| ==Phrack Inc.== | |
| Volume Two, Issue 22, File 11 of 12 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN P h r a c k W o r l d N e w s PWN | |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN | |
| PWN Issue XXII/Part 3 PWN | |
| PWN PWN | |
| PWN Created by Knight Lightning PWN | |
| PWN PWN | |
| PWN Written and Edited by PWN | |
| PWN Knight Lightning and Taran King PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Computer Break-In November 11, 1988 | |
| ~~~~~~~~~~~~~~~~~ | |
| >From Intercom, Vol 28, No. 24, Air Force Communications Command Newsletter | |
| By Special Agent Mike Forche, AFOSI Computer Crime Investigator | |
| A computer hacker penetrated an Air Force Sperry 1160 computer system in the | |
| San Antonio, Texas, area. The hacker was discovered by alert Air Force | |
| Communications Command computer operators who notified the data base | |
| administrator than an un-authorized user was in the system. The data base | |
| administrator was able to identify the terminal, password, and USERID (system | |
| level) used by the hacker. | |
| The data base administrator quickly disabled the USERID/password (which | |
| belonged to a computer system monitor). The data base administrator then | |
| observed the hacker trying to get into the system using the old | |
| USERID/password. He watched as the hacker successfully gained entry into the | |
| system using another unauthorized USERID/password (which was also a system | |
| administrator level password). | |
| The hacker was an authorized common user in the computer system; however, he | |
| obtained system administrator access level to the government computer on both | |
| occasions. | |
| Review of the audit trail showed that the hacker had successfully gained | |
| unauthorized access to the computer every day during the two weeks the audit | |
| was run. In addition, the hacker got unauthorized access to a pay file and | |
| instructed the computer floor operator to load a specific magnetic tape (pay | |
| tape). | |
| The hacker was investigated by Air Force Office of Special Investigation | |
| computer crime investigators for violation of federal crimes (Title 18 US Codes | |
| 1030 computer fraud, and 641 wrongful conversion of government property), Texas | |
| state crimes (Title 7, Section 33.02 Texas computer crime wrongful access) and | |
| military crimes (obtaining services under false pretense, Uniform Code of | |
| Military Justice, Article 134). | |
| The computer crime investigators made the following observations: | |
| - USERIDs used by the hacker were the same ones he used at his last base when | |
| he had authorized system access in his job. The use of acronyms and | |
| abbreviations of job titles will hardly fool anyone; plus the use of | |
| standard USERID base to base is dangerous. | |
| - The passwords the hacker used were the first names of the monitors who | |
| owned the USERIDs. The use of names, phone numbers, and other common | |
| easily-guessed items have time and time again been beaten by even the | |
| unsophisticated hackers. | |
| Special Thanks To Major Douglas Hardie | |
| _______________________________________________________________________________ | |
| "Big Brotherish" FBI Data Base Assailed November, 21, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From Knight-Ridder Newspapers (Columbia Daily Tribune) | |
| "Professionals Unite To Halt Expansion Of Files" | |
| PALO ALTO, California -- For the first time in more than a decade, civil | |
| libertarians and computer professionals are banding together to stop what many | |
| consider a Big Brotherish attempt by the FBI to keep track of people's lives. | |
| Computer Professionals for Social Responsibility, based in Palo Alto, has been | |
| instrumental in preventing the FBI from expanding its data base to include | |
| information such as credit card transactions, telephone calls, and airline | |
| passenger lists. | |
| "We need computer professionals acting like public interest lawyers to make | |
| sure the FBI is acting responsibly," said Jerry Berman, chief legislative | |
| counsel for the American Civil Liberties Union. | |
| Berman was part of a panel Saturday at Stanford University that went | |
| head-to-head with the FBI's assistant director for technical services, William | |
| Bayse, over expansion of the National Crime Information Center. | |
| Law enforcement officials use the NCIC system's 19.4 million files about | |
| 700,000 times a day for routine checks on everyone from traffic violators to | |
| Peace Corps applicants. | |
| "The FBI would like us to believe that they are protecting us from the hick | |
| Alabama sheriff who wants to misuse the system," said Brian Harvey, a computer | |
| expert at the University of California-Berkeley. "The FBI is the problem." | |
| Not since the fight to pass the Privacy Act of 1974 have computer experts, | |
| civil libertarians, and legislators come together on the issue of citizen | |
| rights and access to information. | |
