[80695] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NYT: Internet attack called broad and long lasting

daemon@ATHENA.MIT.EDU (Fred Heutte)
Tue May 10 03:19:00 2005

From: Fred Heutte <aoxomoxoa@sunlightdata.com>
To: <nanog@nanog.org>
Date: Tue, 10 May 2005 00:17:15 -0700
Errors-To: owner-nanog@merit.edu


NYT:

  The crucial element in the password thefts that provided access=
 
  at Cisco and elsewhere was the intruder's use of a corrupted 
  version of a standard software program, SSH. The program is 
  used in many computer research centers for a variety of tasks,=
 
  ranging from administration of remote computers to data=
 transfer 
  over the Internet. 

  The intruder probed computers for vulnerabilities that allowed=
 
  the installation of the corrupted program, known as a Trojan 
  horse, in place of the legitimate program.

Ouch.  Makes me wonder how long before someone cracks the
ssh that you can order for T-Mobile Sidekicks like mine.
("Before"?  "Already!" . . . whatever)  It *is* handy in a pinch,=
 
I last used it to check a server quickly while I was sitting in=
 the 
Rockpile (center field bleachers) at a Denver Rockies game last 
month :)  It's some flavor of ssh2, guess I'll have to ask my
friend who works at Danger which one.  The notion of
launching a DDOS from a cellphone is intriguing in a novelistic
sense and worrisome in a real.world sense.

-- Fred


home help back first fref pref prev next nref lref last post