Hackers Declaring Cyberwar on Facebook and Myspace

I’ve been seeing this headline pop up all over the place the last few days: Hackers Declaring War On MySpace, Facebook? My question is: who are these hackers? Is there a central organisation of hackers that have decided to declare this war? Should Facebook and MySpace fight back? The best defense, after all, is a good offense. (SC Magazine) “If the hackers know you have a particular interest, this can be used to target you in a phishing attack. They know what you’re into and can exploit this to obtain more information from you such as credit card details,” he said. “People are putting far too much information online and into the hands of identity thieves. Young people in particular, need to be very careful as it may come back to haunt them.” Those of us with an above average IQ know the vulnerability MySpace, Facebook, and other social networking sites present to our identity. Still, all this hubub begs the question: where are these hackers? Furthermore, should I join up? I’ve been a hacker for years, and there’s apparently some money in harvesting this information. Do these hackers have an HR department I can apply to? It’s simply ridiculous to use terms like CyberWar and hackers when it comes to stories like this, but still the media persists....

Jedi Hacker School Enrollment Now Closed for the Season

Howdy.  My power’s out at my house, so I’m just sitting around the office waiting for sleep to overtake me.  I would sleep at my house, but I can’t see at all to walk the long corridor to my door, nor can I clean off my bed properly in the dark.  Call me short-bus, I just found it easier to get back in the car and drive to the office.  The hurricane seems to be over, for the most part.  I turned the Weather Channel back on my PDA since the WFOR stream has been permanently overloaded since the storm started.  According to the current radar gimmick the last yellow band has passed my area.  Yay, happy.  These people are busting such nuts over this.  They’re making computer graphics of what they think Pompano Beach may look like with three feet of flood water.  Freakin’ dorks. I’ve finished the queuing system, and it’s in Beta.  I need all the Blip users to keep a close eye on their RSS streams and let me know if they fail to generate within 15 minutes of creation, as that is the deadline set within the system for RSS/profile file creation.  It’s going to reduce the load on the server by 90% at least, which is great, and will be truly amazing once it’s migrated to the new server. Since I’m such a Jedi Master coder, I’ve decided to take on a Padawan.  Kelly has been getting heavy into the art of design, and she’s been taking forays into backend coding.  I’ll be there to keep her from straying to the dark side...

Hackers in the News

There have been a number of hackers in the news over the hurricane/holiday weekend.  I haven’t really been staying on top of this with all the hurricane coverage (as well as the ongoing debate between DJ Colonoscopy and myself), but here’s what I’ve found recently: Teen Hacker Controls EbayBy Nick Farrell: Tuesday 07 September 2004, 12:30GERMAN POLICE HAVE arrested a 19 year-old hacker who claims he managed to control the local domain of E-bay. Apparently, the hack happened at the end of August when the teen managed to direct punters on the eBay.de site to a different domain name server (DNS). What is scary is that the hacker is not exactly an expert, and had found the instructions on how to fudge the transfer when he stumbled across a web-page. The teen decided to request a transfer for several sites including Google.de, Web.de, Amazon.de and eBay.de for a laugh and was amazed when it worked. According to the police spokesman, the teen didn’t want to cause damage and was a little shocked when he was told that he had managed to become the new owner of eBay.de. The domain has now been returned to its rightful owner and the would be hacker is finding himself charged by Inspector Knacker of the Yard. Hacker’s Reward – Target: the Motorola v710Posted Sep 6, 2004, 11:07 AM ET by Simon SpagnolettiNone too happy about the fact that Verizon has deliberately crippled Bluetooth on the Motorola V710, Jonathan A. Zdziarski is offering a bounty to anyone who can successfully hack the phone and restore the OBEX and OPP Bluetooth features which have been...

