Sunday, July 23, 2006

Anatomy of Computer Hacking Over The Internet - Part 3

In last two issue, I talked about the first two stages of Internet
hacking: reconnaissance and research.

Now comes the fun part - the attack.

The wily hacker's looked over the doorways, rattled door knobs,
and poked and prodded the target computer for weaknesses. He's also
done his homework on all the info he's collected.

He's back with toolbox this visit. If his homework revealed no
one's at home and no one's watching, he got it easy. He can bang
away with a sledge hammer without dropping a single sweat of worry.

But before we getting into what the wily hacker's digging for,
let's look at sample of steps he took to get to this point.

I'm going to pick on Linux Desktop OS just to be different.
Microsoft Window has its flaws and most people run the software,
but Linux security flaws don't get enough spotlight attention. We
can't let Microsoft steal the whole show can we?

Suppose the hacker's scanned the Internet for computers running
"telnet," a command line program that runs on "port" 23.
Remember the past discussion about "ports" and "address?"

Internet addresses are like street address to each computer
(host), and ports are like suite numbers at an apartment at that
street address. Computer programs communicate over the Internet
using "ports."

After his Internet scan, the hacker looks into who and what's at
all the addresses that responded on the target port.
He'll check if Telnet is running on the target computer.

Linux includes telnet by default, so an inexperienced computer
user will unknowingly run this software by default. And generally,
people who run unprotected telnet don't know good computer
security, and they tend to leave the gates wide open. Easy picking!

I like telnet because it's quick and easy to use. Every Unix-based
system administrator or network technician used telnet at some
point in time: however, that's ending. Security professionals don't
like telnet for its weaknesses. There are better choices. But
that's for another time. Telnet simply allows one to log into a
computer and run programs remotely just by typing in commands
lines... no mouse... no Windows... just a black screen and a
blinking command prompt.

Here's the nice thing for the hacker -- it's a freebee if the
target computer is running telnet and its owner is using default
settings, and has used a simple password like say... "password." As
the younger crowd would say -- the victim's been "owned!"

But even before the target computer's "owned," the hacker might
look into who the Internet address belongs to. The hacker might
even find out which version of software the target is running, so
other weaknesses can be found and used later.

The bottom line is the hacker's broken into the victim's computer,
and he's free to roam through files or do whatever. This is the
attack. Sometimes, the hacker simply takes over the computer, and
plants stuff for a later attack on another computer. This is where
it gets real neat. Imagine some stranger using your computer to rob
an online bank or to bring down and government computer system.
It's happened before. Knock knock... FBI... we have a search warrant.

Telnet's just one example of how a hacker can break into a
computer on the Internet. Thousands of security vunerablities exist
today - and many new ones become publicly known all the time.

According to the Common Vulnerabilities and Exposures (CVE), a
security standards web site, 11,454 publicly known software
security flaws alone exist today. But that's not all Microsoft
either. Software security flaws don't even include threats like
computer viruses or misconfigured software.

Any time you plug your computer on the Internet, you take on risk.
The question you must answer is how much risk you wish to accept.

In the final installment of Anatomy of Computer Hacking Over The
Internet, I'll talk about ways to minimizing risk on the Internet.

Friday, July 21, 2006

Medicare beneficiaries target of latest identity theft scheme

At least seven people in Idaho with Medicare have been the target of a scheme that tries to steal personal information from seniors and people with disabilities.

Scammers using the so-called “$299 Ring” scheme will call Medicare beneficiaries and say they will provide a new Medicare card for a fee, according to the Idaho Commission on Aging. The new card is reported to cover vision and dental insurance.

Many scammers now are asking for more than $299 for the fake card, commission officials said. Some have asked for $379, $350 or $365. They also request bank account information to withdraw the funds automatically.

Federal law enforcement officials said they have received 250 reports nationwide of attempts to steal Medicare beneficiaries’ funds. At least seven attempts were reported in Idaho.

Scammers have used the names of fictitious companies that sounds authentic, such as Pharma Corp., National Medical Office, Medicare National Office and National Medicare.

Comment: It's terrible that fraud perpetrators prey on the weak and uninformed. Like any crime, perpetrators will go after easy targets first.

This particular case can be classed as business identity theft, as the scammers use the ruse they represent known firms when contacting the victims.


Henry
Protect-My-Info.com

Wednesday, July 19, 2006

Ill. Attorney General Holds Identity Theft Summit, State Ranks 10th Nationally

Ill. Attorney General Holds Identity Theft Summit, State Ranks 10th Nationally: "Illinois Attorney General Lisa Madigan recently convened the first-ever Illinois Identity Theft Summit. The goal of the summit was to bring representatives from law enforcement, the court system, government, business and consumer advocacy groups together to brainstorm about how to provide better services to victims of identity theft and develop more effective strategies for preventing the fastest growing crime in the nation.
Speaking at the summit, Madigan also detailed for the first time the current results of her Identity Theft Hotline, which has been in operation since February of this year. The Hotline is a dedicated resource with advocates on hand to assist victims through every stage of the recovery process. Since February of this year, the hotline has handled nearly 3,000 requests for assistance. "

Comment: It's stupid when the right hand has no idea what the left is doing. The federal government already has an identity theft hotline. Why waste more tax payer money???

