Information warfare — The next front

Information warfare — The next front

Computers & Security Vol. 18, No. 2 Consultants Aggressor cited the hacking group New network-attack software, which Order’s invites amateurs to r...

211KB Sizes 2 Downloads 96 Views

Computers & Security Vol. 18, No. 2

Consultants Aggressor

cited the hacking group New network-attack software, which

Order’s invites

amateurs to register for a full copy on the promise that they will receive hidden tools to mount stronger attacks on their victims. “We could be looking at half a dozen teenagers doing cracking on behalf of New

Nokia runs IP440 firewall and NAT with log analysis, so Brace could see the hackers first tried to ping every IP address, then

probed

Order”, warned Internet Security Systems security expert Kevin Black. “It’s: ‘Here’s a toy to play with’,

“I believe

then: ‘Thank

you, soldier.“’

of the more

The

of Java

much

of the probing

serious

not easy to identify growth

another

programming

new trick, where

crackers

build Java cracking

secret. hacking

group

is automated

in a trace”, Brace

HackCanada

is encouraging

Information Warfare Front

HackCanada adopted the tactic after a cracker received a warning from a corporate network administrator who detected him using the Phf script in its

Combating defence in

native Python

puter experts who could respond ic terrorist attacks”, said Clinton.

form. for network

The Next

requested

forms of terrorism”, attacks.

these menaces will the next century”,

expenditures

would

“dominate national Clinton said. The

include quickly

hiring

“com-

to electron-

administrators,

Axent security consultant David Butler warned teenagers and students who collected cracking tools to impress their peers would quickly try them out. “Cracking attempts rise by a factor or three or four during school holidays”, Butler told a joint ToshibaInflo security presentation earlier this month.

Picture this scenario: North Korea hires 35 hackers to crack US defence systems with commercially available equipment and software downloaded from the Internet. Their mission: to prevent the US Air Force from flying over Korea. Without

The

said.

The next world war could be waged on the Net. At least that’s what security pundits are saying, following President Clinton’s request for $2.8 billion of the budget to go toward fighting “exotic from chemical warfare to online

warning

and some

attacks are spread out so they are

crackers to rewrite the Python network-scanning script Phf in Java so it can be loaded into Web surfers’ browsers during a visit to an innocuous-looking site.

And in a gloomy

ports such as the

skills lies behind

software into Web-sites. When surfers browse the site, the program returns the surfer’s IP address to network security tools’ logs, leaving the cracker’s real location a

Canadian

for specific

default ports for Back Orifice (31337 and 1234) and port 80. (Back Orifice lets crackers gain control of a remote PC and is often hidden as aTrojan in games.)

news came

shortly after security experts learned available authenticator the freely password Tcpwrapper had been rewritten and redistributed in a form that sends passwords it finds to an anonymous Hotmail address. “It’s a shift in the mentality of cracking”, said Black. “It’s the difference between the men and the boys.” “We have been under constant attack by hackers since said Nokia Telecommunications’ Europe, Christmas”, Middle East, and Africa marketing director Bob Brace. The company had detected 24 000 cracking attempts since October last year, he said.

actually

breaking

any countries’

laws, the 35

tricksters work their way into the power grids and 911 emergency phone lines in 12 US cities, and shut them down. With a similar degree of ease, the nefarious hackers then gain control of 36 computers at the Pentagon. All of this happens within four days. And army and navy generals are unable to tell that the ludicrous commands they are receiving from the warped systems are bogus. The Pentagon recently ran a simulation of this hypothetical event, an exercise it called the Cyber Receiver, to illustrate the threat to national security. Now security activists are pointing to such examples in the wake

101

Security Views/Dr. B/l/ Hancock

of Clinton’s commitment to fighting cyber warfare. “We as consumers are all vulnerable to such attacks”, insists James

Adams,

CEO

of iDefense

and author

of

The Next World War: Computers Are the Weapons and the Front Line Is Everywhere - A Study Of Information Warfare, along with 11 other treatises on such topics. Adams recently iDefense, whose infrastructure

founded mission

Infrastructure is to “defend

from cyberspace

Adams’ organization

Defense, or the critical

Students in Virginia Hacks NASA A freshman Virginia, Clemson

at James Madison

High School

invienna,

has been jailed after allegedly hacking into University’s computer system and causing

thousands of dollars in damage, and then trying to enter NASA’s system from a computer in his school library.

threats”.

is effectively

a consultancy

look-

An IS-year-old Clemson charged in the case, accused

student also has been of giving the 15-year-old

ing to cash in on a heightened level of security hysteria. Not content to use the word ‘hacking’ to describe security breaches, Adams sounds the alarm bell with

Vienna enabled network

cries of ‘cyber terrorism’. nation attacking another espionage, criminal theft

Clemson incident, Fairfax County police seized the Vienna student’s home computer, but a week later the youth allegedly tried and failed to hack into com-

These acts can include one in a time of war, economic or blackmail, or your more

traditional hacking by disenchanted employees and geeks with nothing better to do on a Saturday night, according to Adams.

youth the user IDS and passwords that entry to the computer science laboratory’s at the South Carolina school. After the

puters at the Administration. The Vienna

Alas, there is no security system strong enough to battle all of these fiends, but iDefense says it will help businesses find the right security solutions. The firm plans to build up ‘red teams’ squads of superhackers who will test the strength of systems that purport to be secure. This will be part of a certification methodology that iDefense will use to evaluate guarantee the safety of company infrastructures Web sites. Microsoft

has joined

as a ‘charter

member’

and and

of the

National

student

Aeronautics

was arrested

charged

17.The hacker removed on numerous computers

parts of the operating system in the department’s comput-

The break-in required rebuild the department’s

102

here. Let’s prevent

it.”

of

The FBI and police in South Carolina unraveled the chain of events after someone entered the computer science department’s computers the weekend of Oct.

Companies to protect

happen

Feb. 1 on charges

with crimes.

er lab, causing the cancellation classes and impeding several Fairfax County court records.

protect our national security. Most of the security protecting the public is owned by the private sector”, says Adam Stone, aVP at Microsoft. “We have a lot of products in installations that are required to be secure: in law enforcement, the legal profession and national security. All of the big wars in this country never happened here, but with pervasive computing, it could

Space

felony computer trespass and misdemeanor computer fraud and taken to the county’s juvenile detention centre. His father declined comment last night. The Washington Post generally does not identity juveniles

organization, helping iDefense hatch its plans. [Defense is also trying to solicit Fortune 500 companies to join, at $1 million a pop, says Adams. may be willing to fork over the cash themselves. “We believe it’s important to

and

of several computer others, according to

Clemson operating

programmers to system and reissue

more than 1500 user identifications.The episode cost Clemson’s computer science department about $6300, university Police Chief Lonnie Saxon said. FBI agents tracked down the student whose user identification had been used to enter the computer system, and he reportedly told agents he had given his password to a 15-year-old living in Virginia. The agents tracked the 15-year-old to his Internet