NewsBits for September 10, 2003 sponsored by, Southeast Cybercrime Institute - www.cybercrime.kennesaw.edu ************************************************************ Cybercrime Charges Slapped on Virus Suspect A 24-year-old Romanian man, accused of unleashing an Internet worm called "Blaster.F," has been charged with cybercrime offences carrying up to 15 years in prison, police said on Wednesday. Police said Dan Dumitru Ciobanu, had admitted spreading the virus, a low-grade variant of the highly damaging Blaster worm, but had told investigators it was an accident. Ciobanu's arrest last week followed that of an American teenager accused of creating another Blaster strain. Romania's tough new cybercrime law, which covers online fraud, hacking and virus-writing, carries a sentence of three to 15 years, more than twice the maximum sentence for rape. http://www.reuters.com/newsArticle.jhtml?type=internetNews&storyID=3419555 http://zdnet.com.com/2100-1105_2-5073931.html http://computerworld.com/governmenttopics/government/legalissues/story/0,10801,84776,00.html - - - - - - - - - - Two Brits charged with releasing TK worm Two British men were charged on Monday with conspiring to take over computers using malicious code. Jordan Bradley, 20, of Bates Avenue, Darlington, and Andrew Harvey, 22, of Scardale Way, Durham, are believed by the National High Tech Crime Unit (NHTCU) to be members of an underground cracking group called the "Thr34t-Krew" who launched the TK Worm (AKA Troj/TKBot-A) sometime before February this year. http://www.theregister.co.uk/content/56/32751.html - - - - - - - - - - Hacker who altered Yahoo database surrenders A hacker who has acknowledged involvement in computer break-ins at the New York Times newspaper, Yahoo! and other large corporations surrendered Tuesday on a federal arrest warrant related to alterations of the Times' databases. Adrian Lamo, 22, turned himself in to marshals at the U.S. federal courthouse in Sacramento, said FBI spokeswoman Karen Twomey Ernst. He is charged with altering the Times' databases between February and April 2002, causing the New York Times Co. damages exceeding $25,000. http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/1063157672056_37///?hub=SciTech http://www.cnn.com/2003/TECH/internet/09/10/hacker.arrest.ap/index.html http://www.theregister.co.uk/content/55/32747.html http://computerworld.com/securitytopics/security/story/0,10801,84766,00.html - - - - - - - - - - Paedophile jailed for life after befriending mother in Asperger's chat room A predator paedophile was sentenced to life on September 9 for abusing a seven-year-old girl whose mother he had befriended through a website chat room about Asperger's syndrome, Neil Robertson had conned his way into a family's friendship, seduced the mother and molested her daughter. And the judge, Lord Reed, won the praise of the young victim's family for his tough stance at the High Court in Dunfermline. http://www.awares.org/pkgs/news/news.asp?showItemID=266&board=&bbcode=&profileCode=SSion;= - - - - - - - - - - Online piracy criminal prosecution hailed as a world first Three Sydney men face jail after pleading guilty last week to breaking copyright laws in what the Australian recording industry believes is the world's first criminal prosecution for online music piracy. Until now legal action against music websites such as Napster have relied on civil law and record industry representatives said the criminal case sent a powerful message that music piracy would face the full force of the law. Tommy Le, 19, Peter Tran, 20, and Charles Kok Hau Ng, 20, last week pleaded guilty to infringing the copyright of music giants Universal Music, Sony, Warner, BMG , EMI and Festival Mushroom Records. http://story.news.yahoo.com/news?tmpl=story&cid=1509&ncid=738&e=6&u=/afp/20030907/tc_afp/australia_music_piracy - - - - - - - - - - Stiff sentences for biggest UK credit card fraudsters The computer technician at the centre of Britain's biggest ever credit card fraud was yesterday jailed for nine years. Sunil Mahtani, 26, a former IT worker at Checkline plc, the firm that processed Heathrow Express's credit card transaction, pleaded guilty last week to downloading almost 9,000 credit card numbers from Checkline's systems. He sold this information on to a gang of crooks who obtained goods worth PS2 million over three years using cloned cards that matched the data Mahtani supplied. http://www.theregister.co.uk/content/55/32755.html - - - - - - - - - - Knight Ridder newspaper sites hit by denial of service attack The Web sites of Knight Ridder's 31 daily newspapers slowed to a crawl or were made inaccessible by a denial-of-service attack that lasted for several hours earlier this week. The sites, which include the Internet homes of The Miami Herald, The Philadelphia Inquirer and San Jose Mercury News, came under attack Tuesday morning, and technicians had restored the services by 11:45 a.m., said Amy Dalton, spokeswoman for Knight Ridder Digital. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/6738442.htm - - - - - - - - - - SoBig shuts down ... for the moment SoBig.F is due to deactivate today, but experts are already waiting for the next variant of the virus to start spreading. There have been six variants on the SoBig virus since it was first detected in January. Each successive version has displayed improved code and more adept social engineering, and future versions are expected to be developed along similar lines. http://www.vnunet.com/News/1143513 Sobig-F is dead http://www.theregister.co.uk/content/56/32760.html - - - - - - - - - - One Voice on Piracy Warner Music Group Chairman Roger Ames wouldn't budge. The industry veteran refused last summer to join an effort by his four major competitors to sue illegal downloaders who were crushing the industry's bottom line. Ames insisted that before the labels unleashed their attorneys and risked a potential public relations backlash, they needed to provide consumers with an alternative, a place where the pirates could legally download songs from all five major record companies. (LA Times article, free registration required) http://www.latimes.com/technology/la-fi-behind10sep10133420,1,7595174.story N.Y. Girl Settles RIAA Case http://www.latimes.com/technology/la-fi-girl10sep10230419,1,1349659.story http://zdnet.com.com/2100-1105_2-5073717.html http://www.wired.com/news/digiwood/0,1412,60366,00.html http://www.vnunet.com/News/1143512 http://www.theregister.co.uk/content/6/32740.html http://www.wnbc.com/technology/2465365/detail.html http://www.nypost.com/news/regionalnews/5349.htm http://www.nydailynews.com/front/story/116117p-104761c.html P2P group: We'll pay girl's RIAA bill http://news.com.com/2100-1027_3-5074227.html http://www.vnunet.com/News/1143514 File-Sharing Firms Await Suits' Outcome http://www.latimes.com/technology/la-fi-file10sep10,1,4585173.story Music downloading suits could drive backlash against industry http://www.siliconvalley.com/mld/siliconvalley/news/editorial/6736694.htm http://www.cnn.com/2003/TECH/internet/09/10/backlash.music.ap/index.html File-swap suits strike a nerve (series of articles) http://news.com.com/2009-1032_3-5073343.html RIAA sued for amnesty offer http://news.com.com/2100-1027_3-5073972.html http://www.wired.com/news/digiwood/0,1412,60376,00.html Profiling the music pirates http://money.cnn.com/2003/09/10/technology/pirates/index.htm Murky laws make piracy suits less likely in Canada than U.S. http://www.globetechnology.com/servlet/story/RTGAM.20030910.wxmecdcd10/BNStory/Technology/ - - - - - - - - - - House moves toward passing identity theft legislation Legislation awaiting House approval would give people new arms against identity theft, offering free credit reports and an easier way to block thieves from opening fraudulent accounts. Those steps were among the changes that lawmakers were debating Wednesday to the Fair Credit Reporting Act, which contains provisions that must be renewed by year's end. http://www.usatoday.com/tech/news/techpolicy/2003-09-10-fed-idtheft-laws_x.htm - - - - - - - - - - Lawmakers aim to get tough on malicious code House subcommittee members were frustrated Wednesday in their efforts to find out just who is releasing all of these computer worms and viruses. Neither government officials nor industry experts testifying before the Government Reform Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census were able to identify the culprits. http://www.gcn.com/vol1_no1/daily-updates/23467-1.html Top Security Pros to Talk Worm Defense http://www.eweek.com/article2/0,4149,1259505,00.asp http://news.com.com/2100-1028_3-5074304.html - - - - - - - - - - Pa. stops blocking child porn sites Prosecutors in Pennsylvania have agreed to stop blocking Web sites that may contain child pornography until a court determines whether the procedure is constitutional, a civil liberties group said on Tuesday. Pennsylvania prosecutors will not ask Internet service providers to block suspected child-porn Web sites until Nov. 21, when a judge will consider whether the procedure violates free-speech and due-process rights, an official with the Center for Democracy and Technology said. http://zdnet.com.com/2110-1105_2-5073933.html - - - - - - - - - - P2P Taken to Task for Child Porn Senators turned a critical eye to file-trading networks Tuesday in a hearing the explored the use of peer-to-peer services for the exchange of illegal pornography. While no new legislation was introduced, the hearing, convened by the Senate Judiciary Committee, focused on increasing criminal exploitation of file-sharing technologies to distribute child-porn images. http://www.wired.com/news/business/0,1367,60368,00.html Music lobby frightens Congress with P2P kiddie-porn nightmares http://www.theregister.co.uk/content/6/32762.html - - - - - - - - - - Abbott Unveils Cyber Crimes Unit In S.A. Texas Attorney General Greg Abbott unveiled a new crime-fighting tool to track down suspected child predators. Abbott, who made the announcement Monday at a news conference at Vidaurri Park in San Antonio, said a new cyber crimes unit has been surfing the Web looking for criminals who prey on children. The unit has already arrested nine men who had been previously convicted of child-sex crimes for violating their parole, Abbott said. Posters of the suspects were displayed on an easel. http://story.news.yahoo.com/news?tmpl=story&u=/ibsys/20030908/lo_ksat/1777610 - - - - - - - - - - Microsoft discloses serious new Windows vulnerability Moments before a top Microsoft executive told Congress about efforts to improve security, the company warned on Wednesday of new flaws that leave its flagship Windows software vulnerable to Internet attacks similar to the Blaster virus that infected hundreds of millions of computers last month. Microsoft urged customers to immediately apply a free repairing patch from its Web site. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/6738575.htm http://www.securityfocus.com/news/6932 http://www.sfgate.com/cgi-bin/article.cgi?f=/news/archive/2003/09/10/national1403EDT0660.DTL http://zdnet.com.com/2100-1105_2-5074008.html http://www.washingtonpost.com/wp-dyn/articles/A55819-2003Sep10.html http://www.msnbc.com/news/964552.asp http://www.usatoday.com/tech/news/computersecurity/2003-09-10-windows-hole_x.htm http://computerworld.com/securitytopics/security/holes/story/0,10801,84775,00.html IRS Blasts Worm With Autonomic Software http://www.eweek.com/article2/0,4149,1260357,00.asp http://www.theregister.co.uk/content/56/32761.html Industrious Worm vs. Lazy IT? http://www.newsfactor.com/perl/story/22253.html The Virus of Youthful Irresponsibility http://www.businessweek.com/technology/content/sep2003/tc2003099_6173_tc047.htm - - - - - - - - - - China shuts door to spam China has blocked 127 servers sending high volumes of unsolicited email, in an attempt to change its reputation as a spammers' safe haven. China has woken up to the problem of spam and blocked 127 servers identified as sources of high volumes of unsolicited email. http://news.zdnet.co.uk/internet/security/0,39020375,39116233,00.htm http://silicon.com/news/165/1/5930.html No Truce in the Spam Wars http://www.wired.com/news/business/0,1367,60357,00.html First UK ruling under new email marketing regime http://www.theregister.co.uk/content/67/32764.html - - - - - - - - - - Apparent security hole highlights danger of e-voting The strange case of an election tally that appears to have popped up on the Internet hours before polls closed is casting new doubts about the trustworthiness of electronic voting machines. During San Luis Obispo County's March 2002 primary, absentee vote tallies were apparently sent to an Internet site operated by Diebold Election Systems, the maker of the voting achines used in the election. http://www.usatoday.com/tech/news/techinnovations/2003-09-10-electronic-voting-problem_x.htm - - - - - - - - - - SuperGlue helps data stay legal Informatica's metadata-management system is designed to help corporations deal with increasingly stringent and complex data-protection requirements. Enterprise software developer Informatica on Wednesday launched a Web-based metadata management system, designed to help organisations meet the legal requirements set out in the UK's data protection act and the Sarbanes- Oxley legislation in the US. http://news.zdnet.co.uk/business/legal/0,39020651,39116232,00.htm - - - - - - - - - - Viruses are here to stay Thanks partly to human nature, we can expect no relief from virus attacks. It may never be safe to lower our guard. Combating viruses should be an easy job. If we could all promise not to send executable attachments to one another: be they programs or Microsoft Office documents that support macros; rude or clever screen savers; or even just fancy HTML pages that download something we don't see. http://www.vnunet.com/Comment/1143484 - - - - - - - - - - Hardening the TCP/IP stack to SYN attacks Most people know how problematic protection against SYN denial of service attacks can be. Several methods, more or less effective, are usually used. In almost every case proper filtering of packets is a viable solution. In addition to creating packet filters, the modification of the TCP/IP stack of a given operating system can be performed by an administrator. This method, the tuning of the TCP/IP stack in various operating systems, will be described in depth in this article. http://www.securityfocus.com/infocus/1729 - - - - - - - - - - BigChampagne is Watching You In fact, they're tracking every download and selling the data to the music industry. How one company is turning file-sharing networks into the world's biggest focus group. Joe Fleischer twists restlessly in his Aeron chair and nods at the voice on the other end of the telephone. Tapping his fingers on his computer's mouse, he stares out the window of his Beverly Hills office at the new BMWs and battered Celicas inching down Wilshire Boulevard. "Uh-huh, uh-huh," he says. "Got it." Fleischer is talking to a client, an executive at one of the major labels who's working a band he's sure could go platinum, if only radio would give the group a chance. http://www.wired.com/wired/archive/11.10/fileshare.html - - - - - - - - - - TVs to alert police when they're stolen Big Brother technology that already allows people to be tracked through their mobile phones could soon be installed in household objects, tipping off police if they are stolen. Televisions, DVD players and computers could be fitted with microchips identifying their location and their normal proximity to each other, automatically alerting police if they change unexpectedly, according to a scientist on Wednesday. http://www.cnn.com/2003/TECH/ptech/09/10/science.future.reut/index.html Big Brother's in the House http://www.wired.com/news/technology/0,1282,60373,00.html - - - - - - - - - - Flash Mobs Get a Dash of Danger Flash mobs, spur of the moment mass gatherings originally intended to foster foolishness, have turned ugly in some locations. The mob events, now happening around the world, are an e-mail driven experiment in organizing groups of people who suddenly materialize in public places, perform some silly scripted activity, and then disperse as suddenly as they appeared. http://www.wired.com/news/culture/0,1284,60364,00.html *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; www.cybercrime.kennesaw.edu *********************************************************** Search the NewsBits.net Archive at: http://www.newsbits.net/search.html *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits (www.newsbits.net) should be cited as the source of the information. Copyright 2000-2003, NewsBits.net, Campbell, CA.