SANS NewsBites is a semiweekly high-level executive summary of the most important news articles that have been published on computer security during the last week. Each news item is very briefly summarized and includes a reference on the web for detailed information, if possible.
Spend five minutes per week to keep up with the high-level perspective of all the latest security news. New issues are delivered free every Tuesday and Friday.
Volume III - Issue #25
June 20, 2001
Last month, the three most popular Hacker Exploits courses were run
head-to-head at SANS2001. The highest rated was Eric Cole and Ed
Skoudis' course "Computer and Network Hacker Exploits." It was also the
only one of the three courses that taught students how to block the
attacks as well as how to run them.
You may attend Eric and Ed's course in Boston or Washington in July.
If you take the entire five-day track, which combines the hacker
exploits courses with advance incident handling, you'll have finished
the course work for one of the GIAC Level 2 security certifications.
TOP OF THE NEWS15 June 2001 Israeli Hacker Won't Go to Jail
13 June 2001 IU Computers Breached for Second Time This Year
9 - 14 June 2001 Cal-ISO Servers Compromised
THE REST OF THE WEEK'S NEWS15 June 2001 Wireless Keyboard Security
15 June 2001 New Malicious Hacking Tools
14 June 2001 Houston Floods Bring Physical Security Lessons
14 June 2001 Trojan Exploits Word RTF/Macro Flaw
13 & 14 June 2001 Morbid Curiosity Yields Trojan
11 & 13 June 2001 MacSimpson Worm
13 & 14 June 2001 Exchange 2000 Patch Woes
13 June 2001 Former FAA Employee Gets Jail Sentence for Stealing Source Code
13 June 2001 Cracker Group Defaces More Sites Because They Can
13 June 2001 SQL Server Flaw Bulletin and Patch
13 & 14 June 2001 Malicious E-Mail Could Cause Problems for Japanese Wireless Internet Customers
11 June 2001 DMCA Shadow Looms
TUTORIAL11 June 2001 Outsourcing Pros and Cons: Security Manager's Journal
******************** Sponsored by NetIQ Corporation ********************
FREE SECURITY GUIDE:
Get the in-depth knowledge you need to secure your enterprise with
NetIQ's FREE step-by-step security guide - "Selecting The Right Security
Solution" - at
NetIQ's security solutions not only identify intruders, but ensure that
threats don't ever become incidents.
TOP OF THE NEWS
15 June 2001 Israeli Hacker Won't Go to JailEhud Tenenbaum, the Israeli hacker who was part of the force behind the "Solar Sunrise" attack on US Defense Department computer systems in 1998, was sentenced to six months of community service. Tenenbaum was also fined approximately $18,000 and sentenced to one year of probation. A two-year suspended prison sentence will be enforced if he commits a computer crime within the next three years.
13 June 2001 IU Computers Breached for Second Time This YearAccording to Indiana University (IU) officials, crackers broke into IU School of Music computers where they accessed names, addresses and social security numbers of people who had requested information about the school; the crackers also used the breached servers as a private chatroom and for file storage. Technicians said that the crackers exploited the rpc.statd buffer overflow flaw to gain access to the servers, and that they deleted any log files which could have offered clues to their identities.
9 - 14 June 2001 Cal-ISO Servers CompromisedCrackers recently infiltrated two servers that were part of a development network at the California Independent System Operator (ISO) - - an integral part of the power grid - raising concerns that foreign governments or terrorist groups are probing the US's critical infrastructure networks. Security specialists say they cannot tell who was responsible for the attacks, and that many security measures, including firewalls, tripwires, and logs, were not in place.
[Editor's (Murray) Note: One might well ask why systems intended for the development of such a sensitive application are connected to the public network at all, much less without routine security measures. ]
********************* Also sponsored by Trend Micro ********************
TREND ANTIVIRUS ISPC MAGAZINE'S EDITORS' CHOICE
If you are worried about email viruses, you need Trend Micro ScanMail
for Exchange. It is the best solution for your Exchange server and PC
Magazine agrees: ScanMail and its plug-in eManager are PC Magazine's
Editors' Choice for Best Email Virus Protection. Buy a license for
ScanMail and get the content-management plug-in eManager FREE:
THE REST OF THE WEEK'S NEWS
15 June 2001 Wireless Keyboard SecurityDaten-Treuhand, a German security concern, has posted a warning on Bugtraq that crackers can sniff passwords from wireless keyboards from up to 30 meters.
15 June 2001 New Malicious Hacking ToolsSecurity consultants say there are two new hacking tools available on the Internet: GodMessage and Choke. GodMessage lets crackers put ActiveX code on web pages which would make browsers download a compressed program. Users with current antivirus software should be protected. The Choke worm circumvents security controls using MSN Messenger.
