The Dallas Morning News. The
 well-known hacker said corporate managers' failure to
 understand how vulnerable most computer networks are has
 made potential disruption "a self-fulfilled prophecy."

 "What better time to creep into a network than amidst all
 the bustle? And the fact that January 1 is a worldwide
 'landmark in time' gives people a common motivation - to
 ring in the new year," the hacker said.

 According to a variety of sources, the prospect of
 widespread hacking is made possible by the convergence of
 two relatively new developments: the ready availability of
 easy-to-use hacking tools and the increased organization of
 computer intrusion.

 The new tools, capable of penetrating even highly secure
 networks, are spawning a new generation of "push-button
 kiddies," hackers capable of doing serious damage without
 highly refined programming skills.

 Hackers such as rain.forest.puppy, who have invested years
 of effort and knowledge to decipher arcane programming
 language, are finding their complicated and innovative work
 reduced to "point-and-click" kits. Users need only download
 the kits, as they would a computer game, then choose the
 targets they wish to invade.

 Moreover, recent monitoring of computer chat rooms
 frequented by young hackers suggests that political
 organizations hoping to capitalize on Y2K anxieties have
 been distributing the point-and-click kits and recommending
 targets in an attempt to create the semblance of an
 organized worldwide assault.

 "This is the equivalent of handing out cyber-submachine
 guns to young kids and telling them to take out their
 aggressions," said Russell Fish, a Dallas-based computer
 security specialist. "This is like using a 14-year-old as a
 bag man in a drug deal. They don't know what they're doing,
 and the adults guiding them don't care."


 'Scary' tools

 Mr. Fish said he has been examining tools that are
 available over the Internet. "These things are scary. Even
 without special knowledge, a very average hacker can target
 a sophisticated network and walk right through," he said.

 Chris Klaus, CEO of Internet Security Systems Inc., agrees.
 A number of recently published intrusion techniques make
 even large-scale, sophisticated networks - such as those
 employed by government agencies, banks and large media
 companies - vulnerable, he said.

 And the growing organization of hacking is something to be
 reckoned with, he said.

 "Traditionally, hackers have been fiercely individual. But
 they are beginning to polymorph into fully blown
 organizations," he said. "Some explore for the sake of
 exploring. But some are joining in for criminal purposes or
 political reasons. It's the evolution of hacking."

 Last month, a hacker defaced several Web sites operated by
 Texas state agencies. His exploits were displayed for
 verification on a hacker Web site, www.attrition.org.

 Security specialists familiar with this hacker's vandalism
 said it was accomplished with surprisingly little
 expertise, using some of the widely available hacking tools.

 Unrefined or not, the hacker was able to penetrate and
 deface not only Texas government Web sites but also some
 associated with the Defense Contract Audit Agency, Honda of
 Korea, the National Aeronautics and Space Administration
 and an early-warning system operated by the North Atlantic
 Treaty Organization.


 Hard to predict

 Because of the wide variety of tools available to hackers,
 experts say, there is no way to predict the precise nature
 of a Y2K hacking threat. Many e-mail-borne viruses are
 well-known to systems administrators. But widespread system
 vulnerabilities, particularly those discovered in such
 widely used programs as BackOffice 2000 and Windows NT,
 have not been addressed properly by many users, even where
 program patches are available.

 "Now throw into the mix all the 'push-button kiddies' that
 can download the latest and greatest . . ." said the hacker
 known as rain.forest.puppy. "With very little resource,
 including intelligence, they can find exposed systems and
 compromise them."

 Ironically, many of the hacking tools are available on Web
 sites maintained by Internet security firms. Packet Storm
 packetstorm.securify.com for instance, is operated by
 Kroll-O'Gara Inc., a long-standing security firm with
 operations worldwide. The belief, one shared by many
 hackers, is that publishing security breaches helps create
 a more secure system.

 Once hackers get past computer system security arrangements
 -"fire.walls" - they can install programs that allow them
 to manipulate or reprogram system files. Some programs
 allow hackers to designate themselves as "system
 administrators" capable of reading and manipulating many of
 a system's most sensitive files.

 "Since there are less people around during the holidays,
 there are fewer people who might detect the intrusion,"
 said Mr. Klaus. "And because of holiday vacations, there
 are also more hackers hacking."

 Mr. Klaus said he did not expect the threat to end Sunday.
 "Hackers aren't going to hack a couple of sites and say,
 'Hey, that was fun,' then walk away."


 Vulnerability

 One Dallas-based hacker, whose hacking handle is REB,
 demonstrated the efficiency of these programs. Using
 "macros," or previously programmed files, he was able to
 breach a highly secure system within five minutes, then run
 a program that helped identify hundreds of unsecured
 machines.

 "Yes, it's easy," said Jason Ott.well, a Dallas-based
 computer security consultant, when showed a computer log of
 the hacking. "I don't think that most [computer system]
 administrators appreciate the fact that this
 'insta-hacking' can be done with such ease."

 Hacker tools are not only more widely accessible, according
 to security experts; they are also becoming more potent.

 Mr. Klaus' firm, for instance, recently warned its clients
 of "Tribe Flood Network," a technique that can jam Internet
 connections with billions of repetitions of remotely
 controlled computer traffic signals known as "pings."

 A ping is a coded electronic signal, like the ringing of a
 telephone, bounced by one remote computer off another to
 see whether the second computer is capable of answering.
 Through the use of well-known computer-intrusion devices,
 vulnerable computers can be set to ping a single target
 over and over, Mr. Klaus said.

 "It's a familiar technique that, when directed at a modem,
 can shut down access," he said. "What is new is the ability
 to set up hundreds, even a thousand of these remote signals
 set to ping flood against the same client server, filling
 up the pipe" and jamming even high-traffic Internet
 connections.

 Though they are predicting widespread intrusions, neither
 hackers nor security experts are predicting widespread
 damage to computer systems. Generally, they say, young
 hackers, particularly the "push-button kiddies," are more
 interested in establishing access than in wrecking data.


 Comprehension

 "Kids don't care about your data," said the hacker
 rain.forest.puppy. "Most likely they'll deface your Web
 site, maybe use your system as a jumping-off point to other
 systems." Only in unusual cases, he said, are they likely
 to destroy or misuse data.

 "Many kids' comprehension is beyond corporate espionage,"
 he said. " 'Precious data' is not a part of the kids' game.
 You think the kids realize they're sitting on a . . .
 database of 30,000 credit-card numbers?"

 Mr. Ott.well agrees. He thinks political or personal
 messages will be posted on most hacked sites and that
 little other damage will be done.

 The most serious hacking may occur in ways and places not
 yet imagined, he said.

 "There is talk about government and military Web sites.
 There's also banking and financial institutions and big
 media companies. A lot of these have apparently been
 mentioned.

 "But the ones I really fear [for] are the ones that are not
 being talked about."



 ©1999 The Dallas Morning News



.

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to