SANS NewsBites is a semiweekly high-level executive summary of the most important news articles that have been published on computer security during the last week. Each news item is very briefly summarized and includes a reference on the web for detailed information, if possible.
Spend five minutes per week to keep up with the high-level perspective of all the latest security news. New issues are delivered free every Tuesday and Friday.
Volume IV - Issue #25
June 19, 2002
If you are thinking about attending a security conference this
fall, a great choice is SANS Network Security 2002 in Washington
October 18-25 (http://www.sans.org/NS2002/).It's by far the largest
security training conference, and offers multi-day training programs
in everything from security basics to security management to hacker
exploits, from firewalls to intrusion detection, from auditing to
honeypots to forensics, plus a wealth of special networking and bonus
programs and an enormous exhibition. This year, all five branches
of the US military are co-hosting the National Information Assurance
Leadership Conference for their information security officers as an
integral part of SANS Network Security 2002. More intimate programs
are available in Boston, New York, Denver (http://www.sans/org) and
several other cities, but the Washington conference combines it all
in the major event of the year.
For those who cannot take the time away for a full week of classes,
SANS Mentor-Led Security Essentials training programs start in August
and early September in 40 cities from Calgary, CA to Mexico City.
The Cities are listed, along with the mentors, at the end of this
TOP OF THE NEWS17 June 2002 Push for Software Manufacturing Liability
14 & 16 June 2002 FoxNews.com Hit With Denial of Service Attacks
14 June 2002 Three Men Arrested for Cyber Extortion
12 & 13 June 2002 Four More Microsoft Holes and Patches
10 June 2002 Forcing Private Industry's Hand to Protect Critical Infrastructure
THE REST OF THE WEEK'S NEWS17 June 2002 Dueling Apache Security Alerts
17 June 2002 Password Not Hidden from Earthlink Support Staff
17 June 2002 Scalpers Hack World Cup Reservation System
17 June 2002 eMap Site Defaced
14 June 2002 Korean Microsoft Developer Tool Carries Nimda-Infected File
14 June 2002 Best Buy Beefs Up Security and Uses Wireless LANs Again
10 June 2002 Companies Not Employing LAN Security
14 June 2002 Internet Piracy Ring Members Face Charges
14 June 2002 Austrian Teen Allegedly Broke Into Pentagon Sites
13 June 2002 Spy Plane Surveillance Photos Exposed
14 June 2002 Spanish Legislature to Vote on Data retention Law
13 & 14 June 2002 Perrun Virus Infects JPEG Files
13 June 2002 Former Employee Allegedly Broke Into Boss's Computer Account
13 June 2002 Texas Library Suffers Computer Intrusion
12 June 2002 Gopher Hole Bigger Than Originally Thought
12 June 2002 A Model for Cyber Incident Cost Assessment
12 June 2002 KPNQwest Loses Data
12 June 2002 Phony Press Release Generates Increased Trading
10 June 2002 DoD Purchasing Bound by Common Criteria Standard
10 June 2002 Audit Finds Army Web Sites Display Sensitive Information
10 June 2002 Chief Information Security Officers Face Job Uncertainty
3 June 2002 Surreptitious Back Door Installations May be Related
1 June 2002 Disgruntled (Former) Employees Cause Problems
************************* Sponsored by McAfee ************************
SAFEGUARD DATA TRANSFER AND STORAGE WITH E-BUSINESS SERVER.
Protect sensitive data with the power of 128-bit PGP encryption. McAfee
Security's E-Business Server automates the encryption process. It
works on Windows to mainframes with any business application. It
requires no programming skills. Easy for users, fast for IT.
for a free info kit.
TOP OF THE NEWS
17 June 2002 Push for Software Manufacturing LiabilitySupport is growing for software companies to be held to the same liability standards as other manufacturing businesses. Microsoft, with its plethora of software holes and "deep pocket
" is a likely target for a liability suit. Air Force CIO John Gilligan says patches and fixes for the Microsoft products they use have cost more than the software itself.