14 June 2001 Houston Floods Bring Physical Security LessonsThe recent flooding in Houston not only underscored the importance of having a detailed emergency plan in place, but also brought to light some important physical security considerations. Data and communications equipment centers should not be on the lower floors of buildings, provisions need to be made for refueling generators, and IT staff members should be included as members of emergency command centers.
11 & 13 June 2001 MacSimpson WormA mass mailing worm that targets Macintosh computers arrives as an attachment purporting to be secret episodes of The Simpsons. The attachment is actually an AppleScript that sends copies of itself to everyone in the Outlook Express or Entourage address book(s) of infected machines. Finally, the worm moved the contents of the sent mail folder to the deleted items folder and opens Internet Explorer to a Simpsons archive. The worm affects Macintosh Systems 9.0 and higher, and Outlook Express 5.02 and higher. The Computerworld article offers advice for removing the worm from infected systems.
14 June 2001 Trojan Exploits Word RTF/Macro FlawA Trojan horse named Goga exploits a recently disclosed security flaw in Microsoft Word. Goga arrives in the guise of a Rich Text Format (RTF) attachment that links to a template file on a Russian web site. A macro in the file circumvents Windows security and gathers logons and passwords.
13 & 14 June 2001 Morbid Curiosity Yields TrojanComputer users who thought they were downloading a bootlegged video of Timothy McVeigh's execution were actually being tricked into installing the SubSeven Trojan horse program on their computers. The program, which affects only computers running Windows operating systems, allows crackers to remotely control infected machines. The web page that contained the program is no longer up, and users with current antivirus software should be protected.
[Editor's (Murray) Note: Those who do not take the bait should also be safe. ]
13 & 14 June 2001 Exchange 2000 Patch WoesThe first patch Microsoft issued for an Exchange 2000 security flaw contained an error that caused servers to hang. The second, which contained outdated files, did the same thing. The company released a third version of the patch last week. One security consultant described the patch's effect as essentially launching a denial-of- service attack on one's own server.
13 June 2001 Former FAA Employee Gets Jail Sentence for Stealing Source CodeThomas A. Varlotta, the Federal Aviation Administration (FAA) engineer who stole O'Hare International Airport air traffic control monitoring software shortly before he left the FAA's employ, was sentenced to a year in prison and ordered to pay $13,000 in fines and restitution. Varlotta had headed the team that developed the source code he stole.
13 June 2001 Cracker Group Defaces More Sites Because They CanA cracker group notorious for its defacing scads of Chinese web sites earlier this year has recently defaced a dozen sites worldwide; all the sites have in common is the word "security" in their domain names. In an email to CNET, the group claims that they target Windows NT and 2000 servers because they are so easy to infiltrate.
13 June 2001 SQL Server Flaw Bulletin and PatchMicrosoft simultaneously posted a bulletin about and a patch for a flaw in SQL Server 7.0 and 2000 Gold databases that could allow a cracker to hijack an administrative connection. The flaw affects servers that are configured for mixed-mode authentication, and attackers must already have access to the server in order to take advantage of the vulnerability.
13 & 14 June 2001 Malicious E-Mail Could Cause Problems for Japanese Wireless Internet CustomersA Japanese wireless phone carrier has warned subscribers of its I-Mode wireless Internet service that malicious e-mail messages could cause their phones to dial an emergency number, make lots of calls, or freeze the phone screen. The company advises its customers not to open e-mail from unknown sources and offers suggestions for thwarting the potential problems.
[Editor's (Grefer) Note: This incident should serve as another reminder to set up a separate machine that has been hardened (a.k.a. a bastion host) to serve as log server for all systems. Once the syslog configurations of the other systems have been adjusted to point to the hardened log server or log host, it will be much more difficult for intruders to cover their tracks. Any logged activities up to the point where they manipulate the syslog daemon or its configuration will be preserved. ]
11 June 2001 DMCA Shadow LoomsFearful of violating the Digital Millennium Copyright Act (DMCA), the administrator of a TiVo web forum has asked users to refrain from posting information about methods for sharing saved content.
11 June 2001 Outsourcing Pros and Cons: Security Manager's JournalOn one hand, managed security services offer round-the-clock monitoring, a staff with detailed knowledge, and "herd immunity." On the other hand, the commitment to security may not be as strong as that of someone in-house, the companies must look like gold mines to crackers, and the cost of such services is still quite high.
Please feel free to share this with interested parties via email (not
on bulletin boards). For a free subscription, (and for free posters)
e-mail firstname.lastname@example.org with the subject: Subscribe NewsBites
Kathy Bradford, Crispin Cowan, Roland Grefer, Bill Murray,
Stephen Northcutt, Alan Paller, Eugene Schultz