Electronic Jihad To Strike Thursday? Don't Bet On It

By Gregg Keizer, TechWeb News A coordinated attack against the Internet, dubbed an “electronic jihad,” may be as close as tomorrow, one security firm warned Wednesday. Other experts, however, were dubious. According to a report on the Russian news service RIA Novosti, Eugene Kaspersky of the Moscow-based Kaspersky Labs has warned about a large-scale attack that might be delivered by Islamic terrorists. Kaspersky and other security analysts have noted claims on Arabic-language Web sites that announced an attack will launch August 26. The main targets — no surprise — of the attack would be against political and financial Web sites in the U.S., Israel, and Western European nations, Kaspersky alleged. “The hackers who have proclaimed ‘electronic jihad’ have enough experience and resources to paralyze the Internet for several hours at least,” Kaspersky was quoted as saying. “It is ghastly enough that these people have mentioned ‘electronic jihad’ for the first time.” Executives at Kaspersky Labs were unavailable for comment, but as of mid-day Wednesday, the security company’s Web site rated virus activity as “green,” indicating that everything’s “normal.” But since even Kaspersky has no firm details, other security professionals said it’s unlikely anything out of the ordinary would happen Thursday. “We don’t think anything really major will happen,” said nearby F-Secure, an anti-virus firm based in Finland, in a statement on its Web site. “Why would anybody announce an attack like this beforehand?” Cupertino, Calif.-based Symantec agreed. “We don’t see anything unusual developing,” said a Symantec spokesperson Wednesday. Symantec operates a global network of threat detection sensors, dubbed DeepSight Threat Network; DeepSight hasn’t spotted any evidence of an impending...

International hacker ring busted

p2pnet.net News:– A large international network of hackers who stole computer programmes, films and music and then sold them on the black market has been broken up by Polish police. Police in Gorzow Wielkopolski, western Poland, smashed a ring involving more than 100 people and active in Poland, the US, Australia, Britain and Slovakia, police spokeswoman Agata Salatka told Agence France-Presse. Five Polish computer programmers thought to be the group’s leaders were arrested and face up to eight years in prison, she said. The hackers got into the computers in universities and technical institutes in several countries, “using the large memory of the powerful computers to stock, without the knowledge of the owners, the most modern programmes, music, games and the most recent films,” AFP quotes Salatka as saying. The gang was “shadowed” by Gorzow Wielkopolski police last October, aided by the FBI and police in Britain and Slovakia, adds the story. [via...

Feds: Anger drove Varian hacker: `Disgruntled' ex-programmer accused of erasing code

By Jay FitzgeraldTuesday, August 24, 2004 A vindictive software programmer upset about his cancelled contract snuck into Varian Semiconductor Equipment Associates Inc.’s computer system and zapped out e-commerce coding he and others had been developing, U.S. Attorney Michael Sullivan charged yesterday.      Patrick Angle, 34, now of Columbus, Ind., was hit with one charge of intentionally damaging a protected computer system, Sullivan’s office said yesterday.      Angle and his attorney could not be reached for comment yesterday.      According to Sullivan’s office, Angle became “disgruntled” with Varian after working as a full-time employee and then later as an independent contractor.      Angle started working for Varian in 2001, moving his family from Indiana to New Hampshire, where he regularly commuted to Varian’s headquarters in Gloucester. His job: developing Varian’s e-commerce software that would allow the firm to conduct business with its vendors.      Angle later moved back to Indiana, with the intention of performing his duties via the Internet from his Midwest home. But Varian made him a contract employee without benefits, a move Angle “resented” and believed violated agreements, Sullivan’s office said.      He was told last September his contract would be terminated. Nine days later, Sullivan’s office said, Angle logged into Varian’s computer system from his home and deleted the coding he had been developing with others and tried covering his cyber tracks by altering computer logs.      The action was to “vent his frustration with Varian,” prosecutors said.      The software code was later retrieved “at great expense,” costing Varian $26,455, Sullivan’s office said.       A spokesman for Varian could not be reached for comment.      If convicted, Angle faces a maximum sentence of 10...

