CRIME FW: [Information_technology] Daily News 9/30/03

From: George Heuston (GeorgeH@private)
Date: Tue Sep 30 2003 - 13:41:56 PDT


-----Original Message-----
From: information_technology-admin@private
[mailto:information_technology-admin@private] On Behalf
Of InfraGard
Sent: Tuesday, September 30, 2003 11:11 AM
To: Information Technology
Subject: [Information_technology] Daily News 9/30/03

September 27, Washington Post - Juvenile arrested in Blaster case.
Federal
authorities announced Friday, September 26, that they have arrested a
juvenile on charges of sending out a variant of the "Blaster" worm that
hit
as many as 500,000 computers in August. The arrest was the second in the
United States that targeted authors of altered versions of the Blaster
worm,
which led infected computers on an e-mail attack against Microsoft Web
sites. The author of the Blaster worm itself has not been identified. In
a
statement John McKay, U.S. attorney for the Western District of
Washington,
said that "computer hackers need to understand that they will be pursued
and
held accountable for malicious activity, whether they be adults or
juveniles." McKay also said his team is continuing its hunt for others
involved with Blaster and its variants. Source:
http://www.washingtonpost.com/wp-dyn/articles/A7486-2003Sep26.html?refer
rer=
email

September 27, Reuters - IE holes lead to AIM, dial-up attacks. Security
holes in Microsoft's Internet Explorer (IE) are being exploited by
hackers,
computer experts cautioned Friday, September 26. Microsoft released a
patch
for the original hole about a month ago, said Stephen Toulouse of
Microsoft,
but is now looking into variations of that hole that the patch does not
fix.
A hole in IE can hijack a running AOL Instant Messenger (AIM) account,
change the password and send a message to the buddies list with a link
to
the malicious Website. Another attack sends computer users to Websites
that
change the computer's dial-up settings to an expensive long-distance
phone
number, said security researcher Richard Smith. Victims are charged as
much
as $5 a minute instead of paying their normal Internet service fee, he
said.
A third attack steers computer users to pay-per-click Websites, where
the
spam marketer gets paid each time someone goes to the Website, said Drew
Copley of eEye Digital Security. Computer users should apply patches,
follow
the workaround instructions, or change their settings in IE to prompt
them
before a Web site downloads programs that can execute on their own,
Toulouse
said. Source: http://news.com.com/2100-7349_3-5083234.html


AlertCon 1 out of 4
https://gtoc.iss.net

Security Focus ThreatCon: 1 out of 4
http://analyzer.securityfocus.com/

Current Virus and Port Attacks
Virus: #1 Virus in the United States: WORM_LOVGATE.G
Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
Tracking Center
[Infected Computers, North America, Past 24 hours, #1 in United States]

Top 10 Target Ports 135 (epmap), 445 (microsoft?ds), 1434 (ms?sql?m),
137
(netbios?ns), 80 (www), 25 (smtp), 4662 (eDonkey2000), 4899 (radmin),
139
(netbios?ssn), 17300
(Kuang2TheVirus)

_______________________________________________
Information_technology mailing list
Information_technology@listserv



This archive was generated by hypermail 2b30 : Tue Sep 30 2003 - 14:09:41 PDT