Cyber Security Incidents Outside Malaysia Report No. 5 May 2006 15 May 2006 Strategic Planning Unit National ICT Security and Emergency Response Centre (NISER) Technology Park Malaysia 57000 Kuala Lumpur Tel: +60 (0)3 8996 5000 Fax: +60 (0)3 8996 0827 http://www.niser.org.my CONTENTS DENIAL OF SERVICE 1. Vietnamese distributed denial−of−service hacking suspect arrested. 2. Massive DoS attack knocks TypePad, LiveJournal blogs offline. 3 3 3 FRAUD 3. Phishing study 4. Phishing hits bank's customers 5. Internet job scam 3 3 4 4 HACK THREAT/INTRUSION 6. Apple online store hacked 7. California man pleads guilty to bot attack 8. Hacker botnets attack!!! 9. Ex-government employee sentenced for hacking 5 5 5 5 6 SPAM 10. Smarter Spam Could Mimic Friends' Mail 11. Zombie computers the biggest source of spam 12. Spammer gets 57 months of jailtime 13. Spammers attack anti-spammers 6 6 7 7 7 VIRUS/WORMS/TROJAN 14. SANS exposes 'safe' technologies. 15. Top ten malware threats and hoaxes reported to Sophos in April 2006 16. WOW Virus Targets Online Gamers 17. World Cup virus season kicks off. 8 8 8 8 9 OTHERS 18. Islamic militants recruit using U.S. video games 19. Industrial control systems pose little−notice security threat. 20. Beware! Cybercrime 21. Downloading music online is a computer crime 22. Virginia official discusses the fight against cybercrime 9 9 9 10 10 11 DISCLAIMER This document is a non-commercial publication intended to educate and disseminate information about security incidents reported outside Malaysia. Further reproduction or redistribution is subject to original copyright restrictions. NISER provides no warranty of ownership of the copyright, or accuracy with respect to the original source material. 1 NISER did not warrant the completeness or accuracy of the document and neither accepts any liability for losses howsoever incurred. The content on this site, including news, quotes, data and other information, is provided by third party content providers for your personal information only, and neither NISER nor its third party content providers shall be liable for any errors, inaccuracies or delays in content, or for any actions taken in reliance thereon.—yy 2 DENIAL OF SERVICE 1. Vietnamese distributed denial−of−service hacking suspect arrested. Sophos has announced news that a man has been arrested in Vietnam for launching a distributed denial−of−service attack against a commercial Website. The attack on Vietco's Website caused huge losses to the company. Nguyen Thanh Cong is suspected of beginning an attack on the Vietnamese e−commerce site, www.vietco.com, in March 2006. The Website, which has 67,000 regular members, auctions cell phones and other consumer electronics products. Cong faces charges for creating a Trojan horse that exploited a flaw in Microsoft's Internet Explorer. The Trojan horse, which is said to have been planted on a pornographic Website, turned unpatched computers into zombie PCs which were then ordered to repeatedly hit the Vietco site −− overwhelming its servers. Source: Department of Homeland Security, May 2, 2006 http://www.sophos.com/pressoffice/news/articles/2006/05/viet ddos.html 2. Massive DoS attack knocks TypePad, LiveJournal blogs offline. Millions of blogs hosted by LiveJournal and TypePad were unavailable throughout Tuesday night, May 2, and into Wednesday morning, May 3, as a massive denial−of−service attack struck their servers. The attack that brought down the servers at Six Apart −− the San Francisco company behind the LiveJournal and TypePad services, and the Moveable Type blogging software −− began at 4 p.m. PDT Tuesday, according to an advisory posted to the firm's Website by Michael Sippey, the vice president of product. According to Sippey, service was interrupted for the following: TypePad, LiveJournal, TypeKey, sixapart.com, movabletype.org and movabletype.com. Source: Tech Web, May 03, 2006 http://www.techweb.com/wire/security/187200053 FRAUD 3. Phishing study A study conducted by Harvard and Berkley shows that people, even those that should know better, were still likely to be fooled by phishing sites. According to the post, up to 90% of participants of the study were fooled by a bogus URL meant to closely resemble a legitimage banking site. In the study, entitled Why Phishing Works , it is noted that better measures should be implemented to alert web surfers when sites are legitimate and when they are not. Here are some highlights of the study: * Cues that are supposed to help you figure out whether a site is legit, such as address bar, status bar or security indicators, weren't even looked at by 23% of participants. * There was no significant difference between the performance of men vs. women, older people vs. younger people or people at different education/Web savvy levels. In other 3 words, everybody got fooled at about the same rate.