Virus alert: Rbot sets your webcam to spy on you

Jo Best : silicon.com : August 23, 2004 A new worm has been discovered in the wild that’s not just settling for invading users’ PCs – it wants to invade their homes too. The Rbot-GR virus follows a fairly traditional malware route of exploiting Microsoft security vulnerabilities and installing a Trojan horse on infected machines. However, the worm also spies on users by taking control of their webcam and microphone, then sending images and soundtracks back to the hackers, according to antivirus firm Sophos. As well as getting an insight into homes and businesses across the world, the worm also allows the malware writer to take a look at information on the infected machine’s hard drive and to steal passwords, as well as launching denial-of-service attacks. Graham Cluley, senior technology consultant at Sophos, said that the virus could be used for industrial espionage – or simply by a nosey hacker to take a look into people’s bedrooms. “Whether this worm is the work of professional snoopers or lusty teenagers – it’s hard to say for certain. What we do know if that there have been a few hundred different versions of the Rbot worm, all of which have been designed to gain some kind of remote access to innocent users’ data. This one goes further by also specifically collecting webcam footage,” Cluley said. “It seems more and more hackers are building a cocktail of different functionality into their creations.” For those who have the virus, they may be unaware their every move could be being tracked by remote hackers. An infected webcam may show an “active light” when it’s being...

Web page to help with installation of WIndows anti-hacker security patch

Information Technology Systems and Services (ITSS) has created a Web page that will walk Microsoft Windows XP users on campus through a major update being released worldwide this month to make the operating system less vulnerable to computer hackers and viruses. Downloading of “Service Pack 2” will change how Internet Explorer handles pop-up windows, consequently affecting users of business applications such as Kronos, PeopleSoft and Oracle Financials. The Web page that ITSS has set up will guide staffers through the installation process and the reconfiguration of Windows XP once it has been updated. The page at www.stanford.edu/dept/itss/ess/pc/xpsp2/index.hml also contains a tool that will assist with the reconfiguration and that should be downloaded and run after users have completed the update. Microsoft initially made the patch available to Windows XP users in mid-August, through an automatic-update service built into the operating system. But not everyone uses the automatic update, which will deliver the patch to a limited number of Windows XP users worldwide per day, said Jay Stamps, an ITSS technical support consultant. Service Pack 2 should be available through the Microsoft Windows Update site, http://windowsupdate.microsoft.com, in late August. Stamps said that date is approximate because Microsoft has changed the release date several times. Even with a fairly fast Internet connection, the installation could take two hours or longer to complete, and the download requires at least 1.8 gigabytes of free disk space, Stamps said. He added that the majority of computers on campus are PCs. The need to install the patch isn’t as urgent for Windows XP users who downloaded Service Pack 1 and subsequent updates. But as soon...

Congressional Report Dumps on CAPPS II Last year, when Cogress let the TSA go ahead with CAPPS II, its controversial passenger-profiling databse, it attached a set of eight supposedly measurable standards that the system would need to pass to be funded. Now, in utterly unsurprising news, a Congressional probe has found that CAPPS is failing those standards with flying colors. According to the report, the TSA failed to address privacy concerns, failed to find a way of dealing with false positives, failed to secure the system safe from hackers, and failed to show that the system would help in finding potential terrorists. The report’s fierce criticism may prevent CAPPS II from being funded at all. Yay. [via...

[Rizzn’s Note: Slashdot/Alterslash has an excellent Q&A session with Adam Davidson up on their sites right now combining two very interesting spheres of influence: a LUG (Linux Users Group) in IRAQ.  Quotes below.] Answers On LUGs, Life, and Linux in Iraq – by Roblimo (36% noise) View SkipAdam Davidson is an American reporter who has been in Baghdad for many months, and in his ‘spare time’ helped start Iraq’s first LUG. We sent him <a title="Editor’s note: Subscription or annoying ad required to view complete story” href=”http://interviews.slashdot.org/article.pl?sid=04/01/25/1916219&tid=106″>your questions last week, and he’s replied in great detail, not only about the LUG itself but also with a rare ‘geek’s eye view’ of daily life in Baghdad, and comments about how the Iraqi IT infrastructure (and laws controlling it) are being (re)built. [California Cybercafe Regulation Decision Released] Activate Tinfoil Hat! – by American AC in Paris (Score: 5, Insightful) ThreadWhat the iLug needs most is: 1. Money. 2. Information. 3. Technical help. Free software, hackers, and Iraq, all wrapped up into the same organization? Danger! Danger! Potential terrorist organization detected! Seems only a few weeks ago we would have run the risk of getting our asses detained for violationg the Patriot Act. Now that this part of the Patriot Act has been ruled unconstitutional, though, we’re safe to help these guys out. <voiceover style=“announcer:campy-1950’s-sci-fi;”> or are we? </voiceover> [via...

