Home I News I Exploits I Hackers Toolkit I Our Projects I War-Games I Staff  I Affiliates I Links I Message Board I Quake III I Webmaster

.: hacker news

 1) Teen Hacker To Be Sentenced.

 2) Jailed Teen Hacker  Gets Fresh Start.

 3) Are The Goverment's Computers Secure?  

 4) Hacker Cracks Site,Forces Trade Halt.

 5) FBI Announces Arrest of 24-Year-Old British Hacker.

 6) Microsoft Sews Up Hotmail Hole.

More..

.: daily news ticker

This line always must remain the same to point to the applet and the scrolling text file with the news

 

 .: Teen Hacker To Be Sentenced                                                      

 MONTREAL (AP) - A 17-year-old hacker who jammed major Internet sites such as Amazon and Yahoo! shows no remorse and should spend a year in a juvenile detention facility, prosecutors argued Wednesday.

 Judge Gilles Ouellet set the sentencing date for Sept. 12.

 The Montreal teen, who cannot be identified under Canadian law and is known by his Internet nickname, Mafiaboy, pleaded guilty earlier this year to 58 charges related to attacks and security breaches of Internet sites in Canada, the United States, Denmark and Korea in February 2000.

 He was 15 at the time and faces a maximum sentence of two years of youth detention. An adult convicted of the same charges could receive a 10-year sentence.

 Prosecutor Louis Miville-Deschenes told a hearing Wednesday that the seriousness of the crimes and the youth's lack of remorse made a one-year sentence appropriate.

 ``He has tried to justify his crimes in a completely illogical manner,'' Miville-Deschenes said. ``He has no remorse or no real comprehension of the crimes he committed.''

 Yan Romanowski, representing the youth, said putting him with violent offenders in a youth detention facility would only cause more harm.

 ``I'd rather risk sending him to school than risk sending him to detention with bad influences,'' said Romanowski. He called for probation and mandatory community service without further detention.

 On Tuesday, the youth's parents' asked Ouellet to spare him from further detention in the case that raised questions about Internet security.

 Mafiaboy admitted involvement in denial-of-service attacks last year against Web sites belonging to five companies, including Amazon, Dell and eBay, Yahoo! and CNN. The sites were bombarded with thousands of simultaneous messages, which prevented legitimate users from accessing them for up to five hours.

 Other charges involved illegal use of computers to help with the attacks. Those computers were located at various universities, including the University of California, Berkeley and the University of Massachusetts.


 

 .: Jailed Teen Hacker Gets Fresh Start
 

 By STEPHEN FROTHINGHAM, Associated Press Writer

 WOLFEBORO, N.H. (AP) - Dennis Moran, an 18-year-old high school dropout, earned international notoriety and a nine-month jail sentence last year for his computer-hacking exploits.

 He was accused by the FBI (
news - web sites) of hacking into a computer security firm's Web site and the computer systems of four U.S. military bases. He also hacked into an anti-drug site connected to the Los Angeles Police Department, adding a cartoon of Donald Duck with a hypodermic needle in his arm.

 Now Moran, who went by the online name Coolio, runs a computer services company that a mentor helped him set up while in jail. He is chauffeured to jobs on work-release during the day and returned to jail each night. He completes his sentence on Tuesday.

 Moran says he is looking forward to building his business, DM Computer Services, into a thriving company.

 ``I'd love to fly around the country all the time doing independent consulting for large companies,'' he said. ``It's fun going from a lazy, inexperienced kid to a proprietor of a computer business.''

 Moran was briefly suspected - but cleared - of shutting down Web sites belonging to Amazon, Dell, eBay, Yahoo! and CNN by bombarding them with e-mails early last year.

 He pleaded guilty in January to three misdemeanor counts of unauthorized access to a computer system. He was sentenced to jail and ordered to pay $5,000 to each of the three victims. The judge also ordered him to work on the county's computer system while in jail.

 Moran has shorn the shoulder-length hair he had when he was arrested last year. He has also traded in the baggy jeans and hooded sweatshirt he wore to court hearings last winter for monogrammed dress shirts and chinos on his work-release job.

 The new clothes were gifts from an area businessman, Paul Zimmerman, who took Moran under his wing and helped him start the computer company.

 Zimmerman was wintering in Florida when he read about Moran. He wrote him a letter and visited him in jail on his next trip to Wolfeboro.

 Zimmerman said he was impressed with Moran's attitude.

 ``I found him to be a most delightful person,'' Zimmerman said. ``He was not angry or vindictive or mad at the system. He was taking his licks in an honorable way.''

