* subscribe at http://techPolice.com
 'Zombies' are latest  hacker-snatched PCs

 Kathryn Balint

Do you know who's been using your computer?
Copyright 2001 Copley News Service  Copley News Service

Unbeknownst to their owners, as many as 100,000 computers are ''zombies,'' secretly 
implanted with programs that put them under the control of hackers.

When commanded, these zombie computers launch the kind of attacks that took out 
Microsoft's Web site this year and crippled eBay, Yahoo! and Amazon.com last year.

Until recently, mostly only university administrators had to worry their computers 
would be hacked and turned into zombies.

But now it's happening with alarming frequency to even the average Web surfer's 
computer.

''Home computers are kind of ripe for the picking,'' said Internet security analyst 
Ian Finlay of Carnegie Mellon University's computer emergency response team.

That's because an increasing number of home computers access the Internet through 
always-on, high-speed connections such as cable modems or digital subscriber lines, 
known as DSL.

At the same time, home users tend to have little in the way of security. The 
combination makes them easy targets.

''Home computer users get their DSL or cable connection, and they don't realize what 
they've done is just put themselves on Main Street, Planet Earth, where people are 
constantly walking around knocking on doors, looking for an opening,'' said Dave 
Dittrich, senior security engineer for the University of Washington.

Half the zombies Dittrich encounters these days are home and small-business computers 
with high-speed Internet connections.

Until the last six months or so, hackers commandeered primarily university computers. 
They plant their zombie programs on machines by exploiting computers' open ports or 
software bugs.

Like the zombies of voodoo superstition that are under the spell of a master, computer 
zombies are under the control of hackers.

They're used to launch what are known as ''distributed denial-of-service attacks'' 
against government and business Web sites.

On command, the computer zombies send millions of packets of useless data to a 
targeted Web site.

The data bombards the site with so much information that it shuts out everyone else, 
much like a radio station contest when callers get a constant busy signal because the 
telephone lines are jammed.

Compared to computer break-ins, in which trespassers steal bank account information or 
destroy hard drives, the planting of a zombie program is relatively benign. Data is 
uncompromised.

But such intrusions are no less disturbing because they demonstrate how vulnerable the 
Internet is.

All it takes is a few hundred desktop machines-turned-zombies to bring down the 
powerful computers of e-commerce and government.

Imagine the chaos that 10,000 to 100,000 zombies could cause.

That's how many the System Administration, Networking and Security Institute estimates 
are lurking out there on the Net at any given time.

Carnegie Mellon's Finlay thinks there may be even more.

In one case last year, he said, investigators found an army of 8,000 zombies waiting 
to be called into action.

Their owners are usually unaware.

''Most people don't have a clue,'' said Jim Stickley, a computer security expert at 
Garrison Technologies' San Diego office.

Unless, of course, the FBI shows up at the door.

That's what happened to the owner of a home-business computer in Portland, Ore.

The unsuspecting owner's computer was seized by FBI agents who said the machine had 
been used as a zombie in last year's high-profile siege against eBay, Yahoo! and 
several other online giants.

But even with a zombie computer as evidence, tracking down the culprits in such 
denial-of-service attacks can be difficult. Most paths lead to zombie machines, not 
the master's.

The main reason law enforcement caught up with a 16-year-old Canadian known as 
''Mafiaboy'' in some of last year's e-commerce assaults was because he bragged about 
his shenanigans. He pleaded guilty to 56 counts in January.

The FBI estimates his antics alone caused $1.7 billion in losses.

That compares to $166,000 in estimated losses from denial-of-service attacks for the 
entire year in 1999, and $77,000 in 1998.

For the past year, the Net has been battered by daily denial-of-service attacks, 
though most assaults aren't big enough to make headlines.

If such attacks are on the rise, so are the number of zombies.

At the end of last year, computer security professionals reported an ominous increase 
in the number of zombies.

At the same time, the FBI's National Infrastructure Protection Center warned of the 
potential for widespread distributed denial-of-service attacks over the New Year's 
holiday.

What they were expecting didn't happen. Still, FBI spokeswoman Debbie Weierman said, 
''The climate hasn't really changed.''

The threat is exacerbated by the fact that rogue programs with names like Trin00, 
Tribal Flood Network and Stacheldraht (German for ''barbed wire''), are created 
specifically to launch denial-of-service attacks.

They can be downloaded from the Net, and every couple months or so, new and improved 
versions come out.

In March, the FBI's protection center reported the sighting of a new denial-of-service 
tool, a ''worm'' named Lion.

As if it isn't already easy enough to become a cybervandal, other programs automate 
the task of ferreting out computers that can be exploited as zombies.

As many as 65,000 machines can be scanned at a time in search of open ports, software 
that hasn't been patched and other ways in.

With such tools, even the most mindless of ''script kiddies'' hackers without any 
knowledge of computer programming can manage to mobilize a force of zombies and wage 
war on the Web.

''The problem right now is it doesn't take anybody too bright to be using these 
programs,'' said Tracy Hulver, a manager for security software maker Network 
Associates.

There's evidence that lots of strangers most likely people with malicious intentions 
are out there on the Net ''rattling doorknobs,'' looking for weaknesses: the typical 
home computer with high-speed Internet access is scanned between five and 25 times a 
day, the Security Institute says.

Even if a distributed denial-of-service attack is imminent, there isn't much the 
victim can do to stop it.

That's because the barrage of bogus data sent by the zombie computers looks like 
legitimate Internet traffic to the victim computer.

''It's a pretty big problem, and it's really hard to solve,'' Finlay said.

A few start-up companies are scrambling to bring to market technology that can defend 
against a distributed denial-of-service attack.

Until then, it's up to computer users to fend off an invasion of the zombies by 
securing their machines with firewalls, which keep out intruders; anti-virus software 
and patches that plug vulnerabilities in programs.

Dittrich, the University of Washington security engineer, said many zombies could have 
been prevented if computer owners had kept their software up-to-date.

But many don't bother.

''A lot of home users look at their home computers the same way they do a toaster or 
an oven,'' Dittrich said.

''They just think you buy it, plug it in and use it. They don't look at it like a car, 
where you have to do maintenance.''


ÝÝÝÝÝÝÝÝÝÝÝÝÝÝÝÝÝÝÝÐhy should you get a NextCard? It's simple. NextCard Visa
will tailor an offer specifically for you in only 30 seconds!
Rates as low as 2.99% Intro or 9.99% Ongoing APR. Apply Now!
http://click.topica.com/caaabQEb1dhr0b1uN1If/NextCard
ÝÝÝÝÝÝÝÝÝÝÝÝÝÝÝÝÝÝÝ==
--via http://techPolice.com
archive: http://theMezz.com/cybercrime/archive
subscribe: [EMAIL PROTECTED]
--via http://theMezz.com

==^================================================================
EASY UNSUBSCRIBE click here: http://topica.com/u/?b1dhr0.b1uN1I
Or send an email To: [EMAIL PROTECTED]
This email was sent to: archive@jab.org

T O P I C A  -- Learn More. Surf Less.
Newsletters, Tips and Discussions on Topics You Choose.
http://www.topica.com/partner/tag01
==^================================================================

Reply via email to