NewsBits for August 15, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ Microsoft braces for Phase 2 of attack Microsoft Corp. may write flawed software, but it can take solace in the fact that the author of the ``blaster'' worm also makes mistakes. And that error may be Microsoft's biggest weapon in fending off part two of the Internet attack that started Friday and is expected to continue into Saturday. The worm, which so far has infected more than 350,000 computers around the world, now aims to bring down Microsoft's Web site for software patches by flooding it with traffic.,10801,84066,00.html,1377,60060,00.html Windows Update flaw 'left PCs open' to MSBlast,39020330,39115732,00.htm Microsoft Outlines Specific Steps to Help Ensure PC Security Microsoft kills Net address to foil worm Blaster Worm Racks Up Victims,aid,112047,00.asp MSBlast worm takes down major bank Blaster shows IT departments the need for speed on patches,10801,83968,00.html US govt organisations see off Blaster worm How to Clear the 'Blaster' Worm from a PC Running Windows XP Symantec's repair software is called Fixblast.exe for Windows XP. Earlier Windows operating systems -- 95, 98 and ME -- are not affected by the worm. Q. What can I do to get this nasty worm Relevant Products/Services from Captus Networks off my new PC running Windows XP? A. The "blaster" worm fix requires several steps that start with either downloading a repair program or asking a trusted friend to download it for you. Some infected computers are switching on and off every few minutes, making Web access impossible. Other victimized machines are quite sluggish but still useable. - - - - - - - - - - falls to DOS attack Microsoft Corp.'s main Web site was inaccessible for two hours late yesterday, the victim of an Internet- borne distributed denial-of-service (DDOS) attack, the company said. The company is cooperating with federal law enforcement officials investigating the attack, the second successful DOS attack against this month. The attack occurred yesterday at 11:45 p.m. EDT and was directed at, the company's main Web address, according to Sean Sundwall, a Microsoft spokesman. was completely inaccessible for two hours and experienced "off and on" disruptions for another two hours, Sundwall said.,10801,84074,00.html - - - - - - - - - - Federal charge filed against Ohio man accused of hacking Acxiom An Ohio man accused of hacking into computer servers at Acxiom Corp., one of the largest database companies in the world, has been charged in federal court in his home state, federal officials said Friday. Daniel Baas, 24, of Milford, Ohio, was charged with computer fraud in U.S. District Court in Cincinnati. The charge, filed Thursday, was accompanied by an affidavit from a Hamilton County sheriff's detective, who said Baas copied information from the Little Rock-based company's servers onto CDs, which were found in Baas' home. - - - - - - - - - - Woman kidnapped in PS0.5m IT theft IT companies are being urged to review their physical security after the financial director of a computer distributor was kidnapped and forced to help burglars steal computer equipment worth more then PS500,000. The kidnap of the 30-year-old woman and subsequent robbery, which are reminiscent of attacks normally carried out against bank staff, represent a disturbing new trend in crimes against IT companies. - - - - - - - - - - GNU servers 'owned' by crackers since March Crackers owned the primary file servers of the GNU Project from mid-March until two weeks ago, the Free Software Foundation admitted this week. The attack raises concerns about whether malicious code could have been inserted in the software available for download, including some Linux applications. - - - - - - - - - - Congress lowers funding for intelligence, cybersecurity The House and Senate showed a reluctance to fully fund the White House's budget request for Homeland Security Department's work on intelligence and infrastructure protection in legislation that would fund the department for fiscal 2004. - - - - - - - - - - Calif. Eyes Strong Privacy Policy Faced with the possibility of an expensive campaign to defeat a threatened ballot initiative, California's financial industry set aside its opposition to a comprehensive information privacy law Thursday and announced a last-minute compromise with privacy groups. The deal gives legislators a deadline of Tuesday evening to pass a version of a financial privacy law backed by California State Sen. Jackie Speier (D-San Francisco/San Mateo) which imposes restrictions on how banks and insurance companies can share information about their customers.,1283,60037,00.html - - - - - - - - - - Software exposes California recall to tampering As if elections officials in California don't have enough to worry about as they prepare for a bewildering Oct. 7 recall vote, computer scientists say shoddy balloting software could bungle the results and expose the election to fraud. Their worst-case scenario is the accidental deletion or malicious falsification of ballots from the 1.42 million Californians voting electronically 9.3% of the state's 15.3 million registered voters. - - - - - - - - - - Online document search reveals secrets Many documents published online may unintentionally reveal sensitive corporate or personal information, according to a US computer researcher. Simon Byers, at AT&T's research laboratory in the US, was able to unearth hidden information from many thousands of Microsoft Word documents posted online using a few freely available software tools and some basic programming techniques. - - - - - - - - - - Software tool steals data via Bluetooth A UK researcher has developed a sniffing tool to demonstrate security holes in the wireless technology. The software tool could allow confidential information to be stolen from mobile communication devices over the air, according to science magazine New Scientist. The tool, Red Fang, was created by Ollie Whitehouse, a UK-based researcher with computer security firm @Stake, to stress the dangers of running badly configured Bluetooth devices. People are often unaware that Bluetooth is enabled on their devices, and the security features are often inactivated. - - - - - - - - - - Spam fuels boom in secure content market Junk mail is an increasing problem but the search for an effective cure remains fraught with difficulties. That's the message we take from a slew of recent surveys on the subject. - - - - - - - - - - Post-9/11 steps help business computers in outage Disaster recovery preparations after the Sept. 11, 2001 attacks helped protect U.S. business computer systems during the biggest electrical blackout in North American history, data recovery experts said Friday. Data recovery companies said they were surprised by how few of their clients had issues the day after power supplies were wiped out across much of the Northeastern United States and nearby parts of Canada. - - - - - - - - - - Will MSBlast finally teach us a lesson? Two years after the Code Red and Nimda worms spread across the Internet, home users and many companies still aren't doing enough to secure themselves against Internet threats, said security experts. "Software is still flawed, people are still not patching, and companies are still not making security a focus," said Marc Maiffret, chief hacking officer for security software maker eEye Digital Security. "They didn't after Code Red, they didn't after Nimda, and they didn't after Sapphire/Slammer. Mostly likely, they won't after this worm either." Why Computer Worms Never Die - - - - - - - - - - Why Your ID Is Such Easy Picking With Social Security numbers so commonly used on insurance and health-care cards, a stolen wallet can easily lead to a much bigger headache. Identity theft skyrocketed 81% in 2002, a statistic so shocking that it seemed unreal -- until it happened to my sister. Last weekend, she had her wallet pinched. Within six hours, the thieves, clearly professionals, had charged $5,000 to each of her credit cards and wiped out much of her bank account by using her debit card to "purchase" limousine services from a nonexistent company. Worse, the thieves also obtained her Social Security number, which was printed on her health-insurance member card. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.