A glitch in the Matrix, or a hungry exploit?
,----[ Quote ]
| While there is spam, drive-by phishing attacks, and persistent worms
| attacking global networks, these have been ongoing attacks and should not be
| responsible for such a large change in such a short period of time by
| themselves.
|
| If we consider port 5901 to be relevant to the reason behind the attacks,
| then we might have found a potential cause, and a potential target.
|
| An exploit was added a couple of days ago to a number of security mailing
| lists, distribution sites, and other sources, which targets a remote code
| execution vulnerability in the AMX VNC ActiveX control. Since appearing on
| these sources it has spread to thousands of sites, and is guaranteed to have
| been seen by many, many people - some with malicious intent.
|
| Although a remote code execution exploit is nothing special nowadays, this
| particular piece of code claims to achieve its goals without alerting the
| victim to the fact that they have just been successfully hacked.
|
| Whether or not it is relevant to the real reason behind the observed response
| time and packet loss deviation will be seen over time. At the least,
| administrators and end users should keep a closer eye on their systems and
| networks over the next few days to see if this unknown problem is going to
| spread.
`----
http://www.theregister.co.uk/2007/06/30/weird_internet_behaviour/
Attack on Estonia puts cyber security on EU agenda
,----[ Quote ]
| Estonia said thousands of sites were affected and the attacks were aimed
| at crippling key infrastructure in a country heavily dependent on the
| Internet.
`----
http://news.yahoo.com/s/nm/20070630/wr_nm/eu_digital_dc
They were using Windows zombies, which are a dime a million.
Related:
EU should class cyber attacks as terrorism: Estonia
,----[ Quote ]
| Estonia will propose at a meeting of European Union justice
| ministers next week that the bloc consider cyber attacks as
| "acts of terror", Estonian Justice Minister Rein Lang said Thursday.
`----
http://www.france24.com/france24Public/en/administration/afp-news.html?id=070607160418.pfpmeqvt&cat=science
Desperate Botnet Battlers Call for an Internet Driver's License
,----[ Quote ]
| St Sauver and others were referring to botnets: the internet's zombie
| armies of compromised PCs that malefactors use to send spam, host
| fake websites for phishing attacks or bombard websites with spurious
| traffic in a distributed denial-of-service attack.
`----
http://www.wired.com/politics/security/news/2007/06/bot_strategy#725361699177480234
Tiscali e-mail 'hit' by spammers
,----[ Quote ]
| Spammers have knocked out the e-mail service for many of the customers
| of internet service provider (ISP) Tiscali, the firm has said.
`----
http://news.bbc.co.uk/1/hi/technology/6704003.stm
Telegraph floored by DDoS attack
,----[ Quote ]
| Cyber-attacks have been much in the news of late. Last week,
| Russian and European leaders held a summit in the aftermath of a
| three-week cycle of denial of service attacks targeting the
| Baltic countries' internet infrastructure.
`----
http://www.theregister.co.uk/2007/05/22/telegraph_ddos/
Estonia suspects Kremlin in Web attacks
,----[ Quote ]
| He said more than 1 million computers worldwide have been used in
| recent weeks to attack Estonian government and business Web sites
| since a dispute arose with Moscow over Estonia's moving of a
| Soviet-era war memorial from downtown Tallinn.
`----
http://www.cnn.com/2007/TECH/internet/05/17/estonia.cyber.attacks.ap/index.html?eref=rss_tech
State Department got mail and hackers
,----[ Quote ]
| A break-in targeting State Department computers worldwide last
| summer occurred after a department employee in Asia opened a
| mysterious e-mail that quietly allowed hackers inside the U.S.
| government's network.
`----
http://news.yahoo.com/s/ap/20070419/ap_on_hi_te/hackers_state_department
The feds weigh in on Windows security
,----[ Quote ]
| "The benefits of this move are enormous: Common, secure configurations
| can help slow botnet spreading, can radically reduce delays in patching,
| can stop many attacks directly, and organizations that have made the
| move report that it actually saves money rather than costs money,"
| Paller wrote.
`----
http://news.zdnet.com/2100-1009_22-6172158.html
Zombie botnets attack global DNS servers
,----[ Quote ]
| Hackers launched a sustained attack last night against key root servers
| which form the backbone of the internet.
|
| Security firm Sophos said that botnets of zombie PCs bombarded the
| internet's domain name system (DNS) servers with traffic.
|
| "These zombie computers could have brought the web to its knees,"
| said Graham Cluley, senior technology consultant at Sophos.
`----
http://www.vnunet.com/vnunet/news/2174383/zombie-botnets-attack-global
Botnet 'pandemic' threatens to strangle the net
,----[ Quote ]
| Cerf estimated that between 100 million and 150 million of the
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^
| 600 million PCs on the internet are under the control of hackers,
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
| the BBC reports.
`----
http://www.theregister.co.uk/2007/01/26/botnet_threat/
EveryDNS, OpenDNS Under Botnet DDoS Attack
,----[ Quote ]
| The last time the Web mob (spammers and phishers using botnets)
| decided to go after a security service, Blue Security was forced
| to fold and collateral damage extended to several businesses,
| including Six Apart.
`----
http://securitywatch.eweek.com/exploits_and_attacks/everydns_opendns_under_botnet_ddos_attack.html
U.S. cyber counterattack: Bomb 'em one way or the other
,----[ Quote ]
| If the United States found itself under a major cyberattack aimed
| at undermining the natio's critical information infrastructure,
| the Department of Defense is prepared, based on the authority of
| the president, to launch a cyber counterattack or an actual
| bombing of an attack source.
`----
http://www.networkworld.com/news/2007/020807-rsa-cyber-attacks.html
|
|