[Editor's Note: In an interview in CIO Magazine this week, Presidential Cyber Security Advisor Richard A. Clarke says, "We're in favor of holding vendors accountable. When a product fails, the vendor has a responsibility to quickly identify a way of fixing it and getting that patch out, and the patch not only should fix the problem, it should not interact badly with other widely utilized applications. But we don't think it's terribly valuable to litigate such problems. We'd like to try to find solutions that are quicker than long, multiyear litigation. (
14 & 16 June 2002 FoxNews.com Hit With Denial of Service AttacksDenial-of-service (DoS) attacks aimed at FoxNew.com began on Thursday, June 13 and continued until the site restored normal services the following evening. The attacks also affected ABCNews.com, the weatherchannel.com and ESPN.com. Federal law enforcement officials have been notified and the incidents are under investigation.
14 June 2002 Three Men Arrested for Cyber ExtortionThree men have been arrested for extorting money from people who visited a child pornography web site. The men allegedly visited chat rooms and offered what appeared to be a link to a web site. When people clicked on it, they received an e-mail message that said "Going to Jail." The message said the group was going to report their activity to the police, but they would keep the information private for payment. If convicted of conspiracy and extortion through interstate commerce, the men could face sentences of up to seven years and fines of up to $500,000.
[Editor's (Schultz) Note: What next? This represents a new low as far as cybercrime goes. ]
12 & 13 June 2002 Four More Microsoft Holes and PatchesMicrosoft issued advisories and patches for a quartet of security vulnerabilities. A buffer overflow vulnerability in the phone book of the Remote Access Service (RAS) of Windows NT, 2000 and XP could allow an attacker to gain control of the machine. A flaw in IIS 4.0 and 5.0 and a pair of holes in SQL Server 2000 could let an attacker run code on a targeted machine.
10 June 2002 Forcing Private Industry's Hand to Protect Critical InfrastructureThe Bush administration may consider using "unorthodox" tactics to encourage the private sector to bolster cyber security on the portions of the nation's critical infrastructure it controls. For instance, the administration has been discussing with insurance industry the possibility of writing insurance policies only for those companies whose security meets certain standards.
*************************** SPONSORED LINKS **************************
Privacy notice: These links redirect to non-SANS web pages.
(1) A Cost-Benefit Analysis of Managed Security Services
(2) Stop Hackers Dead. How? See Top Layer @ SANSFire, Free White
(3) NO FALSE POSITIVES. Free white paper shows you how!
THE REST OF THE WEEK'S NEWS
- 17 June 2002 Dueling Apache Security AlertsThe Apache Server Project team and ISS issued competing security alerts for a DDoS vulnerability in Apache web servers. The Apache team claimed the ISS patch did not correct the problem.
[Editor's (Paller) Note: This story raises issues that several thoughtful members of the security community have been debating all day (Tuesday). Who is responsible for patching open source software? If a third party provides a source code patch, what can people who have embedded versions (without source) do to protect themselves? If a flaw in open source code is discovered by a third party, should it be shared with the entire open source project team? Is the whole team trustworthy? Is there any way to tell? Does it matter? I am not requesting answers, just sharing with you the questions being raised. ]
17 June 2002 Password Not Hidden from Earthlink Support StaffEarthlink grants its support staff complete access to customer passwords. While this approach may help with the common problem of forgotten passwords, unethical employees could abuse the privilege. Other ISPs' help staff do not have access to passwords; instead, they issue temporary new passwords over the phone and instruct customers to change them as soon as possible.
17 June 2002 Scalpers Hack World Cup Reservation SystemScalpers are hacking the World Cup soccer tournament phone reservation system to place themselves at the front of the virtual line for tickets to the matches; they are asking up to 150,000 yen (US$1200) for the tickets.
17 June 2002 eMap Site DefacedHackers exploited a hole in Microsoft IIS 4.0 server to deface www.emap.co.il, an Israeli mapping company web site.
[Editor's (Murray) Note: The (only) interesting thing about this defacement is that it is the third time that it has happened to the same site. Security is difficult but this abuses the excuse. ]
14 June 2002 Korean Microsoft Developer Tool Carries Nimda-Infected FileAbout 50,000 copies of Microsoft's Korean language version of Visual Studio .Net carried a Nimda-infected file; it sneaked in when a third party company was translating the help system into Korean. Though MS usually scans all files in its software that come from a third party, this time it scanned only files on a certain list; because it was not expecting the file infected with Nimda to be there, that file wasn't scanned. In order to run, the file would need to be decompiled and moved. Microsoft has notified all its affected customers and has posted a patch for the problem on its website. It will send replacement CDs to all registered customers, and is trying to contact people who may have bought the software but not registered it.
14 June 2002 Best Buy Beefs Up Security and Uses Wireless LANs AgainBest Buy has again started using wireless LAN cash registers; the company had stopped using them about a month ago when they learned that their networks were not secure and could be tapped into by anyone with some relatively inexpensive hardware and the desire. The company says it has improved the security of its wireless LAN systems, but would not elucidate. Shortly after the Best Buy announcement, a posting appeared on SecurityFocus.com's vuln-dev list: a war driver claims he was again able to sniff Best Buy's wireless LANs.
10 June 2002 Companies Not Employing LAN SecurityThough there are security measures available for wireless LANs, many companies are not using them, leaving sensitive customer information open to "war drivers."
14 June 2002 Internet Piracy Ring Members Face ChargesTwenty-one people face charges for their roles in a piracy ring that dealt in software, computer games and movies. If found guilty of conspiracy to commit copyright infringement, the people could each face a five-year prison sentence and be required to pay a fine of up to $250,000.
14 June 2002 Austrian Teen Allegedly Broke Into Pentagon SitesSeventeen-year-old Markus Hirsch of Austria allegedly hacked his way into classified Pentagon sites, including one that contains information about the location of multi-megaton warhead missile silos.
13 June 2002 Spy Plane Surveillance Photos ExposedA UK man found that satellite television receivers can pick up unencrypted US spy plane surveillance pictures taken while flying over the Balkans. A more thorough analysis is provided in the second URL.
14 June 2002 Spanish Legislature to Vote on Data retention LawThe Spanish Senate will vote next week on a measure which would require Internet service providers (ISPs) to keep records of customers' Internet activities for one year; if passed, the legislation would bring the country's laws in compliance with a European Parliament directive aimed at foiling terrorist activity. Spanish ISP trade groups say the requirement would be expensive, and a lawyer says the legislation could run afoul of constitutional rights.
13 & 14 June 2002 Perrun Virus Infects JPEG FilesPerrun, a proof-of-concept virus that infects JPEG files, claims to be the first known virus to infect data files. Though it does not carry a malicious payload, anti-virus researchers are concerned that future incarnations could harbor destructive payloads.
[Editor's (Murray) Note: Before the content of the JPG can be executed, the target must also be infected with an interpreter or "helper." If one can get the interpreter installed, one does not need the JPG. (Schultz) Also, I do not believe that the claim in this one is correct. There have been true data viruses before. What appears to be new here is that there are viruses that purportedly infect image files ]
13 June 2002 Former Employee Allegedly Broke Into Boss's Computer AccountWendy Sholds has been charged with two counts of unauthorized access to a computer system. The Massachusetts woman allegedly broke into her former boss's computer and forwarded confidential e-mail to other employees. Sholds also allegedly used the boss's username and password to view private information on the company web site. The charges are currently designated misdemeanors and carry a 30-day sentence. Pending legislation would increase the penalties considerably.
13 June 2002 Texas Library Suffers Computer IntrusionWaco Police Department computer crimes section detectives are investigating a computer intrusion at the Waco-McLennan county library's automated card catalog and check-out system. The attack, which may have been launched as a means of accessing something else, took down the system, which isn't expected to be up for several days.
12 June 2002 Gopher Hole Bigger Than Originally ThoughtMicrosoft has issued a security alert about the buffer overflow vulnerability in the Gopher protocol in its IE web browser. The vulnerability is more extensive that initially thought: it also exists on computers running Internet Explorer (IE) 5.01. 5.5 and 6.0 and servers running Proxy Server 2.0 and ISA Server 2000. Older versions may be vulnerable as well, but because they are no longer supported, Microsoft did not test them. In the cases of the server software, attackers could attain complete control of the server, allowing for the creation of new accounts or the reformatting of hard drives. While a patch is not yet available, Microsoft recommends blocking access to TCP port 70. IE users need to block gopher access manually.
Microsoft security bulletin:
12 June 2002 A Model for Cyber Incident Cost AssessmentThe Incident Cost Analysis Modeling Project (I-CAMP) is a multi-university project conducted in the 1990's; its aim is to provide a means for assessing the costs of cyber security incidents. The formula includes determining who worked on the incident investigation, how many hours they spent investigating, who was unable to work because of the incident, for how long, and the costs associated with that. The model does not take into account such factors as insurance deductibles and loss of revenue and reputation.
12 June 2002 KPNQwest Loses DataKPNQwest's fiber optic service loses as much as 5% of the data it delivers, according to Matrix NetSystems. "Healthy" services will lose only 0.1% of their data.
[Editor's (Murray) Note: What is being measured and reported here is "dropped packets." They are a measure of the health and efficiency of the network. However, dropped packets do not result in data loss. The TCP/IP protocol is designed to tolerate dropped packets. ]
12 June 2002 Phony Press Release Generates Increased TradingInternet Wire was tricked into publishing a phony press release about a small drug company because an employee did not follow authentication procedures. The false information increased the trading volume of the stock five-fold; it closed up almost 7%.
10 June 2002 DoD Purchasing Bound by Common Criteria StandardThe National Security Telecommunications and Information Systems Security Policy 11 requires that as of July 1, 2002, the Defense Department (DoD) will be allowed to purchase only those products that meet the Common Criteria standard. Integration and configuration are areas of concern because the evaluation was not made with those considerations in mind.
[Editor's Note (Murray): The issue is not only whether or not a product "meets the Common Criteria" but also whether or not it has even been evaluated against the criteria. Most products are not. Evaluations are very expensive even for products that were developed with evaluation in mind. While it is assumed that evaluated products will be more secure than unevaluated ones, this is less than certain. (Grefer) Be careful what you ask for, you might get it. Evaluation/certification is quite expensive, narrows down the number of competitors. (Paller): It is difficult to prove, in practice, that products meeting the Common Criteria, reliably provide greater security than those that do not. Unsafe configuration negates safe design. For the Common Criteria to meet the goal of improving DoD Internet security, it needs to be complemented with Common Configuration benchmarks like those being developed by NSA, NIST and the Center for Internet Security. ]
10 June 2002 Audit Finds Army Web Sites Display Sensitive InformationA Defense Department inspector general's audit found that many publicly accessible Army web sites contain information not intended for public viewing, including operation plans and documents labeled "For Official Use Only." Suggestions for amending the situation include conducting "periodic policy compliance reviews" and establishing a system to resolve any problems found.
10 June 2002 Chief Information Security Officers Face Job UncertaintyMany well-known CISOs have lost their jobs. Others are under increasing pressure to prove the value of their programs based on actual security improvements. Technical information security skills are becoming more important for security managers.
3 June 2002 Surreptitious Back Door Installations May be RelatedIn mid-May, several network security tools available on Monkey.org were contaminated with back doors nearly identical to the one covertly installed in an IRC chat client in March. Nearly 2,000 copies of the Dsniff, Fragroute and Fragrouter tools were downloaded before the problem came to light; affected users are being contacted. Authors of the tainted programs say they will employ new security measures.