Zombie Army of MyDoom Drives SCO from Its URL:Under intense DDoS bombardment from the approximately one million MyDoom-infected computers, SCO abandoned ship at www.sco.com in favor of the more-of-a-mouthful www.thescogroup.com. SCO plans to return in about two weeks, after the deluge is scheduled to end. When it comes to vulnerabilities in our information infrastucture, we’re only a couple of small steps away from skilled hackers being able to delete anyone they dislike from the Internet. That’s scary, and some of the possible reactions are even scarier. [via...

OSINT: FBI on look-out for foreign government hackers How seriously does the U.S. government take computer intrusion? Seriously enough for the threat of foreign hacking to take a prominent role in new rules governing the FBI’s national security investigations issued by U.S. Attorney General John Ashcroft this week. [ The Register...

TheJacksonChannel.com – Technology – 'Drive-By Hackers' Target Wireless Computer Networks

‘Drive-By Hackers’ Target Wireless Computer Networks Home, Office Systems Are Vulnerable POSTED: 3:08 p.m. EST November 3, 2003 SAN DIEGO — Do you have wireless Internet? If you do, you’ve also got a potential security problem on your hands. Hackers can intercept your signals while going past your home, your office and anywhere else you can take a laptop, or a hand-held computer. What they can do with those signals could ruin your life and many others. There are millions of hackers who can break into a wireless computer or even a Palm Pilot or Blackberry. They are called drive-by hackers, and they gain access by picking up the wireless broadcasts from some distance away. They like to get in their cars and go “war driving,” as they call it. Most don’t misuse the data they find, but there are plenty of hackers out there who could do incredible harm. To see how it is done, television station KNSD sent a reporter war driving with San Diego computer security consultant George Spillman. “I’m going to start scanning here as we’re driving down the road, and it’s going to start naming off the (access points) as we pick them up,” Spillman said. After 15 minutes of war driving past shopping centers, apartment complexes and suburban neighborhood, Spillman logged hundreds of access points, or APs, for wireless networks. Too many are open doors for signal-stealing hackers who can learn your passwords, read your e-mail, use your credit card numbers and turn your home computer system into a weapon, the station reported. “They could be loading spam. They could be loading viruses...

Internet group starts anti-hacker initiative

: “Internet group starts anti-hacker initiative Wed Oct 22 @ 08:02 (Reads: 70) Source: Computer Weekly The Internet Software Consortium (ISC) has launched an internet crisis co-ordination centre to help protect the system from hackers. The Operations, Analysis and Research Center (OARC) will be used to study and monitor internet traffic so that technicians will be able to differentiate high-demand traffic spikes from high-intensity attacks on root servers. So far, members of the OARC include the Internet Society, Cisco Systems, MCI, XO Communications, UltraDNS, TLD operator Afilias and Verio, as well as many of the operators of the global root DNS name servers. ‘In our application, it’s very difficult to determine what ‘normal’ internet traffic conditions are. So we’re going to have to define ‘normal’ and go from there,’ said Paul Vixie, chairman of the ISC, which provides services for the internet’s Domain Name System (DNS). Before the root server attacks in October last year, when all 13 of the internet’s root DNS servers were hit by intruders in a massive distributed denial-of-service attack, there was no group set up to protect the DNS system globally. In the attack, DNS servers – which provide the vital translation services needed for converting a web name into a corresponding numerical IP address – were clogged with useless...

[rizzn’s note: It always seems that these Pakistani and India rivalry hacking/cracking/virus writing contest things they have always end up showing the ineptitude of the hax0rs involved. I don’t know why that is. All I can offer is that every person from Pakistan and India in hacking chatrooms and mailing lists are always asking me for advice on how to hack hotmail and yahoo mail, which should give you some idea of the intellect at work. If it doesn’t, all I can say is it’s a hax0r thing, you wouldn’t get it.] Politically motivated worm fails to spread Reuters – September 23, 2003, 09:00 BSTThe latest in a string of Yaha worms created by rival hackers from both India and Pakistan has been released Hackers claiming to be from India have launched their latest strike in a cyber-spat with Pakistan by unleashing a new variant of the “Yaha” Internet email worm, antivirus firm Sophos says. The worm, written by a group calling itself the Indian Snakes, does not appear to be spreading or causing any damage, said Chris Wraight, a technical consultant at UK-based Sophos. The Yaha-Q worm, the latest in a string of Yaha worms released by hackers from both countries since December, leaves a back-door on an infected machine and sends itself to people listed in the email address book, Wraight said. It also tries to disable anti-virus software and commands the computer to launch a denial-of-service attack on five Pakistani Web sites, he said. Such an attack is designed to shut down a Web site by sending so many repeat requests to the Web server that...

Dioxin Research[rizzn’s note: This is mostly a personal note. I’m doing research into Dioxin contamination for a project I’m working on. Likely I’ll not ever use the scientific data, as my side of the project relates more to the business side, but it’s always good to do your homework.] HybrizymePeople throughout the world need and want a clean environment and a safe food supply. It is our hope that the research we do and the products that we sell help achieve that end. Hybrizyme is developing an inexpensive test that measures the levels of dioxin-like chemicals. Currently, dioxin analysis costs range from $900 to $1,800 per sample and can only be performed in highly specialized laboratories. During a recent dioxin crisis in Belgium where citizens were exposed to dioxin-tainted meat, the need for low cost health assessment studies and environmental monitoring was clearly demonstrated. A cost-effective test also would enable scientists to expand research efforts to study the health effects of dioxins. Dioxin is an unintended byproduct of a variety of processes including forms of chemical manufacturing, incineration of municipal garbage and medical waste, open burning and the manufacture of chlorine-bleached paper products. Exposure to certain dioxins in animals and humans has been associated with biochemical and toxicological effects. The EPA is currently conducting a major reassessment of dioxin service. EPA scientists are providing much of the data needed to assist in the risk assessment. Hybrizyme’s technology measures levels of dioxin compounds in a sample using a recombinant Ah receptor. The Ah receptor present in humans and animals mediates most, if not all, of the harmful effects associated with...

I’m having one of the best conversations I’ve had in ages, with swordsaintzero. It’s one of those conversations you can only have with someone you’ve known for years and years. It’s peppered with references we know about each other and people we mutually know. It’s about how he was published in slashdot and I was published in 2600. It’s about our takes on transhumanism. It’s about becoming foglets. It’s about gentoo. It’s about being rich and being poor. Its about robots. It’s about the Matrix. Then we got to talking about how we are getting old. He tells me about his granpa’s and gramma’s passing, his little sister getting married. “A lot’s changed,” he said. “No kidding. We’re growing up, buddy,” I replied. “I dont want to. It’s like the whole 21 to 23 thing — I’m 25 now.” He sighed. “Fucking old man, my body hurts all the time, I think about things like insurance, I have a kid.” “I’m only a year behind you,” I said. “I found a grey patch in my beard the other day.” “I am fucking salt and pepper. My whole head.” I imagine he shakes his head in disbelief. “I feel silly when i go in hottopic! I feel like th old creepy guy. How fucked up is that?” “I know!” I exclaim. Because I do. “Lord.. what happenned?” “Our cron jobs are fscked up. I swear to god I want to change to a slower distro — 70+ years and a permanent reboot are not cool, man.” You know that strange nostalgic feeling you get sometimes? Maybe? Do you get that?...

