From: Mark Neely <[EMAIL PROTECTED]> - - - - - - - - - - - - - - - - - - - - Net-Alert 21 July 1999 If you have any questions, comments or other feedback concerning Net-Alert articles, contact the Editor at <mailto:[EMAIL PROTECTED]> Previous editions of Net-Alert are available at http://www.onelist.com/arcindex.cgi?listname=net-alert Subscription and unsubscription details are available at the end of this newsletter. ____________________ Contents: ## Anti-BO2K tools ## Hackers hacked? ## Keeping tabs on email ## War with computer criminals gets nasty ## Just how anonymous are anonymous Web services? ## Credit card fraud ## Credit card scam ## eBay fraud prosecution ## Virtual models? ____________________ Anti-BO2K tools After some confusion and delay, the Cult of the Dead Cow released Back Orifice 2000 earlier this week, as foreshadowed in the last issue of Net-Alert. While BO2K doesn't constitute a new threat (it is really only an extension of the earlier Back Orifice trojan horse), it is certainly a good idea to take steps to protect your PC against it. Below are some URLs offering information about the program, what it can do, how to detect it and how to defend against it. There is also a link to a program called "Cassandra" (appropriately named after the Trojan goddess who tried to warn the Trojan people of the original "trojan horse"), which can detect BO2K, among other trojan horse programs. Most popular anti-virus program vendors have now released updates that will protect user's computers against BO2K. Be sure to update your anti-virus program. URLs: Data Fellows BO2K Web page http://www.datafellows.com/v-descs/bo2k.htm Sophos Alert http://www.sophos.com/downloads/ide/index.html#bo2k XForce Alert http://xforce.iss.net/alerts/advise31.php3 Symantec Anti-Virus Research Center advisory http://www.norton.com/avcenter/venc/data/back.orifice.2000.troj an.html Cassandra download site http://www.win32software.com/software.htm ____________________ Hackers hacked? In a related story, the Cult of the Dead Cow endured considerable embarrassment when it was forced to admit that the CDs it distributed at the DefCon conference containing its BO2K program were infected with a particularly nasty computer virus called CIH (also known as Chernobyl). URL: CNet article http://www.news.com/News/Item/0%2c4%2c39272%2c00.html?dd.ne.txt .0716.09 ____________________ Keeping tabs on email One of the questions most commonly asked by new users is: "How do I know that my email was delivered or read?". The short answer is: there is no way to tell, except perhaps to call the recipient and ask. A new service, free to all Internet users, may help solve this dilemma. CertifiedMail.com allows users to track email messages sent via the service, and provides details of exactly when messages are opened or retrieved. It caters for both personal and business users, and offers a range of extra “add-on” services for business users (though there is a charge for these added services). The way it works is quite straightforward. After you have registered with the service, you can log into the member area, which has an online form for composing messages. When you send the message, the recipient receives a notice advising that they have an important message. To retrieve it, they must click on the link contained in the notice. This takes them to the site where they can read your message and retrieve any attachments. When they do, the time and date is recorded on a log, so you can see that the message has been read. URL: CertifiedMail http://www.certifiedmail.com ____________________ War with computer criminals gets nasty Network Associates has announced the availability of a new tool in the fight against computer criminals: a "decoy" server program called CyberCop Sting. As its name suggests, once the decoy server is deployed on a company's network, it tracks all attempts to break-in or otherwise interfere with the server, records their details and creates detailed reports for further investigation. According to the company's press release: CyberCop Sting operates by creating a series of fictitious corporate systems on a specially outfitted server that combines moderate security protection with sophisticated monitoring technology. The Sting product creates a decoy, virtual TCP/IP network on a single server or workstation and can simulate a network containing several different types of network devices, including Windows NT servers, Unix servers and routers. Each virtual network device has a real IP address and can receive and send genuine-looking packets from and to the larger network environment. Each virtual network node can also run simulated daemons, such as finger and FTP, to further emulate the activity of a genuine system and avoid suspicion by would-be intruders. ____________________ Just how anonymous are anonymous Web services? Anonymous Web browsing services, which protect your privacy by acting as a proxy service that hides your computer's details (including your IP address) and blocks access to cookies while you explore the Net, may not be as anonymous as initially thought, thanks to a Java/Javascript security weakness. If your Web browser is configured with Java and Javascript "enabled", it is possible to circumvent anonymous proxy services and query the Web browser directly for the information. URL: BUGTRAQ Report http://www.securityfocus.com/templates/archive.pike?list=1&msg= [EMAIL PROTECTED] ____________________ Credit card fraud Many consumers are afraid to purchase goods and services over the Internet lest their credit card details should fall into the hands of criminals. While the risk of this occuring is real, it is quite low. In fact, the risk is not much greater than when purchasing from mail-order catalogues or by telephone. But there is a seldom discussed twist to the issue: you don’t actually have to use your credit card to purchase goods over the Internet to be the victim of online credit card fraud. “Credit card number generator” programs have been widely available for many years. These are computer programs that create credit card numbers using the same, supposedly “secret”, algorithms used by the banks to generate the numbering sequence used on the front of credit cards. Computer criminals use such programs to generate thousands of credit card numbers at a time, then visit online storefronts and attempt to purchase goods. If the transaction is processed without problem, they know they have a “valid” credit card number. They can then use this number (for a limited time at least) to purchase products and services both online and offline. Remember, these criminals haven’t “stolen” credit card numbers from an online storefront, or captured transaction details. They’ve literally just made up credit card details. So even if you don’t purchase goods online, your credit card details may not be safe. You should always check your credit card statements thoroughly as soon as they arrive. ____________________ Credit card scam This scam is a variation of one covered in an earlier issue of Net-Alert. Scammers have been cold-calling consumers and identifying themselves as representatives from their credit card company. They claim that in order to deal with certain Y2K issues, the credit card company is sending a replacement magnetic strip for the back of the card, without which the card won't function after January 1, 2000. The scammer then asks for the consumer's credit card details for verification. Just say no! ____________________ eBay fraud prosecution Robert Guest, 31, of Blue Jay, California, pleaded guilty to defrauding buyers on the eBay online auction service. Guest offered several items for sale but failed to deliver them after collecting payments, netting around US$37 000 between March and May 1998. eBay has since made a number of modifications to its auction service aimed at protecting both buyers and sellers from fraudulent activities. ____________________ Virtual models? Well, I guess it had to happen. The Elite modeling agency, "the world's largest and most prestigious modeling agency", has launched a new division specialising in "virtual" models and actresses (yes, that's right, computer generated 3D characters). According to the agency's press release, it has already "signed" its first virtual model, Webbie Tookay (I'm almost certain that that is an attempted pun on their part). In launching the new division, Elite Illusion 2K - Virtual Models and Actresses Management, Elite claims to be "...launching a new concept of beauty for the next millennium". They might have something there. I suppose virtual models don't throw temper tantrums, suffer from weight problems or hang out with the wrong crowds! You can see the result of Tookay's first "photoshoot" online. URL: Virtual Model http://www.illusion2k.com:81/photos/index.htm ____________________ Send a copy of Net-Alert to a friend. Forwarding this newsletter to friends and colleagues is encouraged, providing the message is forwarded in its entirety, including the copyright notice. ____________________ If you received this copy of Net-Alert from a friend, you can subscribe by visiting the following URL: http://www.onelist.com/subscribe/net-alert or by sending a blank email to [EMAIL PROTECTED] To UNSUBSCRIBE, send a blank email to [EMAIL PROTECTED] ____________________ Net-Alert is copyright (c) Mark Neely 1999. Forwarding this message to friends and colleagues is encouraged, providing the message is forwarded in its entirety, including this copyright notice. - - - - - - - - - - - - - - - - - - - - --------------------------- ONElist Sponsor ---------------------------- Start a new ONElist list & you can WIN great prizes! http://www.onelist.com See homepage for details on ONElist's new "FRIENDS & FAMILY" program. ------------------------------------------------------------------------