* Other phish sites that fooled most participants included a variety of fake PayPal sites and a bogus Etrade site. Source: blogs.chron.com, May 05, 2006 http://www.crime-research.org/news/05.05.2006/1977/ 4. Phishing hits bank's customers A scam sent through WebMail last week, targeting the UA campus, has prompted police and university officials to warn about giving away personal information online. The night of April 20 an e-mail was sent to almost all UA e-mails and said the recipient's DM Federal Credit Union account access had been suspended. The e-mail asked customers to go online to restore their accounts, said Eugene Mejia, University of Arizona Police Department spokesman. The e-mail was a phishing scam, which is the use of hijacked corporate logos and deceptive e-mails to lure personal information from unsuspecting victims. The information, usually credit card numbers, bank account information or Social Security numbers, is then used to commit fraud. The Center for Computer Information and Technology discovered the e-mails did not originate from DM Federal Credit Union, although they contained logos and identifiers stolen from the company's Web site. Source: wildcat.arizona.edu, May 04, 2006 http://www.crime-research.org/news/04.05.2006/1982/ 5. Internet job scam Most of us deal with the internet on a daily basis. We use it for information and sometimes, to find a job. Crime reporter Miranda Combs tells us about a scam going around the Bluegrass that may hit home for you. To some, it could be the perfect opportunity. You get an email, saying we've got a job for you, and you can do it all from home. According to Paul Simms with the Secret Service. Or it could be a perfect scam in the works. "We have a business, it's overseas, what we need is to establish a U.S. base and by doing that we need someone to run our accounts. So it's very easy, you can do this out of your home," said Simms. "They usually do not want you to set up bank account in that business's name," he said. "They want you to set it up in your own personal account." Simms says it's all about getting cash for checks. The fake company will send you checks, they then want you to wire them the cash. "So what they'll say is you're going to receive a $5000 check from a business, pay yourself from the proceeds of that check, so you're not actually getting a paycheck from that business," said Simms. Source: wkyt.com, May 12, 2006 http://www.crime-research.org/news/12.05.2006/1994/ 4 HACK THREAT/INTRUSION 6. Apple online store hacked Apple's Korean online store has been defaced by a hacker. The attack, carried out by someone working under the name 'Dinam', who claimed in his post to be Turkish, was brought to the attention of silicon.com last Thursday. The defacement was removed from Apple's website shortly after silicon.com alerted the company. Apple has subsequently refused to comment on the matter. Jason Hart, CEO of security company Whitehat UK, told silicon.com: "The defacer has managed to get administrator access to the web server." Although Hart suspected the hacker was after little more than "self-gratification" through vandalising the site, he said Apple should communicate what happened to its customers to end speculation. Source: Silicon.com, May 3, 2006 http://networks.silicon.com/webwatch/0,39024667,39158606,00.htm 7. California man pleads guilty to bot attack A 20-year-old California man has pleaded guilty to launching a bot network attack that compromised computers at a Seattle hospital and several universities. Christopher Maxwell, a Vacaville, Calif., resident, was accused of intentionally damaging a computer he was not authorized to access and using it to commit fraud. He made the guilty plea on Thursday in federal district court in Seattle. Back in mid-2004, Maxwell and a group of co-conspirators created a network of bots, or automated programs, using more than 13,000 commandeered computers, or zombies. Maxwell used the bot network to install adware on compromised computers, reaping commissions of approximately $100,000 for himself and his co-conspirators, according to the initial complaint. Source: CNET News.com, May 5, 2006 http://news.com.com/California+man+pleads+guilty+to+bot+attack/2100-7348_36069238.html?tag=alert 8. Hacker botnets attack!!! Christopher Maxwell will have to pay more than $252,000 in restitution to a hospital and the Department of Defense for his role in attacking thousands of computers with a botnet that installed adware on target machines. A number of those machines belonged to Northwest Hospital and Medical Center in north Seattle. Although AP reported patient care was not jeopardized due to the presence of backup systems, the attacks caused several other problems. The attacks did affect computers in the hospital's intensive care unit, and also disrupted physicians' pagers as well as prevented doors to operating suites from opening. "Creating a zombie network, or botnet, isn't a harmless game. In this case a hospital network was affected, and patients' welfare could have been put at risk through the stupidity of the hackers," said Graham Cluley, senior technology consultant for Sophos. The attacks also hit hardware at the Headquarters 5th Signal 5 Command in Manheim, Germany, and at the Directorate of Information Management in Fort Carson, Colorado. Source: securitypronews.com, May 11, 2006 http://www.crime-research.org/news/11.05.2006/1991/ 9. Ex-government employee sentenced for hacking A former computer security specialist at the Department of Education has been sentenced to five months in prison for hacking into his supervisor's PC. Kenneth Kwak, 34, of Chantilly, Va., admitted to installing remote control software on the computer and using that access to read his supervisor's e-mail and monitor other Internet activity, the U.S Department of Justice said in a statement Friday. Kwak shared this information with others in his office, the DOJ said. Kwak pleaded guilty last month to one count of intentionally gaining unauthorized access to a government computer and thereby obtaining information, the DOJ said. He was sentenced on Friday in the U.S. District Court for the District of Columbia. The five-month sentence is to be followed by five months of home confinement. Source: CNET News.com, May 12, 2006 http://news.com.com/Ex-government+employee+sentenced+for+hacking/2100-7350_36071928.html?tag=html.alert SPAM 10. Smarter Spam Could Mimic Friends' Mail The next generation of spam and phishing e-mails could fool both software filters and the most cautious people, Canadian researchers said Sunday, by mimicking the way friends and real companies write messages. John Aycock, an assistant professor of computer science at the University of Calgary, and his student, Nathan Friess, presented a paper Sunday at a security conference in Hamburg, Germany that outlined how junk mailers and phishers, even spyware criminals, could create slicker spam. Rather than rely on mass quantities of spam, much of it now written in gibberish to slip past antispam filters, tomorrow's criminals could plant malicious programs on compromised computers, the spam "zombies" that account for a large portion of spam sent. Those programs, Aycock and Friess argued, would scan the e-mail in the zombie's inbox, mine it for information and writing patterns, then crank out realistic-looking replies to real messages. Source: TechWeb News, May 1, 2006 http://www.techweb.com/headlines_week/showArticle.jhtml?articleId=187002202 6 11. Zombie computers the biggest source of spam According to Internet security company, Panda Software, zombie computers are now the biggest source of spam on the Internet. A zombie is a computer infected with malware that enables the sender of the malware to take control of it. The malware most frequently used to convert computers into zombies are 'bots' - Trojans designed to automatically respond to commands of their creators. Panda Software's finding comes in the wake of a call by the OECD for better education of consumer users of computers to ensure they have the knowledge to install and maintain the necessary anti-virus and other security software on their machines. Source: itwire.com.au, May 07, 2006 http://www.crime-research.org/news/07.05.2006/1978/ 12. Spammer gets 57 months of jailtime Concluding the first prosecution of its kind in the United States, a well-known member of the "botmaster underground" was sentenced Tuesday to nearly five years in prison for profiting from his use of "botnets" - armies of compromised computers - that he used to launch destructive attacks, to send huge quantities of spam across the Internet and to receive surreptitious installations of adware. Jeanson James Ancheta, 20, of Downey, California, was sentenced to 57 months in federal prison by United States District Judge R. Gary Klausner in Los Angeles. During the sentencing hearing, Judge Klausner characterized Ancheta's crimes as "extensive, serious and sophisticated." The prison term is the longest-known sentence for a defendant who spread computer viruses. Ancheta pleaded guilty in January to conspiring to violate the Computer Fraud Abuse Act, conspiring to violate the CAN-SPAM Act, causing damage to computers used by the federal government in national defense, and accessing protected computers without authorization to commit fraud Source: northcountrygazette.org, May 10, 2006 http://www.crime-research.org/news/10.05.2006/1986/ 13. Spammers attack anti-spammers Spammers have attacked anti-spam, anti-spyware company Blue Security's Web site, stealing parts of the database to get customers' e-mail addresses. The spammers then sent the company's users the following e-mail message, threatening those who did not remove the company's free anti-spam download Blue Frog, according to a report in the Israeli business newspaper Globes. "You are being emailed because you are a Blue Security user. Blue Security's data base has now been distributed to the worst among spammers. Within 48 hours, the database will be published on the Internet, and your email will be open to a community of spammers," the e-mail said, according to the report. "After this, you will see that spam to your mailbox increases 10 (to) 20 fold. Blue Security was illegally attacking spammers, now spammers fight back. Remove Blue Frog from your tray to avoid getting more spam." Source: upi.com, May 12, 2006 http://www.crime-research.org/news/12.05.2006/1993/ 7 VIRUS/WORMS/TROJANS 14. SANS exposes 'safe' technologies. For the first time, Mac OS X vulnerabilities ranked number one in the SANS Institute's quarterly Top 20 Internet Security Vulnerabilities report, which was published on May 1. Experts at the SANS Institute said the vulnerabilities clarify an important point about non−Windows systems. "There's a difference between 'safer' and 'more secure,'" says Ed Skoudis, director of the SANS "Hacking Exploits" course curriculum and a senior security analyst at Intelguardians. "There are fewer users on systems like the Mac or Mozilla, which makes them less of a target for attackers, and therefore safer. But there's nothing inherent in those systems that makes them more secure." SANS Top 20 Internet Security Vulnerabilities report: http://www.sans.org/top20/2005/spring_2006_update.php Source: Department of Homeland Security, May 1, 2006 http://www.darkreading.com/document.asp?doc_id=93759 15. Top ten malware threats and hoaxes reported to Sophos in April 2006 Sophos, a world leader in protecting businesses against viruses, spyware and spam, has revealed the top ten malware threats and hoaxes causing problems for businesses around the world during the month of April 2006. The report, compiled from Sophos's global network of monitoring stations, reveals that Netsky-P, which recently celebrated its second birthday, has returned to the top of the virus chart, replacing Zafi-B, which Sophos first protected against 22 months ago. However as a proportion of all malware, email viruses and worms continue to decline - 86% of the threats discovered by Sophos during April were Trojan horses, used by hackers to download malicious code, spy on users, steal information or gain unauthorised access to computers. The top ten viruses in April 2006 were as follows: W32/Netsky−P; W32/Zafi−B; W32/Nyxem−D; W32/MyDoom−AJ; W32/Netsky−D; W32/Mytob−FO; W32/Mytob−C; W32/Mytob−Z; W32/Dolebot−A; W32/Mytob−AS. Source: Sophos, May 2, 2006 http://www.sophos.com/pressoffice/news/articles/2006/05/topt enapr06.html 16. WOW Virus Targets Online Gamers Security Analysts at MicroWorld Technologies inform that a new variant of the password stealing Trojan named ‘Trojan-PSW.Win32.WOW.x’ is spreading fast, attacking account holders of the online game ‘World of Warcraft’. This Trojan also shuts down many AntiVirus and Firewall software on user computers to enhance its malice. World of Warcraft is a multimillion million dollar entity in the world of cyber games where huge sums change hands every second. A gamer dons a specific avatar while playing this game of alien characters and imaginary galaxies. Once the hacker gets hold of a gamer’s password, he can transfer victim’s goods to his personal account which is easily converted to liquid currency through Gaming Currency Exchange websites. 8 Source: IT-Observer, May 2, 2006 http://www.it-observer.com/news/6217/wow_virus_targets_online_gamers/ 17. World Cup virus season kicks off. The FIFA World Cup 2006 tournament won't get underway in Germany until early June, but computer virus writers are already attempting to cash in on the planet's most popular sporting event with viruses aimed at deceiving eager soccer fans. Researchers at UK−based Sophos released notification of a new attack that infects Microsoft Excel files and has been disguised as a spreadsheet charting the national teams participating in the World Cup. Identified by the security company as XF97/Yagnuul−A, the virus lives in an Excel file that offers to help people set up fantasy sports competitions related to the international soccer championship, and also attempts to market itself specifically to fans of the English Premiership, one of the world's top professional leagues. Once the World Cup virus has infected a PC, it begins forwarding itself to other people using the corrupted machine and may also send itself to people listed in any e−mail client software on the device, Sophos said. The Excel virus marks the second World Cup−oriented attack identified by the company in the last week. Source: eWeek, May 08, 2006 http://www.eweek.com/article2/0,1895,1959084,00.asp OTHERS 18. Islamic militants recruit using U.S. video games The makers of combat video games have unwittingly become part of a global propaganda campaign by Islamic militants to exhort Muslim youths to take up arms against the United States, officials said on Thursday. Tech-savvy militants from al-Qaida and other groups have modified video war games so that U.S. troops play the role of bad guys in running gunfights against heavily armed Islamic radical heroes, Defense Department official and contractors told Congress. The games appear on militant Web sites, where youths as young as 7 can play at being troop-killing urban guerillas after registering with the site's sponsors. "What we have seen is that any video game that comes out ... they'll modify it and change the game for their needs," said Dan Devlin, a Defense Department public diplomacy specialist. Source: ZDNet News: May 5, 2006 http://news.zdnet.com/2100-1040_22-6068963.html 19. Industrial control systems pose little−notice security threat. The electronic control systems that act as the nervous system for all critical infrastructures are insecure and pose disastrous risks to national security, cybersecurity experts warn. Supervisory control and data acquisition and process control systems are two common types of industrial control systems that oversee the operations of 9 everything from nuclear power plants to traffic lights. Their need for a combination of physical security and cybersecurity has largely been ignored, said Scott Borg, director and chief economist at the U.S. Cyber Consequences Unit, an independent research group funded by the Department of Homeland Security. Control systems security is one of six areas of critical vulnerabilities Borg included in a new cybersecurity checklist released in April by the research group. The private−sector owners of critical infrastructure refuse to release data and deny that their aging, inherently insecure systems pose any security risk, said Dragos Ruiu, an information technology security consultant to the U.S. government who runs several hacker conferences. Average hackers can break into the systems, said Robert Graham, chief scientist at Internet Security Systems. He, Borg and other experts fear that major cyberattacks on control systems could have socio−economic effects as severe and far−reaching as Hurricane Katrina. Source: Federal Computer Week, May 8, 2006 http://fcw.com/article94273−05−08−06−Print 20. Beware! Cybercrime Small firms have been warned to be on their guard against increasing levels of cybercrime by West Midlands IT firm Adecs. The Coventry company has been going to extra lengths this month to emphasise to its customers the importance of protecting themselves against computer crime. Figures recently released by the Government have revealed that the cost of computer crime to businesses in the UK has risen by 50 per cent over the last two years. Amrik Bhabra, managing director of Adecs, said the figures were particularly alarming for small businesses. "According to latest statistics firms will suffer an average of eight security breaches a year," he said. "Large businesses have invested heavily in security and are reaping the benefits. Source: tmcnet.com, May 9, 2006 http://www.crime-research.org/news/09.05.2006/1989/ 21. Downloading music online is a computer crime Six computer users in the Mid-south have been sued by the Recording Industry Association of America for illegally downloading music. It's a Federal Crime that many people don't think about. More than forty five hundred suits have been filed against people downloading music but not paying for it. Laura Kyle thinks those who steal music deserve to be caught, "There are people who create the music and the composers and all should get a profit." It's actually pretty easy to track down those breaking the law. Investigators browse illegal trading sites then they track users with their IP address, every computer has one and no two are the same. Then they serve a warrant to internet providers to get the computer users name and then they sue the downloaders. Maybe it was your kids downloading the music. Doesn't matter, the person paying for the internet service is held responsible. Source: wmcstations.com, May 9, 2006 http://www.crime-research.org/news/09.05.2006/1988/ 10 22. Virginia official discusses the fight against cybercrime. Gene Fishel, assistant attorney general in the state of Virginia's Attorney General's office, delivered the keynote address during Ziff Davis' Tuesday, May 9, "Enterprise Applications Virtual Tradeshow," where he provided some prime examples of computer crime, and what IT shops can do about it. Because two of the United States' Internet powerhouses are headquartered in Virginia −− AOL and MCI −− Fishel said that about 80 percent of the traffic on the Internet passes through Virginia at some point. This little−known fact is actually what provides the Virginia Attorney General's office with jurisdiction over many criminal computer crimes. "It allows us as a state to test computer crime laws before they go federal," said Fishel. "Spam is a good example of that." The Virginia Attorney General's office was the first in the nation to criminalize spam with its anti−spam law; there's now a federal law in place modeled on Virginia's efforts. Source: eWeek May 9, 2006 http://www.eweek.com/article2/0,1895,1959790,00.asp 11