 Every weekday at 8 a.m., Zimmerman picks up Moran at jail. Zimmerman's office must call the jail, which Zimmerman calls ``the hotel,'' when Moran arrives and whenever he goes out on a job. He has to be back by 6 p.m.

 For $50 an hour, Moran troubleshoots home and business computers, including Zimmerman's office system and those of Zimmerman's tenants and friends.

 Zimmerman helped Moran set his rates and advised him to offer free visits to introduce him to clients who might be wary of giving control over their computers to a teen-ager serving time for computer crimes.

 ``He's on probation, what's he going to do? We're saying he's FBI-certified,'' he said.

 Zimmerman coaches Moran on everything from proper work dress, to placement of his attache case in a potential client's office - on a chair, not the desk.

 Moran said he hasn't made much money yet, but he's made enough to buy lunch and cigarettes. He has to pay the county $20 a day when he's out on work release.

 Moran also is sending some money to his family - his computer technician father is unemployed.

 Tony Campaigne, a stock trader and an old friend of Zimmerman, is having Moran install a wireless network in his home office.

 ``You see so few people with such creative minds,'' Campaigne said. ``He's obviously brilliant to have done what he did.''

 Moran said when he gets out of jail, he'll take his family to lunch and plan a party with family and friends in the evening.

 Getting a driver's license will be a top priority. He never got around to it before his legal troubles began.

 If Zimmerman had not written to him in jail, Moran is not sure what he would have done once he was released from jail.

 ``I don't know. I really had no plans at all,'' he said.

 


 .: Are The Goverment's Computers Secure?  

 That's what a government official is saying today at House subcommittee hearing in San Jose, Calif., as Congress scrutinizes the government's current level of security in the wake of a series of recent computer attacks.

 "Virtually all of the largest federal agencies have significant computer security weaknesses that place critical federal operations and assets at risk to computer-based attacks," said Keith A. Rhodes, chief technology officer of the General Accounting Office (
news - web sites) (GAO), in testimony prepared for the session.

 Moreover, Rhodes says, more danger for Washington may lie ahead.

 "Recent attacks foreshadow much more devastating Internet threats to come," added Rhodes. "Over 100 countries already have or are developing computer attack capabilities … NSA [the National Security Agency] has determined that potential adversaries are developing a body of knowledge about U.S. systems and methods to attack them."

 As a consequence, Rhodes claimed, "there is a growing risk that terrorists or hostile foreign states could severely damage or disrupt national defense or vital public operations though computer-based attacks on the nation's critical infrastructures."

 Behind the Private Sector?

 At issue is more than just the Internet slowdowns such as those caused by the Code Red virus this summer, but the possibility that cyber-intruders could erase or alter crucial government information.

 "It's certainly a concern," said Jeff Carpenter of the Computer Emergency Response Team (CERT) at Carnegie-Mellon University in Pittsburgh, prior to his own testimony at the hearings. "As the government and other sectors increase their information on the Internet, they increase their exposure, too."

 And some computer security experts say the government has fallen behind the business world in protecting its information.

 "The private sector has to a great extent been ahead of the curve compared to the government in security," says Mark Rasche of Predictive Systems, a network consulting agency in Reston, Va., and a former prosecuting attorney for the Justice Department. "The economics dictate that it be so."

 In Rashe's view, businesses have a greater financial incentive to upgrade security. "It's not that we don't know what the solutions are," he says of the government's approach. "We're just not willing to dedicate the resources to them."

 And Rhodes is calling for cooperation between the government and the high-tech industry to work on the problem.

 "Most of the nation's critical infrastructure is owned by the private sector," Rhodes said. "Solutions, therefore, need to be developed and implemented in concert with the private sector."

 In the Wake of Code Red

 The hearings — held by the House Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations — come at the end of a summer during which government Web sites have periodically been under siege from hackers.

 The Code Red worm, intended to cause outages at the White House Web site, spread rapidly throughout the Internet starting on July 19, and then in another cycle beginning July 31. Earlier this month, a related and possibly more dangerous worm, Code Red II, surfaced on the Web.

 The White House technical staff averted a shutdown of its site, but the Pentagon had to close down numerous Defense Department Web pages on Aug. 1, and the worm ended up intermittently slowing down Internet traffic worldwide over a period of a few days.

 Ultimately, the Code Red worms did not create great damage on the Web, although they infected more than 400,000 computers — according to CERT's estimate — and took a financial toll on companies and government agencies that either were affected by the worm or had to spend money upgrading their security.

 Both worms took advantage of security flaws in two Microsoft operating systems — Windows NT and Windows 2000 — and in Microsoft's IIS server software. It is not known who unleashed Code Red on the Internet.

