NewsBits for August 12, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ Worm snarls Windows networks worldwide An Internet-borne infection incapacitated tens of thousands of computers on Tuesday, snarling company networks and frustrating home users as it spread across the globe. Security officials said the virus-like worm, variously dubbed LovSan, Blaster and MSBlaster, was part of a coordinated electronic attack that exploited one of the most serious flaws yet discovered in Microsoft Corp.'s Windows operating systems.,3959,1217014,00.asp,1282,59987,00.html Update: Feared RPC worm starts to spread,10801,83922,00.html Blaster worm starts European campaign MSBlast prevention and cure Update Windows today - before it gets Blasted,39020330,39115645,00.htm Cleaning up after the MSBlast worm,39020463,39115651,00.htm Warnings did little to stop latest computer outbreak Computer infection appears in Asia, Europe - - - - - - - - - - Turlock couple held on identity theft counts A couple allegedly took a trip to Disneyland and ran up thousands of dollars in other purchases, all courtesy of relatives who did not know they were being so generous, authorities said. Ricardo and Mary Garcia, ages 35 and 33, of Turlock, were arrested Thursday afternoon and charged with three counts of identity theft, one count of grand theft and one count of elder abuse. Each was being held in lieu of $40,000 bail in Stanislaus County Jail after an investigation by the Sheriff's Department and the Sacramento Valley Hi-Tech Crimes Task Force, which has a satellite office in Turlock. - - - - - - - - - - Slovenian hacker found shot dead A Slovenian hacker who ran into legal conflict with one of the country's leading banks over an alleged security weakness was found dead last week. Police believe Robert Skulj, 28, killed himself with a shot to the head from a gun found at the scene. Skulj's body was found in his locked apartment in the city of Trzic last Friday. - - - - - - - - - - Massive theft of mobiles and Xboxes sparks hunt Police are looking for a man sporting a beer belly after a lorry-load of handsets and consoles worth PS780,000 vanished on Monday. Police have appealed for help after 7,000 mobile phones and 1,000 Xbox consoles were stolen in Wednesbury, near Wolverhampton, on Monday.,39020351,39115654,00.htm - - - - - - - - - - Man admits online rape-by-proxy attempt The Ocean County Prosecutor's Office negotiated a guilty plea in what they believed to be the first attempted aggravated sexual assault "by proxy" in the case of Jonathan D. Gilberti on Monday. The 24-year-old Wood-Ridge man admitted in court that while online he pretended to be two women who wanted to be raped on two sets of occasions last year. - - - - - - - - - - ATM machines rigged High-tech thieves have rigged a number of bank machines around the Kitchener-Waterloo region in Ontario, allowing them to make working copies of customers' debit cards. In the past month, Waterloo regional police say they have discovered five rigged machines two in Kitchener, two in Cambridge and one in Waterloo. - - - - - - - - - - Congress targeting outlaw spammers Internet users say theyre choking to death on spam, but they may not get much breathing room from legislation expected to be adopted by Congress this fall. In a test of how well commerce and communication can coexist, the lawmakers appear determined to pass a bill that will target the bad actors of the junk e-mail world but do little to reduce unsolicited pitches from direct marketers and other businesses. Michigan law chief slams 'bogus' anti- spam group - - - - - - - - - - Viruses, hackers hit a third of Net users About 43 percent of them said they felt vulnerable on their home computers, while 17 percent felt they were vulnerable from viruses and hackers at work. The survey, conducted by Edelman, a public relations firm, questioned more than one thousand adults nationwide. American Internet users were warned by Microsoft last month of a new virus attack. On Monday, the new worm, MSBlast, infected at least 7,000 computers in a matter of hours, according to Symantec. Still, security experts said the spread was slowed because the virus program had several flaws. One in five firms to suffer cyber-attack - - - - - - - - - - Businesses, Not Law Enforcement, Held Responsible For Cyber-Crime By 2005, one in five enterprises will experience a serious Internet security incident targeting information and intellectual property, Gartner analysts said in a new study. Of those attacks, nearly one in three will be either financially or politically motivated, said the report's author, Richard Hunter, a Gartner vice president and research director. Cybercriminals are taking advantage of users, enterprises, and unsecured systems to usher in high-profit, low-overhead crimes. - - - - - - - - - - Two-in-one ID theft, fee fraud scam debuts Scam artists who dupe users into revealing sensitive financial information have applied the social engineering tricks of 419-fraudsters in a new email scam. Reg readers forwarded us copies of an email they received this morning, purporting to come from US-based e-payment company Swiftpay International, which informs targeted individuals that they have 'won a prize'. - - - - - - - - - - House backs more FBI funding but with conditions House lawmakers want to increase funding levels for the FBI to help it combat terrorism, cybercrime and conventional crime, but they also want to put the bureau on a shorter leash, according to the budget plan the chamber passed on July 23. The House passed a bill, H.R. 2799, to fund the Commerce, Justice and State departments in fiscal 2004, and that legislation reiterated the importance of FBI funding by increasing its spending level $424 million. The total FBI budget under the measure would be $4.6 billion, and the Justice Department budget would be about $20 billion. - - - - - - - - - - US lawmakers worry RFID will hurt privacy California's legislators will meet later this month to address privacy issues surrounding radio frequency identification tags. Lawmakers in California have scheduled a hearing for later this month to discuss privacy issues that surround a controversial technology that's designed to wirelessly monitor everything from clothing to currency.,39020348,39115652,00.htm ID chips pressed into laundered clothes,39020354,39115640,00.htm - - - - - - - - - - Postal ID plan creates privacy fears A government report that urges the U.S. Postal Service to create "smart stamps" to track the identity of people who send mail is eliciting concern from privacy advocates. The report, released last month by the President's Commission on the U.S. Postal Service, issued numerous recommendations aimed at reforming the debt-laden agency. One recommendation is that the USPS "aggressively pursue" the development of a so-called intelligent mail system. - - - - - - - - - - NEC Solutions unveils security software NEC Solutions America on Tuesday unveiled a three-layer data security product aimed at health care organizations that face patient privacy rules. Dubbed the "NEC MobilePro Tricryption System," the software is designed to keep sensitive information confidential by encrypting three elements: the actual data, the key needed to decipher the data, and a "key identifier" that acts as a kind of index for the initial key. - - - - - - - - - - Basic IIS Lockdown Using Scripts and Group Policy Microsoft Active Directory and Group Policy have a feature-rich set of tools and processes to help save an administrator time and energy in maintaining security within the domain. Locking down a server requires many steps to complete, and depending on the extent to which the server is locked down, it can take up to several hours. This paper is primarily written for system administrators who want to make their life managing IIS easier using scripts with Active Directory and Group Policy. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.