A hotline isn't what's needed. Fix the cause not the symptoms.

Henry
Protect-My-Info.com

Thursday, July 13, 2006

Anatomy of Computer Hacking Over The Internet - Part Deux

Anatomy of Computer Hacking Over The Internet - Part Deux

Just to pick up on a long forgetten past blog post, I talked about reconnaissance in Internet hacking.

Using the analogy of an apartment, the street address is similar
to your computer's Internet address. And your Internet software
programs have "ports" like apartment suite numbers. I then compared
a hacker's reconnaissance to a stranger rattling apartment door
knobs to find weaknesses.

Today we'll look at what happens after the wily hacker's finished
scanning for possible target computers. He's got addresses, and
he's identified open ports at those addresses. Now he must gather
more information about his potential target.

He's like a stranger who has a list of possible addresses and
apartment suites to burlarize.

But before he does anything... he must do some homework.

After scanning the Internet, the hacker might probe the responsive
addresses some more -- more door rattling.

He's looking for clues about the software running on that target
computer. Even better if he can find out which make, model and
version is running. That way he just has to look up public
information about the software's known flaws. It's worse when the
hacker has his own private tricks to exploit software -- but those
type are less common.

The hacker might even dig into who owns that address, to find out
how juicy the target might be. He wants to know what might be
inside the computer. Any information is good for hacker.

Going back to the apartment analogy, the stranger's wandered the
apartment block to look for suites to break into. He takes notes
about the weaknesses at each door. He'll want to know... is there a
big dog inside? What sort of frame, hinge and lock is on the door?
Are there any signs of alarm systems? What type of alarm? Where are
the getaway exits? And on and on.

He then researches everything from who lives in the suite to
weaknesses around the suites. Then when he knows enough to exploit
the weaknesses, he returns with the right break-in tools... for the
attack.

Before he's back, you might not even notice he's been around - but
you can take protective steps, which I'll discuss after Part 3.

Meanwhile, stay tuned for the next issue when we explore Part 3
of The Anatomy of Computer Hacking Over The Internet.

Have wonderful Thankgiving holiday (if you're down south of the
border).

Until next time, be smart and stay safe.

== Henry Tom

Saturday, July 08, 2006

CBC News: National Bank asks 700 customers to close accounts after personal info stolen

CBC News: National Bank asks 700 customers to close accounts after personal info stolen: "The National Bank of Canada has advised 700 customers to close their bank accounts and cancel their credit cards after a bank employee's laptop was stolen."

Comment: At least the bank notified its customers of its security breach. The question is why didn't the bank take stonger steps to lock down the personal information on its laptop.

Henry
Protect-My-Info.com

Friday, July 07, 2006

wnbc.com - News - Jail Time For Identity Theft

wnbc.com - News - Jail Time For Identity Theft: "A woman was sentenced to three to six years in prison for helping run an identity fraud ring that supplied fake driver's licenses, Social Security cards and resident alien IDs to thousands of people."

Comment: Note the news article refers to the incident as "identity fraud" versus "identity theft."

The term "identity fraud" would be more fitting when fake identification or identities are used. Identity theft using real identities can be refered to as "identity fraud" too. In any case, using another person's personal information without permission is fraud.

Henry
Protect-My-Info.com

Thursday, July 06, 2006

cbs4boston.com - Protecting Yourself From Medical Identity Theft

cbs4boston.com - Protecting Yourself From Medical Identity Theft: "�When someone has taken your identity information, such as your name or your social security number, and they use it to get medical treatment in your name,' said Pam Dixon of the World Privacy Forum.

So how does it happen? Imposters either provide fake insurance information to medical providers, or none at all, which can end up costing you big money.

Medical id thieves can also alter your health record -- putting you in life threatening situations. 'You can have a wrong blood type, you can have prescriptions on your record that you don't take,� said Dixon.

Joe says the man who stole his identity has since died, but the problems the thief caused could continue to haunt him for years. �Now he's dead. Am I dead? You know, will I ever get social security?'"

Comment: This type of identity theft could be a serious problem if it in fact alters your health record. It's one thing to your wealth, but it's extreme to lose your health or even your life because of another person's misdeed.

IOL: Internet hackers fleece man of R26 000

IOL: Internet hackers fleece man of R26 000: "Standard Bank client Colin David lost about R26 000 in eight days and was forced to close his accounts and work through two new cards to stop the theft.

The hackers penetrate the account and in most cases transfer large sums of cash to prepaid cellphone accounts."

Comment: Although 26,000 Rands works out to roughly 3,600 US dollars, it's still a mighty sum for an identity theft that resulted in cash for prepaid cell phone accounts. That could potentially be a lot of phone air time.

Henry
Protect-My-Info.com: