SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
SI - Site Forums : Silicon Investor - Welcome New SI Members! -- Ignore unavailable to you. Want to Upgrade?


To: Edwarda who wrote (11325)2/10/2000 3:34:00 PM
From: SIer formerly known as Joe B.  Respond to of 32871
 
Attention Sleuths:

FBI Seeks Private Cyberattack Help

WASHINGTON, Feb 10, 2000 (AP Online via COMTEX) -- The FBI is seeking
private help in solving what it calls the largest computer attack on
the Internet in memory -- an assault on e-commerce sites the bureau
says could easily have been launched by any teen-ager.

''We're going to need the help of everyone in the community to resolve
this'' and prevent future attacks, Ron Dick, chief of the FBI's
computer investigation section, said Wednesday.

Attorney General Janet Reno said at a news conference at FBI
headquarters that the motive and identity of the attacker or attackers
are not known, though the intent appeared to be to disrupt electronic
commerce.

''We are committed in every way possible to tracking down those who are
responsible,'' Reno said. ''We're committed to taking steps to ensure
that e-commerce remains a secure place to do business.''

Her deputy, Eric Holder, said today ''we have leads that we are
following ... (but) this is going to be a difficult case to crack. It's
conceivable it could be one person or one group of people.''

Holder added in an interview on ABC's ''Good Morning America'' that
''I'm pretty confident'' government computers are secure against
similar attacks.

Dick said vandals used ''distributed denial of service'' tools to
accomplish this week's attacks.

In such attacks, a hacker hides these tools, known as daemons, on
hundreds or even thousands of innocent third-party computers. The
daemons can be triggered later from a remote location to launch
simultaneous attacks on a single target, such as Yahoo! or eBay. The
attacking daemons give false addresses so they are harder to trace.

The volume of attacks overwhelms the target and causes it to cease
operation, much the same way that a very heavy volume of telephone
calls can tie up a phone system and leave most users with no dial tone
or a busy signal, Dick said.

Many tools for such an attack exist on Internet Web sites, and anyone
can download them, he said.

''They do not take much technical expertise to use,'' Dick said. ''A
15-year-old kid could launch these attacks. This is not something that
it takes a great deal of sophistication to do.''

But since the FBI does not know who did it, Dick noted it's ''always a
possibility'' that a foreign government is responsible.

''Until you get to the keyboard being utilized, you don't know what
you're dealing with,'' Dick said, noting that most similar, past
attacks used computers overseas as well as in this country. He could
not remember any attacks that affected as many millions of people as
those this week.

Additionally, the FBI does not know how many innocent third-party
computers were used to launch the attacks and does not know they have
ended, Dick said.

Agents are starting from victim computers and tracking the attacks back
through the Internet service providers that delivered the attacking
daemons. Dick likened it to tracking a trail left by bank robbers from
the bank to their hideout.

Tom Burke, of the General Services Administration, said no attacks had
been traced thus far to government computers.

Dick urged the private sector to report any attacks promptly so tracing
can begin quickly. And he urged private Internet sites to keep logs of
traffic, install any tools developed to thwart such attacks and keep
them updated.

''The key to this is prevention,'' Dick said, ''... implementing
appropriate security measures such that you do not allow your system to
be used in some of these attacks.''

Over the New Year's weekend, the FBI posted tools on its Web site that
could detect whether two types of daemons were hidden on a computer
system. Some 2,600 businesses downloaded the FBI tools at no cost and
three found such daemons. The FBI opened criminal investigations into
who put them there.




By MICHAEL SNIFFEN