-----Original Message----- From: NIPC Watch [mailto:nipc.watch@private] Sent: Monday, August 20, 2001 8:34 AM To: daily@private Subject: NIPC Watch Daily Rerport 20 August Significant Changes and Assessment - No significant changes Private Sector - A team of researchers from the University of California at Berkeley have revealed two weaknesses in Secure Shell (SSH) implementations that allow an eavesdropper to learn the exact length of a user's password by observing the rhythm of their keystrokes. By using advanced statistical techniques on timing information collected over the network, researchers also found that the eavesdropper can learn significant information about what users type in SSH sessions. SSH is designed to provide a secure channel between two hosts, and strong authentication of both the remote host and user. A paper entitled "Timing Analysis of Keystrokes and Timing Attacks on SSH," shows that the commonly used system has serious weaknesses, and may give users a false sense of security. (Source: SecurityFocus.com, 17 August) Computer security company @stake, Inc., warned that Personal Digital Assistants (PDA) are increasingly vulnerable to hacker attacks and should not be trusted to store critical or confidential information. According to the company, data in the PDAs could be easily compromised, notably through password theft, and that the devices themselves could be hijacked to spread viruses after being synchronized over networks. He stated that PDAs were being deployed by corporations and government bodies such as the U.S. Navy for security?related applications, including one?time password generation, storage of medical records, and confidential inventory tracking. The added functionality of wireless technologies such as infrared and radio frequency links boosted the threat of compromise. (Source: Reuters, 17 August) International - The Seoul Metropolitan Policy Agency sought an arrest warrant for a researcher at a local university on charges of obtaining money by illegally manipulating stock prices using hacked account numbers and passwords of customers trading with a security company. The agency said it has requested an arrest warrant for a 29?year?old male, identified only by his last name Kang, who gained 43 million won (U.S.$33,500) through such illegal means. Kang developed his own hacking program using loopholes in the security system for cyber stock trading at a securities company in order to get the account numbers and passwords of some 200 customers. (Source: Korea Herald, 18 August) According to a Canadian law enforcement report, organized gangs from Asia and Eastern Europe operating in Canada are increasingly turning to cybercrime and could devastate the computer?based assets of companies across the country police said. Criminal Intelligence Service Canada's (CISC) annual report on organized crime said it was only a matter of time before police discovered criminal gangs were using professionals to hack into computer systems. "Organized attacks against computer systems directed by profit?motivated groups could have a devastating impact on the computer?based assets of Canadian interests," CISC said. "Law enforcement is faced with many new challenges, notably building the expertise and the necessary tools required to effectively combat cybercrimes." (Source: Reuters, 17 August) The National Intelligence Service (NIS) in Seoul, South Korea, will draw up a set of countermeasures against possible computer viruses such as "Code Red" that recently damaged the government's computer system, an NIS spokesperson said. The NIS will classify the dangers posed by computer "worms" according to the scale of damage and then set establish safeguards in stages. The agency will form a joint organization for prevention and recovery of damage along with the Ministry of Information and Communication, computer vaccine companies, and institutions. The NIS said some 36,000 computers were infected by Code Red including those belonging to eight central administration agencies, six local governments, 33 government affiliated agencies and 951 education institutions. The NIS noted that they recovered all damaged information between 7-9 August and that the computer viruses are likely to continue to appear. (Source: Seoul Yonhap, 18 August) The United Arab Emirates (UAE), striving to become the information technology center for the area, has created the Dubai Internet City (DIC), a free trade zone designed to lure international and regional technology firms to the UAE. The $250 million project is the latest brainchild of Dubai's Crown Prince Sheikh Mohammed bin Rashid al?Maktoum. The International Data Corporation describes the Middle East as one of the world's fastest growing IT markets, expanding at around 20% a year despite a global economic slowdown. Microsoft, Intel and Compaq are moving their regional headquarters and projects to the Dubai's DIC. (Source: Reuters, 20 August) Military - In a presentation by the U.S. Naval Research Laboratory, a researcher described a technology known as "Onion Routing," which preserves anonymity by wrapping the identity of users in onion?like layers. "Public networks are vulnerable to traffic analysis. Packet headers identify recipients, and packet routes can be tracked," he said. "Even encrypted data exposes the identity of the communicating parties." No matter if or how you obscure the contents of the message, your Internet address and the address of the person or Web site with whom you are communicating is still available to be seen by someone snooping your e?mail or Web?browsing habits. (Source: Wired News, 17 August) The DoD has officially eased restrictions on collaborative software tools, but all products still must prove capable of sharing data with the Defense Collaboration Tool Suite. In a memo released in early August by the DoD chief information officer, the Joint Staff, the Defense Information Systems Agency, and Defense Intelligence Agency, the DoD officially backed off earlier guidance mandating use of the Defense Collaboration Tool Suite, which is made up of Microsoft Corp.'s NetMeeting and Sun Microsystems Inc.'s SunForum. Collaboration software enables geographically separated users to share documents, slides and applications online and is at the forefront of the military's transformation efforts. ( Source: Federal Computer Week, 17 August) Government - The first group of cyberterrorism students reporting for "duty" this week at the University of Tulsa pulls together an eclectic mix of computer talent. The 14 students were hand?picked as part of the University's $5 million federally funded program to conduct cyberterrorism research and to help develop "soldiers" for a national "cybercorps." The university was designated as a Center for Information Security by the National Security Agency (NSA). The NSA has designated 14 such centers at public and private schools across the U.S., including Carnegie Mellon University, Iowa State University, Purdue University, the University of Idaho and the Naval Postgraduate School in Monterey, CA. The research will involve developing network firewalls and detection systems to protect telephone, banking and other critical communications systems connected to the Internet. (Source: Knight Ridder Tribune, 18 August) U.S. SECTOR INFORMATION: Electrical Power - NTR Telecommunications - NTR Banking and Finance - NTR Transportation - NTR Water Supply - NTR Gas and Oil Storage Distribution - NTR Government Services - NTR Emergency Services - NTR NOTE: Please understand that this is for informational purposes only and does not constitute any verification of the information contained in the report nor does this constitute endorsement by the NIPC of the FBI.
This archive was generated by hypermail 2b30 : Sun May 26 2002 - 11:24:17 PDT