| In the early 1970s, the government's efforts to monitor more than 125,000 war | |
| protesters sparked concerns about privacy. The 1974 law limited the movement | |
| of information exchanged by federal agencies. | |
| But computers were not so sophisticated then, and the privacy act has a number | |
| of exceptions for law enforcement agencies, Rotenberg said. No laws curtail | |
| the FBI's data base. | |
| Two years ago, the FBI announced its plan to expand the data base and came up | |
| with 240 features to include, a sort of "wish list" culled from the kinds of | |
| information law enforcement officials who use the system would like to have. | |
| Rep. Don Edwards, D-Calif., balied at moving ahead with the plan without | |
| suggestions from an independent group, and put together a panel that includes | |
| members of the Palo Alto computer organization. | |
| Working with Bayse, FBI officials eventually agreed to recommend a truncated | |
| redesign of the data base. It drops the most controversial features, such as | |
| plans to connect the data base to records of other government agencies - | |
| including the Securities and Exchange Commission, the IRS, the Immigration and | |
| Naturalization Service, the Social Security Administration, and the Department | |
| of State's passport office. | |
| But FBI director William Sessions could reject those recommendations and | |
| include all or part of the wish list in the redesign. | |
| The 20-year-old system has 12 main files containing information on stolen | |
| vehicles, missing people, criminal arrests and convictions, people who are | |
| suspected of plotting against top-level government officials, and people for | |
| whom arrest warrents have been issued. | |
| _______________________________________________________________________________ | |
| Big Guns Take Aim At Virus November 21, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Taken From Government Computer News | |
| In the aftermath of the most recent virus infection of the Defense Data Network | |
| and Arpanet, Defense Department and National Institute of Standards and | |
| Technology computer security officials are scrambling to head off further | |
| attacks. | |
| Officials of the facilities struck by the virus met this month to discuss its | |
| nature and impact. The meeting at National Security Agency headquarters in Fort | |
| Meade, Md., included representatives of NSA and NIST as 'observers,' according | |
| to NIST computer security chief Stuart Katzke. | |
| Two days later, NSA and NIST officials met again to discuss how to avert future | |
| infections, Katzke said. Katzke, who attended both meetings, said no decisions | |
| had been reached on how to combat viruses, and NSA and NIST representatives | |
| will meet again to firm up recommendations. | |
| Katzke, however, suggested one solution would be the formation of a federal | |
| center for anti-virus efforts, operated jointly by NSA's National Computer | |
| Security Center (NCSC) and NIST. | |
| The center would include a clearinghouse that would collect and disseminate | |
| information about threats, such as flaws in operating systems, and solutions. | |
| However, funding and personnel for the center is a problem, he said, because | |
| NIST does not have funds for such a facility. | |
| The center also would help organize responses to emergencies by quickly warning | |
| users of new threats and defenses against them, he said. People with solutions | |
| to a threat could transmit their answers through the center to threatened | |
| users, he said. A database of experts would be created to speed response to | |
| immediate threats. | |
| The center would develop means of correcting flaws in software, such as | |
| trapdoors in operating systems. Vendors would be asked to develop and field | |
| solutions, he said. | |
| NIST would work on unclassified systems and the NCSC would work on secure | |
| military systems, he said. Information learned about viruses from classified | |
| systems might be made available to the public through the clearinghouse, Katzke | |
| said, although classified information would have to be removed first. | |
| Although the virus that prompted these meetings did not try to destroy data, it | |
| made so many copies of itself that networks rapidly became clogged, greatly | |
| slowing down communications. Across the network, computer systems | |
| crashed as the virus continuously replicated itself. | |
| During a Pentagon press conference on the virus outbreak, Raymond Colladay, | |
| director of the Defense Advanced Research Projects Agency (DARPA), said the | |
| virus hit 'several dozen' installations out of 300 on the agency's unclassified | |
| Arpanet network. | |
| Thousands Affected | |
| The virus also was found in Milnet, which is the unclassified portion of the | |
| Defense Data Network. Estimates of how many computers on the network were | |
| struck varied from 6,000 to 250,000. The virus did not affect any classified | |
| systems, DOD officials said. | |
