. | . |
Cybercrime Fears Remain Despite Arrests
Senior Business Correspondent Washington (UPI) Aug 29, 2005 Terrorism authorities across the globe have been keeping close tabs on Muslim countries that may be breeding grounds for Islamic fundamentalism, but they are now finding that some of those nations might actually be a hotbed of secular terrorism, namely waging war in cyberspace. Late last Friday the FBI announced that, together with law enforcement in Morocco and Turkey, it had arrested two people who were responsible for the computer-virus outbreak that hit worldwide earlier this month. In Morocco the FBI arrested Farid Essebar, an 18-year-old Moroccan born in Russia who went by the screen name "Diablo0," while in Turkey they arrested 21-year-old Atilla Ekici, otherwise known as "Coder." Both men will be subject to laws of their respective countries. The two were allegedly responsible for creating a number of worms including one called Zotob and another known as Mytob that exploited flaws in Microsoft's Windows 2000 and XP operating systems. A slew of companies and organizations including major U.S. media outlets suffered from the computer-system outages as a result of the worms. Microsoft said the Zotob and Mytob worms have been less damaging that other network worms and viruses in the past, in part because more computer users have become aware of the dangers in cyberspace. Such awareness has led to taking precautionary steps including setting up firewalls, installing anti-virus software and introducing security updates on a regular basis. Nevertheless, the worms paralyzed many organizations, particularly in North America, and reawakened global awareness of just how interconnected and vulnerable computer systems can be. "In today's world of sophisticated technology, cyber criminals need very few tools to carry out their crimes. ... The swift resolution of this matter is the direct result of effective coordination and serves as a good example of what we can achieve when we work together," the FBI's cyber division assistant director, Louis Reigel, said in a news release. Reigel pointed out that in addition to working closely with the Moroccan and Turkish authorities, the FBI also cooperated with the private sector, particularly Microsoft as it was the software giant's program that was targeted by the cybercriminals. "This arrest demonstrates the value of public-private collaboration -- the first-class investigative work by the authorities and round-the-clock technical and investigative support provided by our internet crime investigations team here at Microsoft," stated Brad Smith, general counsel at Microsoft. He added that "the results (of the arrests) show clearly that cybercriminals will be identified, apprehended, and held accountable for their actions." Mikko Hypponen, chief research officer at Finnish software security group F-Secure, argued Monday that "Diabl0" had created a number of variants on the Mytob worm since February, but he is not behind all of them. "There's around 70 known variants of Mytob and practically all of them create botnets of the infected machines. Some of these botnets have been controlled by unrelated groups, such as Blackcarder. And we've found new Mytob variants just yesterday, which obviously are not written by Diabl0. So several people have access to Mytob source code and have been making their own variants," Hypponen said. Botnets are groups of hijacked computers that all connect to a central control computer and await instructions, such as conducting a distributed denial of service attack, stealing personal information or sending spam. As such, the arrests in Morocco and Turkey will not make cyberspace more secure, and even the likelihood of the Zotob and Mytob worms being eradicated looks slim. Microsoft stated that it will continue to ensure Internet safety, namely through technology investments to improve security, partnering with other private companies as well as governments and law-enforcement agencies to develop policies that can be enforced against cybercriminals and keeping customers aware of the potential hazards in cyberspace and encourage them to keep up-to-date precautionary measures to protect them from emerging threats. All rights reserved. � 2005 United Press International. Sections of the information displayed on this page (dispatches, photographs, logos) are protected by intellectual property rights owned by United Press International.. As a consequence, you may not copy, reproduce, modify, transmit, publish, display or in any way commercially exploit any of the content of this section without the prior written consent of United Press International. Related Links SpaceWar Search SpaceWar Subscribe To SpaceWar Express Chinese Websites Are Used To Attack US Government Computers: Report Washington (AFP) Aug 25, 2005 US Defense Department websites are probed hundreds of times a day by hackers, but so far no classified site is known to have been penetrated by hackers, a spokesman said Thursday.
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2016 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service. |