[80695] in North American Network Operators' Group
Re: NYT: Internet attack called broad and long lasting
daemon@ATHENA.MIT.EDU (Fred Heutte)
Tue May 10 03:19:00 2005
From: Fred Heutte <aoxomoxoa@sunlightdata.com>
To: <nanog@nanog.org>
Date: Tue, 10 May 2005 00:17:15 -0700
Errors-To: owner-nanog@merit.edu
NYT:
The crucial element in the password thefts that provided access=
at Cisco and elsewhere was the intruder's use of a corrupted
version of a standard software program, SSH. The program is
used in many computer research centers for a variety of tasks,=
ranging from administration of remote computers to data=
transfer
over the Internet.
The intruder probed computers for vulnerabilities that allowed=
the installation of the corrupted program, known as a Trojan
horse, in place of the legitimate program.
Ouch. Makes me wonder how long before someone cracks the
ssh that you can order for T-Mobile Sidekicks like mine.
("Before"? "Already!" . . . whatever) It *is* handy in a pinch,=
I last used it to check a server quickly while I was sitting in=
the
Rockpile (center field bleachers) at a Denver Rockies game last
month :) It's some flavor of ssh2, guess I'll have to ask my
friend who works at Danger which one. The notion of
launching a DDOS from a cellphone is intriguing in a novelistic
sense and worrisome in a real.world sense.
-- Fred