| The virus hit DARPA computers in Arlington, Va., and the Lawrence Livermore | |
| Laboratories in California as well as many academic institutions, Colladay | |
| said. It also affected the Naval Ocean Systems Command in San Diego and the | |
| Naval Research Laboratory in Maryland, a Navy spokesman said. | |
| Written in C and aimed at the UNIX operating system running on Digital | |
| Equipment Corp. VAX and Sun Microsystems Inc. computers, the virus was released | |
| November 2, 1988 into Arpanet through a computer at the Massachusetts Institute | |
| of Technology in Cambridge, Mass. | |
| The Virus apparently was intended to demonstrate the threat to networked | |
| systems. Published reports said the virus was developed and introduced by a | |
| postgraduate student at Cornell University who specializes in computer | |
| security. The FBI has interviewed the student. | |
| Clifford Stoll, a computer security expert at Harvard University who helped | |
| identify and neutralize the virus, said the virus was about 40 kilobytes long | |
| and took 'several weeks' to write. It replicated itself in three ways. | |
| Spreading the Virus | |
| The first method exploited a little-known trapdoor in the Sendmail | |
| electronic-mail routine of Berkeley UNIX 4.3, Stoll said. The trapdoor was | |
| created by a programmer who wanted to remove some bugs, various reports said. | |
| However, the programmer forgot to remove the trapdoor in the final production | |
| version. In exploiting this routine, the virus tricked the Sendmail program | |
| into distributing numerous copies of the virus across the network. | |
| Another method used by the virus was an assembly language program that found | |
| user names and then tried simple variations to crack poorly conceived passwords | |
| and break into more computers, Stoll said. | |
| Yet another replication and transmission method used a widely known bug in the | |
| Arpanet Finger program, which lets users know the last time a distant user has | |
| signed onto a network. By sending a lengthy Finger signal, the virus gained | |
| access to the operating systems of Arpanet hosts. | |
| The virus was revealed because its creator underestimated how fast the virus | |
| would attempt to copy itself. Computers quickly became clogged as the virus | |
| rapidly copied itself, although it succeeded only once in every 10 copy | |
| attempts. | |
| Users across the country developed patches to block the virus' entrance as soon | |
| as copies were isolated and analyzed. Many users also used Arpanet to | |
| disseminate the countermeasures, although transmission was slowed by the | |
| numerous virus copies in the system. | |
| DARPA officials 'knew precisely what the problem was,' Colladay said. | |
| 'Therefore, we knew precisely what the fix was. As soon as we had put that fix | |
| in place, we could get back online.' | |
| Colladay said DARPA will revise security policy on the network and will decide | |
| whether more security features should be added. The agency began a study of | |
| the virus threat two days after the virus was released, he said. | |
| All observers said the Arpanet virus helped raise awareness of the general | |
| virus threat. Several experts said it would help promote computer security | |
| efforts. 'Anytime you have an event like this it heightens awareness and | |
| sensitivity,' Colladay said. | |
| However, Katzke cautioned that viruses are less of a threat than are access | |
| abusers and poor management practices such as inadequate disaster protection or | |
| password control. Excellent technical anti-virus defenses are of no use if | |
| management does not maintain proper control of the system, he said. | |
| Congress also is expected to respond to the virus outbreak. The Computer Virus | |
| Eradication Act of 1988, which lapsed when Congress recessed in October, will | |
| be reintroduced by Rep. Wally Herger (R-Calif.), according to Doug Griggs, who | |
| is on Herger's staff. | |
| _______________________________________________________________________________ | |
| Congressmen Plan Hearings On Virus November 27, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From The Seattle Times (Newhouse News Services) | |
| WASHINGTON - The computer virus that raced through a Pentagon data network | |
| earlier this month is drawing the scrutiny of two congressional committee | |
| chairmen who say they plan hearings on the issue during the 101st Congress. | |
| Democratic Reps. Robert Roe, chairman of the House Science Space and Technology | |
| Committee, and William Hughes, chairman of the crime subcommittee of the House | |
| Judiciary Committee, say they want to know more about the self-replicating | |
| program that invaded thousands of computer systems. | |
| The two chairmen, both from New Jersey, say the are concerned about how | |
| existing federal law applies to the November 2, 1988 incident in which a | |
| 23-year-old computer prodigy created a program that jammed thousands of | |
| computers at universities, research centers, and the Pentagon. | |
| Roe said his committee also will be looking at ways to protect vital federal | |
| computers from similar viruses. | |
| "As we move forward and more and more of our national security is dependent on | |
| computer systems, we have to think more about the security and safety of those | |
| systems," Roe said. | |
| Hughes, author of the nation's most far-reaching computer crime law, said his | |
| 1986 measure is applicable in the latest case. He said the law, which carries | |
| criminal penalties for illegally accessing and damaging "federal interest" | |
| computers, includes language that would cover computer viruses. | |
| "There is no question but that the legislation we passed in 1986 covers the | |
| computer virus episodes,' Hughes said. Hughes noted that the law also includes | |
| a section creating a misdemeanor offense for illegally entering a | |
| government-interest computer. The network invaded by the virus, which included | |
| Pentagon research computers, would certainly meet the definition of a | |
| government-interest computer, he said. | |
| "The 1986 bill attempted to anticipate a whole range of criminal activity | |
| that could involve computers," he said. | |
| _______________________________________________________________________________ | |
| Pentagon Severs Military Computer From Network Jammed By Virus Nov. 30, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By John Markoff (New York Times) | |
| NEW YORK - The Pentagon said on Wednesday that it had temporarily severed the | |
| connections between a nonclassifed military computer network and the nationwide | |
| academic research and corporate computer network that was jammed last month by | |
| a computer virus program. | |
| Department of Defense officials said technical difficulties led to the move. | |
| But several computer security experts said they had been told by Pentagon | |
| officials that the decision to cut off the network was made after an unknown | |
| intruder illegally gained entry recently to several computers operated by the | |
| military and defense contractors. | |
| Computer specialists said they thought that the Pentagon had broken the | |
| connections while they tried to eliminate a security flaw in the computers in | |
| the military network. | |
| The Department of Defense apparently acted after a computer at the Mitre | |
| Corporation, a Bedford, Mass., company with several military contracts, was | |
| illegally entered several times during the past month. Officials at several | |
| universities in the United States and Canada said their computers had been used | |
| by the intruder to reach the Mitre computer. | |
| A spokeswoman for Mitre confirmed Wednesday that one of its computers had been | |
| entered, but said no classified or sensitive information had been handled by | |
| the computers involved. "The problem was detected and fixed within hours with | |
| no adverse consequences," Marcia Cohen said. | |
| The military computer network, known as Milnet, connects hundreds of computers | |
| run by the military and businesses around the country and is linked through | |
| seven gateways to another larger computer network, Arpanet. It was Arpanet | |
| that was jammed last month when Robert T. Morris, a Cornell University | |
| graduate student, introduced a rogue program that jammed computers on the | |
| network. | |
| In a brief statement, a spokesman at the Defense Communication Agency said the | |
| ties between Milnet and Arpanet, known as mail bridges, were severed at 10 p.m. | |
| Monday and that the connections were expected to be restored by Thursday. | |
| "The Defense Communications Agency is taking advantage of the loop back to | |
| determine what the effects of disabling the mail bridges are," the statement | |
| said. "The Network Information Center is collecting user statements and | |
| forwarding them to the Milnet manager." | |
| Several computer security experts said they had been told that the network | |
| connection, which permits military and academic researchers to exchange | |
| information, had been cut in response to the intruder. "We tried to find out | |
| what was wrong (Tuesday night) after one of our users complained that he could | |
| not send mail," said John Rochlis, assistant network manager at the | |
| Massachusetts Institute of Technology. "Inititally we were given the run | |
| around, but eventually they unofficially confirmed to us that the shut-off was | |
| security related." | |
| Clifford Stoll, a computer security expert at Harvard University, posted an | |
| electronic announcement on Arpanet Wednesday that Milnet was apparently | |
| disconnected as a result of someone breaking into several computers. | |
| Several university officials said the intruder had shielded his location by | |
| routing telephone calls from his computer through several networks. | |
| A manager at the Mathematics Faculty Computer Facility at the University of | |