[Editor's (Murray) Note: Will people never learn that free toys from no-name sites are more likely than not to be contaminated? ]
1 June 2002 Disgruntled (Former) Employees Cause ProblemsA man planted a logic bomb in his company's computer system when he was demoted; it detonated months after he resigned, destroying part of the program supporting the sales force's handheld computers. The company went after the employee, and he has been sentenced to two years in prison and ordered to pay restitution of $200,000. Other companies are starting to step forward and prosecute saboteurs as well.
Please feel free to share this with interested parties via email,
but no posting is allowed on web sites. For a free subscription,
(and for free posters) e-mail firstname.lastname@example.org with the subject:
SANS Security Essentials - Mentor-Led Programs in 40 Cities
Combines self-paced on-line training with twenty hours of meetings with
your class and a mentor who has already achieved GSEC certification.
If you register by August 1, the tuition for this course is $2430.
For registration information, contact Scott Weil, email@example.com.
Locations beginning in August and September:
Alaska Fairbanks, AK
Liam Forbes, University of Alaska at Fairbanks
Arizona Phoenix, AZ
Lois Lehman, Arizona State University
Arizona Tucson, AZ
Mike Fleming, National Optical Astronomy Observatory
California Pleasanton, CA
Potheri Mohan, SanDisk Corporation
California San Jose, CA
(San Jose Statue University) Michele Guel, Cisco
California San Diego, CA
Mel Jackob, US Navy contractor
Colorado Denver, CO
Sanjeev Sood, AmerInfo, Inc.
Connecticut Hartford, CT
Tim Rogers, United Technologies Pratt & Witney
Florida Tampa, FL
Corey Pincock, Network Knowledge Systems (NKS), Inc.
Illinois Chicago area, IL
Patrick Wengert, Discover Financial Services
Kansas Lenexa (Kansas City), KS
John Mallery, Clarence M. Kelly & Associates
Kentucky Lexington, KY
Christopher Hayden, Ashland, Inc.
Massachusetts Boston, MA
Christopher Spirito, EMC Corporation
Maryland Baltimore, MD
Ted Mina, Independent information security consultant
Maryland Gaithersburg, MD
Carolyn Rowland, National Institute of Standards Testing
Michigan Grand Rapids, MI
Darrin Wassom, Spectrum Health
Minnesota Minneapolis, MN
Liz Stanton, Upstream Solutions, Inc.
Missouri Columbia, MO
Liviu Groza, University of Missouri Health Services
North Carolina Asheville, NC
Jim Hurst, Sonopress, Inc.
North Carolina Charlotte, NC
Chris Mahn, Duke Energy
North Carolina Research Triangle, NC
James Born, AT&T
New Jersey Bergen County, NJ
Megan Restuccia, Bergen Regional Academies
New York Albany area, NY
Patrick Nolan, Stormranger Computer Security
New York Rochester, NY
Ralph Durkee, Ralph Durkee Consultants
Ohio Cincinnati, OH
Kevin Van Dixon, Intrieve, Inc.
Ohio Cleveland, OH
Rockie Brockway, Totem Security
Ohio Dayton, OH
Phillip Conrad, Multimax
Oklahoma Tulsa, OK
Lloyd Ardoin, Mazzio's Corporation
Pennsylvania Philadelphia, PA
Bruce Diamond, Computer Helpline, Inc.
Texas College Station, TX
Kent Knudsen, Texas A&M University
Texas Richardson (Dallas area), TX
Brian Levasseur, Aegon USA
Virginia Dahlgren, VA
Paul Ford, Chugash Telecommunications & Computers, Inc.
Virginia Herndon, VA
Wayde York, EDS
Virginia Tysons Corner, VA
Angela Orebaugh, Booz Allen Hamilton
Washington Seattle, WA
David Severski, Lucent Technologies
Kenton Smith, Chartwell Technology
Patrick Boismenu, Royal Canadian Mounted Police
Guy Bruneau, Cornerstone Communications
Chris Russel, York University
Rafael Garcia, Symantec Corporation
Start in August/September in 40+ Locations
For registration information, contact Scott Weil, firstname.lastname@example.org.