April42089: backApril42089: did ya miss me?!Unclespam21: yay!!Unclespam21: yep;-)rzndourdn: i cried.April42089: :-Dgoodrzndourdn: because you were goneApril42089: im sureUnclespam21: no he didUnclespam21: he actualy wants 2 marry urzndourdn: it’s trueApril42089: okApril42089: i already have 5 husbands, whats 1 more?Unclespam21: a hell of a honey moonrzndourdn: Wow.April42089: hehUnclespam21: harzndourdn: is unclespam one of your husbands?April42089: yeaUnclespam21: :-!Unclespam21: i thoght was only me and adinaApril42089: nope, u were wrongrzndourdn: so one of your husbands is a girl?April42089: no, shes my wiferzndourdn: oh!April42089: got like 4 wivesrzndourdn: sweet sweet polygamyApril42089: lolUnclespam21: ha whos the bitch?Unclespam21: haharzndourdn: so do you ever get together with all of them and have orgies?April42089: of courseApril42089: sqeekrzndourdn: *oils april’s hinge*April42089: n english my teacher said not to talk and rite b4 that i said sqeek, so she looked at me and said…no squeeking etherApril42089: uh…my hinge doesnt need oiling thank u very muchrzndourdn: oh.rzndourdn: i figured it didrzndourdn: you were squeekingApril42089: no, no, no/rizzn [Listening to: (hackers)_04_(open_up)_leftfield – –...

FlyDLUX Update

I am starting to get hits on my hits on my website with the words FlyDLUX and FRAUD coming from Google. As an insider in the company, let me just put forth that FlyDLUX was always intended to be a legitimate company and if it continues to survive still intends to be a legitimate company. It has the unique opportunity to provide the public with a low cost alternative to international and first class air fare. The problems with the company and the reason we were unable to fulfill our duties to our customers is soley the fault of bad management, simply put. Key people within the company, already discussed on this website, were integral in the near demise of this company (and we aren’t out of the woods yet). Strict management of time and funds is what is needed by diligent members of the management in this company (something I and Rick hope to oversee personally) to keep its nose clean and afloat. Let me repeat – the management of FlyDLUX and it’s staff — to be specific: Mark Hopkins, Richard Rice, Lawrence Finkelstein, Barry Falber, Matthew Finkelstein, Krystin Lewis, and any other or employee contractor under this office’s employ — never intended to defraud anyone of their money. Any failure to deliver services was due to our strategic partner’s negligence, someone who technically has no ownership in the company, but has continually misappropriated funds we’ve paid him to purchase bulks of airline tickets. Presuming our company is able to financially move forward this week, this person (previously discussed in this blog) has agreed to personally repay the...

[Excerpt: It was the latest in a string of attacks on figures perceived to be collaborating with Iraq’s American occupiers. Fighters believed to be loyal to Saddam Hussein are trying to disrupt the U.S.-sponsored political process that envisages a new constitution and a democratically elected government before the end of next year.] http://abcnews.go.com/wire/World/ap20030920_304.html Member of Iraq’s Governing Council Shot, Critically Wounded in Assassination Bid in BaghdadThe Associated Press BAGHDAD, Iraq Sept. 20 — Aquila al-Hashimi, a member of Iraq’s Governing Council, was shot and critically wounded Saturday in an assassination attempt outside her home in western Baghdad, police and doctors said. Also Saturday, U.S. soldiers guarding the Palestine Hotel in central Baghdad opened fire as a green car tried to race through a military checkpoint. The car was stopped, and the driver was dragged out and made to lay face down in the roadway. Much of the foreign journalist corps lives in the Palestine and the adjacent Sheraton Hotel. Also, Kellogg Brown & Root, the Halliburton subsidiary doing million of dollars of reconstruction and other work for the U.S.-led coalition, occupies a total of 9 floors in the two buildings. An American tank always sits at the entrance to the hotel complex, and about a dozen soldiers were quickly on the scene when the car refused to stop at the checkpoint. The Governing Council member, Al-Hashimi, was in critical condition with abdominal wounds, a doctor at al-Yarmouk hospital said on condition of anonymity. After surgery she was moved to an unspecified location in a convoy of American armored vehicles and military ambulances. Three of her bodyguards also were injured,...