| Waterloo in Canada said officials there learned that one of their computers had | |
| been illegally entered after receiving a call from Mitre. | |
| He said the attacker had reached the Waterloo computer from several computers, | |
| including machines located at MIT, Stanford, the University of Washington and | |
| the University of North Carolina. He said that the attacks began on November 3, | |
| 1988 and that some calls had been routed from England. | |
| A spokeswoman for the Defense Communications Agency said that she had no | |
| information about the break-in. | |
| Stoll said the intruder used a well-known computer security flaw to illegally | |
| enter the Milnet computers. The flaws are similar to those used by Morris' | |
| rogue program. | |
| It involves a utility program called "file transfer protocol (FTP" that is | |
| intended as a convenience to permit remote users to transfer data files and | |
| programs over the network. The flaw is found in computers that run the Unix | |
| operating system. | |
| The decision to disconnect the military computers upset a number of computer | |
| users around the country. Academic computer security experts suggested that | |
| the military may have used the wrong tactic to attempt to stop the illegal use | |
| of its machines. | |
| "There is a fair amount of grumbling going on," said Donald Alvarez, an MIT | |
| astrophysicist. "People think that this is an unreasonable approach to be | |
| taking." | |
| He said that the shutting of the mail gateways did not cause the disastrous | |
| computer shutdown that was created when the rogue program last month stalled as | |
| many as 6,000 machines around the country. | |
| [The hacker suspected of breaking into MIT is none other than Shatter. He | |
| speaks out about the hacker community in PWN XXII/4. -KL] | |
| _______________________________________________________________________________ | |
| MCI's New Fax Network December 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~ | |
| >From Teleconnect Magazine | |
| MCI introduced America's first dedicated fax network. It's available now. The | |
| circuit-switched network, called MCI FAX, takes a slice of MCI's existing | |
| bandwidth and configures it with software to handle only fax transmissions. | |
| Customers - even MCI customers - have to sign up separately for the service, | |
| though there's currently no fee to join. | |
| Users must dedicate a standard local phone line (e.g. 1MB) to each fax machine | |
| they want on the MCI network (the network doesn't handle voice) and in return | |
| get guaranteed 9600 baud transmission, and features like management reports, | |
| customized dialing plans, toll-free fax, cast fax, several security features, | |
| delivery confirmation and a separate credit card. | |
| The system does some protocol conversion, fax messages to PCs, to telex | |
| machines or from a PC via MCI Mail to fax. The service is compatible with any | |
| make or model of Group III and below fax machine and will be sold, under a new | |
| arrangement for MCI, through both a direct sales force and equipment | |
| manufacturers, distributors and retailers. For more info 1-800-950-4FAX. MCI | |
| wouldn't release pricing, but it said it would be cheaper. | |
| _______________________________________________________________________________ | |
| Military Bans Data Intruder December 2, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Compiled From News Services | |
| NEW YORK -- The Pentagon has cut the connections between a military computer | |
| network (MILNET) and an academic research network (ARPANET) that was jammed | |
| last month by a "computer virus." | |
| The Defense Department acted, not because of the virus, but rather because an | |
| unknown intruder had illegally gained entry to several computers operated by | |
| the armed forces and by defense contractors, several computer security experts | |
| said. | |
| The Defense Department apparently acted after a computer at the Mitre | |
| Corporation of Bedford, Mass., a company with several military contracts, was | |
| illegally entered several times in the past month. | |
| Officials at several universities in the United States and Canada said their | |
| computers had been used by the intruder to reach the Mitre computer. | |
| A spokeswoman for Mitre confirmed Wednesday that one of its computers had been | |
| entered, but said no classified or sensitive information had been handled by | |
| the computers involved. | |
| "The problem was detected and fixed within hours, with no adverse | |
| consequences," Marcia Cohen, the spokeswoman said. | |
| The military computer network, known as Milnet, connects hundreds of computers | |
| run by the armed forces and businesses around the country and is linked through | |
| seven gateways to another larger computer network, Arpanet. Arpanet is the | |
| network that was jammed last month by Robert T. Morris, a Cornell University | |
| graduate student. | |
| _______________________________________________________________________________ | |