-----Original Message----- From: information_technology-admin@private [mailto:information_technology-admin@private] On Behalf Of InfraGard Sent: Tuesday, September 30, 2003 11:11 AM To: Information Technology Subject: [Information_technology] Daily News 9/30/03 September 27, Washington Post - Juvenile arrested in Blaster case. Federal authorities announced Friday, September 26, that they have arrested a juvenile on charges of sending out a variant of the "Blaster" worm that hit as many as 500,000 computers in August. The arrest was the second in the United States that targeted authors of altered versions of the Blaster worm, which led infected computers on an e-mail attack against Microsoft Web sites. The author of the Blaster worm itself has not been identified. In a statement John McKay, U.S. attorney for the Western District of Washington, said that "computer hackers need to understand that they will be pursued and held accountable for malicious activity, whether they be adults or juveniles." McKay also said his team is continuing its hunt for others involved with Blaster and its variants. Source: http://www.washingtonpost.com/wp-dyn/articles/A7486-2003Sep26.html?refer rer= email September 27, Reuters - IE holes lead to AIM, dial-up attacks. Security holes in Microsoft's Internet Explorer (IE) are being exploited by hackers, computer experts cautioned Friday, September 26. Microsoft released a patch for the original hole about a month ago, said Stephen Toulouse of Microsoft, but is now looking into variations of that hole that the patch does not fix. A hole in IE can hijack a running AOL Instant Messenger (AIM) account, change the password and send a message to the buddies list with a link to the malicious Website. Another attack sends computer users to Websites that change the computer's dial-up settings to an expensive long-distance phone number, said security researcher Richard Smith. Victims are charged as much as $5 a minute instead of paying their normal Internet service fee, he said. A third attack steers computer users to pay-per-click Websites, where the spam marketer gets paid each time someone goes to the Website, said Drew Copley of eEye Digital Security. Computer users should apply patches, follow the workaround instructions, or change their settings in IE to prompt them before a Web site downloads programs that can execute on their own, Toulouse said. Source: http://news.com.com/2100-7349_3-5083234.html AlertCon 1 out of 4 https://gtoc.iss.net Security Focus ThreatCon: 1 out of 4 http://analyzer.securityfocus.com/ Current Virus and Port Attacks Virus: #1 Virus in the United States: WORM_LOVGATE.G Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus Tracking Center [Infected Computers, North America, Past 24 hours, #1 in United States] Top 10 Target Ports 135 (epmap), 445 (microsoft?ds), 1434 (ms?sql?m), 137 (netbios?ns), 80 (www), 25 (smtp), 4662 (eDonkey2000), 4899 (radmin), 139 (netbios?ssn), 17300 (Kuang2TheVirus) _______________________________________________ Information_technology mailing list Information_technology@listserv
This archive was generated by hypermail 2b30 : Tue Sep 30 2003 - 14:09:41 PDT