 Cat and Mouse in Cyberspace

 While the effects of Code Red have been generally contained, security experts warn that the pair of worms are a harbinger of growing sophistication among rogues in cyberspace.

 "Over past 10 years, we've seen intruder community continue to develop their techniques," notes Carpenter. "They've increased their use of worm behavior to propagate attack of machines at exponential rates."

 However, considering all the different functions of the government, it's also clear that some agencies, like those involving defense and national security, are already using far more sophisticated security techniques than others.

 In those areas, notes Rasche, "there are classified networks that are reasonably secure. They come from a culture where security is paramount. But are they totally secure? No."

 Still, Rasche adds, "One would hope that the computers carrying the nuclear codes are more secure than those at the Bureau of Land Management."


 .: Hacker Cracks Site,Forces Trade Halt.                                                           

 By Steve James

 NEW YORK (Reuters) - In the latest in a spate of corporate cyber-invasions, a hacker broke into a paintball company's Web site and sent out phony financial statements Thursday, forcing the Nasdaq stock market to halt trading in the company's shares for more than two hours.

 After discovering its computer security had been breached overnight, Brass Eagle Inc. (Nasdaq:XTRM - news) notified law enforcement officials, including the FBI (news - web sites), which has a special unit that investigates computer crimes. An FBI spokesman in Little Rock, Arkansas, said only that the agency was aware of the case.

 The hacker sent out misinformation about the company's finances in ``hundreds, if not thousands'' of e-mails, said Chief Financial Officer J.R. Brian Hanna.

 The attack prompted the maker, marketer and distributor of paintball weapons and clothing to reaffirm its earnings guidance for fiscal 2001.

 ``On the surface it appears to be a hoax,'' Hanna told Reuters by telephone from Bentonville, Arkansas. Asked if it appeared the attack was aimed at manipulating Brass Eagle's stock to gain a financial advantage, he said that was apparently not the motive.

 ``But after consulting with Nasdaq, we felt it was prudent to make a statement.''

 Brass Eagle said it continues to expect fiscal 2001 sales of $100 million to $105 million and diluted earnings per share of about $1.00.

 ``Everything was fine at the close of business yesterday,'' said Hanna. He said the hacker had apparently entered Brass Eagle's Web site and sent e-mails ostensibly from the company, to addresses of people registered to receive company mailings.

 This could include everyone from paintball enthusiasts -- of which there are an estimated 7 million in the United States -- to potential investors and Wall Street analysts.

 A spokesman for the Nasdaq stock market declined any specific comment about Brass Eagle. But he said under Nasdaq rules, ``when a company has material news that might affect its share price, as this (case) would, they are required to publicize it as widely as possible.

 ``They must notify the Nasdaq usually about 10 minutes before (announcing the news) and we work together on the timing of the trading halt,'' the spokesman said.

 Trading in Brass Eagle shares was halted around 10.40 a.m. EDT Thursday and resumed more than two hours later. The stock closed on Thursday up 28 cents, at $6.24.

 Hanna said computer security was being tightened at the company, which employs about 150 people at a plant in Neosho, Missouri, and another 50 in Chula Vista, California, where Brass Eagle makes masks and clothing for paintball -- a manhunt-like game that is also used by some companies to test management skills.

 The company also operates an ``X-treme'' sports facility, Challenge Park Extreme, in Jolliet, Illinois.

 This was just the latest case of cyber-invasion in the information age.

 This month, a student who issued a fake press release that triggered frenzied selling of shares in data storage equipment maker Emulex Corp. (Nasdaq:EMLX - news) and sent Wall Street into a panic, was sentenced to three years and 8 months in prison.

 And a day trader accused of posting fake press releases on the Internet claiming Lucent Technologies Inc. (NYSE:LU - news) would not meet earnings projections, agreed to settle civil fraud charges with federal securities regulators.

 Earlier this summer, hackers entered a computer system that controls much of the flow of electricity across California, and in Toronto, JDS Uniphase Corp. (JDU.TO) said a hacker broke into its Web site and gained access to a draft of its fourth-quarter financial results.

 Overseas, Infosys Technologies Ltd , one of India's biggest software companies, said one of its corporate banking Web sites was down for several hours after hackers broke into it.

 





 

.: last 20 exploits

patchadd.pl                
aolcrash.c
xp.tar.gz
alsou.c
killbsdi.c
top.c
exp_w3m.pl
sa2001_06.txt
groupwise.disclos...
remedy.txt
lpplus.txt
mf.txt
store.cgi.txt
dbsnmp-8.1.6.c
otrcrep-8.0.5.c
0107-exploits.tgz...
squidmap.pl
ibm-db2.c
pic-lpr-remote.c
mambo_advisorie.t...
 

More..