SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Microcap & Penny Stocks : TGL WHAAAAAAAT! Alerts, thoughts, discussion.

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Tom Allinder who wrote (62163)9/7/2000 1:53:10 AM
From: CIMA   of 150070
 
Just When You Thought It Was Safe to Chat Online …

Security experts have discovered a hacking tool, Trinity v3, that uses chat systems to attack computers.
By Elinor Abreu







Yahoo! Inc. (YHOO)
eBay Inc. (EBAY)











To Serve, Maybe Protect
The World's Most Secure Operating System

Hackers, the Feds Want You







Email to a Friend
Print Article
Write the Editor





Security researchers have discovered what they believe is the first distributed denial-of-service tool that uses Internet relay chat, a real-time chat system, to direct hits on target computers.

The tool, dubbed Trinity v3, has been used to launch denial-of-service attacks on several educational institutions but no major e-commerce Web sites as yet, according to Chris Rouland, director of Atlanta-based Internet Security System's internal research and development group, called X-Force.

Hackers use distributed denial-of-service, or DOS, attacks, like the ones launched in February against eBay (EBAY) , Yahoo (YHOO) and several other sites, to flood Web sites with so much traffic that they become inaccessible to legitimate traffic. They do this by embedding software onto other machines, which then are used as agents to launch the attack.

Hackers have been using Internet Relay Chat, or IRC, systems for at least a year to control compromised computers via back doors and programs called trojan horses that contain hidden malicious instructions. Until now, though, IRC systems haven't been used for DOS attacks, Rouland says.

"The reason they're using IRC is because it's a very effective guaranteed delivery client-server transport mechanism that also provides the attacker with anonymity," says Rouland. "It's easy to log in and hide your identity."

Because of the ease with which hackers and malicious code writers can use IRC and the instant chat system ICQ to spread viruses, Rouland recommends that corporations block access to the systems. "IRC and ICQ are both very risky Internet behaviors because you are establishing a TCP/IP, or handshake, connection with untrusted hosts," he says.

Trinity automatically logs the compromised computer onto a specific IRC system, whereupon the hacker can control that computer and others by logging onto the same chat channel.

More than 400 host computers, all running Linux, were found to have Trinity installed, Rouland says. The tool not only allows a hacker to use the compromised machine to launch DOS attacks – it also allows the hacker, or anyone with password access to the IRC system, root access to the compromised machine, enabling visitors to do anything to the computer that they want.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext