CRIME FW: [Information_technology] Daily News 1/22/04

From: George Heuston (GeorgeH@private)
Date: Thu Jan 22 2004 - 07:48:59 PST

  • Next message: Jeff Bryner: "Re: CRIME True Tales of Information Warfare in Washington, D.C.!"

    -----Original Message-----
    From: information_technology-admin@private
    [mailto:information_technology-admin@private] On Behalf
    Of InfraGard
    Sent: Thursday, January 22, 2004 7:11 AM
    To: Information Technology
    Subject: [Information_technology] Daily News 1/22/04
    
    January 20, BBC News - Viruses turn to peer-to-peer nets. Virus writers
    are
    setting up peer-to-peer networks to help their malicious creations
    spread.
    The networks are being used to control thousands of innocent PCs that
    some
    virus programs have infected. The tactic is being used because
    peer-to-peer
    networks are hard to disrupt, making viruses using this technique hard
    to
    stop spreading. One of the first viruses to set up a peer-to-peer
    network to
    help it spread was the Slapper worm that was aimed at the Linux
    operating
    system. A Windows virus called Sinit appeared in late 2003 that turned
    every
    machine infected by the malicious program into a member of a
    peer-to-peer
    network. It was expected that Sinit's creator would issue commands to
    infected computers via this network. In the past some creators of Trojan
    programs, that open up a backdoor into an infected PC, have used net
    chat
    channels as a way to issue commands. Often thousands of computers were
    enrolled in these remote controlled networks that have been dubbed "bot
    nets." Finding and shutting down the chat channels would effectively cut
    a
    virus writer off from his network of slave machines. But shutting down a
    distributed network would be much more difficult because no one machine
    is
    in charge. It also is much more difficult to trace where commands were
    being
    inserted and find the network's controller. Source:
    http://news.bbc.co.uk/1/hi/technology/3409187.stm
    
    
    Internet Alert Dashboard
    Current Alert Levels
    AlertCon: 1 out of 4
    https://gtoc.iss.net
    
    Security Focus
    ThreatCon: 1 out of 4
    http://analyzer.securityfocus.com/
    
    Current Virus and Port Attacks
    Virus: #1 Virus in the United States: WORM_LOVGATE.G
    Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
    Tracking Center
    [Infected Computers, North America, Past 24 hours, #1 in United States]
    
    Top 10 Target Ports
    135 (epmap), 6129 (dameware), 1434 (ms?sql?m), 137 (netbios?ns), 1433
    (ms?sql?s), 27374 (SubSeven), 445 (microsoft?ds), 80 (www), 53(domain),
    4662
    (eDonkey2000)
    Source: http://isc.incidents.org/top10.html; Internet Storm Center
    
    
    _______________________________________________
    Information_technology mailing list
    Information_technology@listserv
    



    This archive was generated by hypermail 2b30 : Thu Jan 22 2004 - 09:03:03 PST