CRIME FW: [Cyber_threats] Daily News 11/13/02

From: George Heuston (GeorgeH@private)
Date: Wed Nov 13 2002 - 10:30:47 PST

  • Next message: George Heuston: "CRIME FW: Trojan in libpcap and tcpdump"

    -----Original Message-----
    From: NIPC Watch [mailto:nipcwatch@private] 
    Sent: Wednesday, November 13, 2002 7:27 AM
    To: Cyber Threats
    Subject: [Cyber_threats] Daily News 11/13/02
    
    November 12, Associated Press
    U.S. cracks case of military network hacker. Federal authorities have
    cracked the case of an international hacker who broke into roughly 100
    unclassified U.S. military networks over the past year, officials said.
    Officials familiar with the investigation declined to identify the
    hacker, a
    British citizen, but said he could be indicted as early as Tuesday in
    federal courts in northern Virginia and New Jersey. Those U.S. court
    jurisdictions include the Pentagon in Virginia and Picatinny Arsenal in
    New
    Jersey, one of the Army's premier research facilities. The officials,
    who
    spoke on condition of anonymity, declined to say whether this person was
    already in custody, but one official said investigators consider the
    break-ins the work of a professional rather than a recreational hacker.
    Source.
    http://www.cnn.com/2002/US/11/12/hacker.investigation.ap/index.html
    
    November 13, The Globe and Mail
    The chief suspect in what U.S. authorities are calling the largest ever
    successful hacking effort against American military networks is an
    unemployed British computer administrator who worked from his home
    computer.
    Mr. McKinnon downloaded sensitive, but not classified, information about
    subjects that included Navy shipbuilding and munitions, investigators
    said.
    But there was no evidence that he offered the information to foreign
    governments or terrorist organizations, Mr. McNulty said. The military
    hacking took place over 12 months, starting in March 2001, and
    investigators
    said they detected the intrusions as early as June. But they did not
    issue
    warnings internally about these hacking methods until March 2002, when a
    Navy memo urgently instructed computer experts to search their systems
    for
    the specific hacker tools Mr. McKinnon allegedly used. Source:
    http://www.globeandmail.com/servlet/ArticleNews/front/RTGAM/20021113/wha
    ck11
    13/Front/homeBN/breakingnews
    
    Virus: #1 Virus in USA: WORM_KLEZ.H, (aka W32/Klez-G, I-Worm.Klez.h,
    I-Worm.W32/Klez.gen@MM, W32.Klez.H@mm)
    Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
    Tracking Center [Infected Computers, North America, Past 24 hours, #1 in
    United States]
    
    Top 10 Target Ports
    137(netbios-ns); 80(http); 1433(ms-sql-s); 21(ftp); 443(https); 4665
    (eDonkey P2P Software); 139 (netbios-ssn); 25 (smtp); 445 (microsoft-ds)
    27374 (asp);
    Source: http://isc.incidents.org/top10.html; Internet Storm Center
    
    
    
    _______________________________________________
    Cyber_Threats mailing list
    Cyber_Threats@listserv
    http://listserv.infragard.org/mailman/listinfo/cyber_threats
    



    This archive was generated by hypermail 2b30 : Wed Nov 13 2002 - 11:11:45 PST