FW: NIPC Watch Daily Rerport 20 August

From: George Heuston (georgeh@private)
Date: Mon Aug 20 2001 - 09:09:28 PDT

  • Next message: George Heuston: "FW: NIPC Daily Report, 21 August 2001"

    -----Original Message-----
    From: NIPC Watch [mailto:nipc.watch@private] 
    Sent: Monday, August 20, 2001 8:34 AM
    To: daily@private
    Subject: NIPC Watch Daily Rerport 20 August
    
    Significant Changes and Assessment  - No significant changes
    
    
    Private Sector -  A team of researchers from the University of
    California at Berkeley have revealed two weaknesses in Secure Shell
    (SSH) implementations that allow an eavesdropper to learn the exact
    length of a user's password by observing the rhythm of their
    keystrokes.  By using advanced statistical techniques on timing
    information collected over the network, researchers also found that the
    eavesdropper can learn significant information about what users type in
    SSH sessions.  SSH is designed to provide a secure channel between two
    hosts, and strong authentication of both the remote host and user.  A
    paper entitled "Timing Analysis of Keystrokes and Timing Attacks on
    SSH," shows that the commonly used system has serious weaknesses, and
    may give users a false sense of security.  (Source: SecurityFocus.com,
    17 August)
    
     Computer security company @stake, Inc., warned that Personal Digital
    Assistants (PDA) are increasingly vulnerable to hacker attacks and
    should not be trusted to store critical or confidential information.
    According to the company, data in the PDAs could be easily compromised,
    notably through password theft, and that the devices themselves could be
    hijacked to spread viruses after being synchronized over networks.  He
    stated that PDAs were being deployed by corporations and government
    bodies such as the U.S. Navy for security?related applications,
    including one?time password generation, storage of medical records, and
    confidential inventory tracking.  The added functionality of wireless
    technologies such as infrared and radio frequency links boosted the
    threat of compromise.  (Source: Reuters, 17 August)
    
    International -  The Seoul Metropolitan Policy Agency sought an arrest
    warrant for a researcher at a local university on charges of obtaining
    money by illegally manipulating stock prices using hacked account
    numbers and passwords of customers trading with a security company.  The
    agency said it has requested an arrest warrant for a 29?year?old male,
    identified only by his last name Kang, who gained 43 million won
    (U.S.$33,500) through such illegal means.  Kang developed his own
    hacking program using loopholes in the security system for cyber stock
    trading at a securities company in order to get the account numbers and
    passwords of some 200 customers. (Source: Korea Herald, 18 August)
    
     According to a Canadian law enforcement report, organized gangs from
    Asia and Eastern Europe operating in Canada are increasingly turning to
    cybercrime and could devastate the computer?based assets of companies
    across the country police said.  Criminal Intelligence Service Canada's
    (CISC) annual report on organized crime said it was only a matter of
    time before police discovered criminal gangs were using professionals to
    hack into computer systems.  "Organized attacks against computer systems
    directed by profit?motivated groups could have a devastating impact on
    the computer?based assets of Canadian interests," CISC said.  "Law
    enforcement is faced with many new challenges, notably building the
    expertise and the necessary tools required to effectively combat
    cybercrimes." (Source: Reuters, 17 August)
    
     The National Intelligence Service (NIS) in Seoul, South Korea, will
    draw up a set of countermeasures against possible computer viruses such
    as "Code Red" that recently damaged the government's computer system, an
    NIS spokesperson said.  The NIS will classify the dangers posed by
    computer "worms" according to the scale of damage and then set establish
    safeguards in stages.  The agency will form a joint organization for
    prevention and recovery of damage along with the Ministry of Information
    and Communication, computer vaccine companies, and institutions.  The
    NIS said some 36,000 computers were infected by Code Red including those
    belonging to eight central administration agencies, six local
    governments, 33 government affiliated agencies and 951 education
    institutions.  The NIS noted that they recovered all damaged information
    between 7-9 August and that the computer viruses are likely to continue
    to appear.  (Source: Seoul Yonhap, 18 August)
    
     The United Arab Emirates (UAE), striving to become the information
    technology center for the area, has created the Dubai Internet City
    (DIC), a free trade zone designed to lure international and regional
    technology firms to the UAE.  The $250 million project is the latest
    brainchild of Dubai's Crown Prince Sheikh Mohammed bin Rashid
    al?Maktoum.  The International Data Corporation describes the Middle
    East as one of the world's fastest growing IT markets, expanding at
    around 20% a year despite a global economic slowdown.  Microsoft, Intel
    and Compaq are moving their regional headquarters and projects to the
    Dubai's DIC.  (Source: Reuters, 20 August)
    
    Military -  In a presentation by the U.S. Naval Research Laboratory, a
    researcher described a technology known as "Onion Routing," which
    preserves anonymity by wrapping the identity of users in onion?like
    layers.  "Public networks are vulnerable to traffic analysis.  Packet
    headers identify recipients, and packet routes can be tracked," he
    said.  "Even encrypted data exposes the identity of the communicating
    parties."  No matter if or how you obscure the contents of the message,
    your Internet address and the address of the person or Web site with
    whom you are communicating is still available to be seen by someone
    snooping your e?mail or Web?browsing habits.  (Source: Wired News, 17
    August)
    
     The DoD has officially eased restrictions on collaborative software
    tools, but all products still must prove capable of sharing data with
    the Defense Collaboration Tool Suite.  In a memo released in early
    August by the DoD chief information officer, the Joint Staff, the
    Defense Information Systems Agency, and Defense Intelligence Agency, the
    DoD officially backed off earlier guidance mandating use of the Defense
    Collaboration Tool Suite, which is made up of Microsoft Corp.'s
    NetMeeting and Sun Microsystems Inc.'s SunForum. Collaboration software
    enables geographically separated users to share documents, slides and
    applications online and is at the forefront of the military's
    transformation efforts. ( Source: Federal Computer Week, 17 August)
    
    Government -  The first group of cyberterrorism students reporting for
    "duty" this week at the University of Tulsa pulls together an eclectic
    mix of computer talent.  The 14 students were hand?picked as part of the
    University's $5 million federally funded program to conduct
    cyberterrorism research and to help develop "soldiers" for a national
    "cybercorps."  The university was designated as a Center for Information
    Security by the National Security Agency (NSA).  The NSA has designated
    14 such centers at public and private schools across the U.S., including
    Carnegie Mellon University, Iowa State University, Purdue University,
    the University of Idaho and the Naval Postgraduate School in Monterey,
    CA.  The research will involve developing network firewalls and
    detection systems to protect telephone, banking and other critical
    communications systems connected to the Internet.  (Source:  Knight
    Ridder Tribune, 18 August)
    
    U.S. SECTOR INFORMATION:
    
    Electrical Power - NTR
    Telecommunications  - NTR
    Banking and Finance - NTR
    Transportation - NTR
    Water Supply - NTR
    Gas and Oil Storage Distribution - NTR
    Government Services - NTR
    Emergency Services - NTR
    
    NOTE: Please understand that this is for informational purposes only and
    does not constitute any verification of the information contained in the
    report nor does this constitute endorsement by the NIPC of the FBI.
    



    This archive was generated by hypermail 2b30 : Sun May 26 2002 - 11:24:17 PDT