Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Russian Gang Hijacking PCs in Vast Scheme

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
RamboLiberal Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Aug-05-08 10:25 PM
Original message
Russian Gang Hijacking PCs in Vast Scheme
Source: NY Times

A criminal gang is using software tools normally reserved for computer network administrators to infect thousands of PCs in corporate and government networks with programs that steal passwords and other information, a security researcher has found.

The new form of attack indicates that little progress has been made in defusing the threat of botnets, networks of infected computers that criminals use to send spam, steal passwords and do other forms of damage, according to computer security investigators.

Several security experts say that although attacks against network administrators are not new, the systematic use of administrative software to spread malicious software has not been widely seen until now.

The gang was identified publicly in May by Joe Stewart, director of malware research at SecureWorks, a computer security firm in Atlanta. Mr. Stewart, who has determined that the gang is based in Russia, was able to locate a central program controlling as many as 100,000 infected computers across the Internet. The program was running at a commercial Internet hosting computer center in Wisconsin.

-----

One of the unique aspects of the malicious software is that it captures screen information in addition to passwords, according to Mark Seiden, a veteran computer security engineer. That makes it possible for gang members to see information like bank balances without having to log in to stolen accounts.



Read more: http://www.nytimes.com/2008/08/06/technology/06hack.html?hp
Printer Friendly | Permalink |  | Top
Extend a Hand Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Aug-05-08 10:30 PM
Response to Original message
1. I hope this isn't the i-9/11 that Lessig talks about.
http://www.infowars.com/?p=3753

I know it's infowars, but Lessig is a stanford professor and definitely not a crackpot.


During a group panel segment titled “2018: Life on the Net”, Lessig stated:

There’s going to be an i-9/11 event. Which doesn’t necessarily mean an Al Qaeda attack, it means an event where the instability or the insecurity of the internet becomes manifest during a malicious event which then inspires the government into a response. You’ve got to remember that after 9/11 the government drew up the Patriot Act within 20 days and it was passed.

The Patriot Act is huge and I remember someone asking a Justice Department official how did they write such a large statute so quickly, and of course the answer was that it has been sitting in the drawers of the Justice Department for the last 20 years waiting for the event where they would pull it out.

Of course, the Patriot Act is filled with all sorts of insanity about changing the way civil rights are protected, or not protected in this instance. So I was having dinner with Richard Clarke and I asked him if there is an equivalent, is there an i-Patriot Act just sitting waiting for some substantial event as an excuse to radically change the way the internet works. He said “of course there is”.


Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-06-08 12:31 AM
Response to Reply #1
3. Radical change? No.
Most of the PATRIOT act simply gave legal cover to technologies and techniques that were already in daily use.

Read that again, in case it didn't sink in.

An e-9/11 event (and resulting legislation) would make the technology *in use right now* admissible in a court of law, and provide legal cover for those practicing in the field.

Deep packet content inspection? In use. Per user content sniffing? In use. Warrantless gathering and investigation of "private" internet traffic? In use. Government cyber-war equipment and attacks? In use. Per-user behavioral monitoring? In use. Geo-location of user traffic? In use.

Arresting and imprisoning US internet users for having websites the government didn't like? Already happening. Warrantless data-tapping used in courts? Already happening. Entire machines and networks being blocked/eliminated from the 'net in real-time? Already happening.

The biggest change would be that people would know what their government (and private agencies, at the government's request) had been doing for years... and then, like the PARIOT act, they'd shrug, and say simply say "it hasn't hurt me yet" (unless, of course, they're already in jail for being a "terrorist", or whatever).
Printer Friendly | Permalink |  | Top
 
hunter Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-06-08 03:18 AM
Response to Reply #3
4. They are plugged into the phone networks too.
As you say, these days a warrant is something that makes evidence admissible in court, it's not something that protects you from from eavesdropping.
Printer Friendly | Permalink |  | Top
 
crikkett Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-06-08 11:36 AM
Response to Reply #3
5. excellent post. n/t
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-06-08 12:13 AM
Response to Original message
2. In all fairness, the NYTimes is woefully backwards on technology.
I almost didn't have to click the link to guess it was more Markoff pablum. The epithet Markoff is usually referenced with is left as an exercise for the reader, but a few things about this article stand out:

1. Using shared/distributed root/administrator accounts and network tools to take over networks is, indeed, a "new" problem, if we happen to be still living in the 1970's.
2. Botnets are old (1980's technology), boring, and huge. They're a massive headache, but until Microsoft makes a serious effort about the security of their operating systems, they're a fact of life. Yet again, nothing new.
3. This is basically a puff-piece to pimp out a black-hat presentation, a presentation that will likely be scoffed at by any serious computer researcher. Maybe techno-illiterate journalists or newspaper readers, or script-kiddies might be impressed, but this is just plain shoddy journalism.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sun May 05th 2024, 03:08 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC