Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
New device looks to counter hackers
by Staff Writers
San Francisco (UPI) Feb 24, 2009


Microsoft uses law to cripple hacker spam network
San Francisco (AFP) Feb 25, 2010 - Microsoft on Thursday said it combined technology with an "extraordinary" legal maneuver to cripple a massive network of hacked computers that had been flooding the Internet with spam. The software titan's Digital Crime Unit got clearance from a US judge to virtually sever the cyber criminals' command computers from hundreds of thousands of machines worldwide infected with a Waledac virus. "We decided the best tactic would be to literally build a wall between the bot-herder, the command computer, and all of the other computers -- effectively cutting the umbilical cord," said Microsoft attorney Richard Boscovich. Microsoft got a US judge to grant an ex parte temporary restraining order that let the firm erect the cyber blockade without warning bot-herders, masters of the "botnet."

"It was of crucial importance that when we went out to sever the connection between the bot herder and the bots, that severing had to be done without him knowing," said Boscovich, who works in the digital crime unit. Microsoft drafted a complaint that made a case to the court that the damage to computer owners worldwide, and to the software firm, was major enough to warrant "this rather extraordinary order," Boscovich said. The mission to take down one of the ten largest botnets in the United States was referred to internally at Microsoft as "Operation b49." Waledac is estimated to have infected hundreds of thousands of computers worldwide, letting its masters mine machines for information or secretly use them to fire off spam email.

Hackers typically infect computers with malicious codes by tricking owners into clicking on booby-trapped email messages or Internet links that plant viruses. Bot-herders are then free to hire out botnets for nefarious tasks such as spewing spam or overwhelming legitimate websites with myriad simultaneously requests in what are known as distributed-denial-of-service attacks. The Waledac botnet was believed to be capable of sending more than 1.5 billion spam email messages daily. During a three week period in December, Waledac-infected machines sent approximately 651 million spam email messages to users of Microsoft's free Hotmail service, according to the software firm. The spam included messages pitching online pharmacies, knock-off goods, and penny stocks.

"Three days into the effort, Operation b49 has effectively shut down connections to the vast majority of Waledac-infected computers, and our goal is to make that disruption permanent," a Microsoft lawyer said in a release. "But the operation hasn't cleaned the infected computers and is not a silver bullet for undoing all the damage we believe Waledac has caused." Computer users are advised to purge their machines of viruses and make sure their programs and security software are up to date. US courts allow for hearings to decide whether temporary restraining orders should be made permanent, setting up an unlikely scenario in which bot-herders would argue for their right to reconnect with their machine minions.

An appliance to be unveiled at California's premier international security conference next week is being marketed as the world's first comprehensive counter-hacking device that may address urgent issues arising from amateur and professional hacking of business and government computers.

Hacking and related cybercrime and the risk of spinoffs for terrorism were blamed for widespread damage to computer systems in North America and elsewhere last year.

Large-scale hacking of computers at government departments and corporate establishments was behind the Obama administration's campaign in fall 2009 to raise awareness of cybercrime.

The U.S. Congress has issued alerts of potential linkages between computer hacking, crime and cyberterrorism and urged the administration to focus more on hacking to eliminate the problem.

Mykonos Software, developers of Web-based technological security solutions, said the company would unveil the new appliance at the RSA Security Conference, next Monday-Friday in San Francisco.

The appliance is designed to trap and confound hackers in real-time with the Web-based appliance, which will be part of a live demonstration at the conference, Mykonos Software said.

"The primary security threat for businesses has shifted from the network layer to the application layer," Mykonos said.

The Mykonos Security Appliance gives system administrators and security staff a real-time view of hackers as they introspect Web applications. It profiles hackers in real-time, ascertaining their location, skill level and other critical data and enables information technology staff to instantly deploy countermeasures, said the company.

The Mykonos security appliance is targeted at financial services and insurance companies, healthcare companies, e-commerce companies, government entities and other high-profile targets of Web-based hacking attempts, Mykonos said.

"As businesses continue to deploy applications to the Web, they are exposing a massive attack surface for hackers to exploit," said David Koretz, president and chief executive officer of Mykonos Software. As a result, he indicated, the primary security threat for businesses has shifted from the network layer to the application layer.

The Mykonos Security Appliance was developed following the Mykonos team's experience in hosting Web applications and creating the first development framework for building secure Web applications.

The Web application firewalls currently applied are flawed because they attempt to protect by using rules-based policies that are challenging to implement and offer only point-in-time reporting, Mykonos said.

Web application firewalls also do not protect against client-side code, which is where the majority of Web application threats exist, said the company.

Most traditional enterprise security solutions sit on the network and have no way to protect the client or code -- and no way to respond to attacks in real-time with countermeasures, Mykonos pointed out.

The new appliance works by hardening the code as it is delivered to the client to detect potentially malicious activity as it happens, evaluating the sophistication of that activity and countering the activity with a variety of measures such as fake responses to confuse the hacker so that they move on to easier targets elsewhere.

The appliance identifies the hacker so that future intrusion attempts can be highlighted as repeat visits and are thwarted appropriately. Mykonos said the appliance gathers personal data on the hacker to turn over to law enforcement, if desired.

"No matter how many firewalls and defenses are put up, hackers will eventually find ways around," said Al Huizenga, director of product management at the company.

"The goal of the Mykonos Security Appliance is to turn a mirror on the hacker and use counter-intelligence tactics to identify them while gaining intelligence about their skill level. More importantly, for the first time system administrators can defend their systems in real-time by launching counter-measures against the hacker."

The company plans to demonstrate both the hacker's view and the enterprise view of a real-time hacking attempt of a corporate enterprise Web application. The demo will show how the Mykonos appliance detects and evaluates the threat level of the malicious activity, and responds automatically with appropriate counter-hacking maneuvers.

Analysts said the appliance could have wide applications worldwide but there was also the risk that publicity about the product would have both law enforcers and criminals drawn to its usage. In 2009, hackers penetrated a wide range of high-security systems in North America and Europe, with costs of remedial action running into millions of dollars, analysts said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
US would lose cyberwar: former intel chief
Washington (AFP) Feb 23, 2010
The United States would lose a cyberwar if it fought one today, a former US intelligence chief warned on Tuesday. Michael McConnell, a retired US Navy vice admiral who served as ex-president George W. Bush's director of national intelligence, also compared the danger of cyberwar to the nuclear threat posed by the Soviet Union during the Cold War. "If we went to war today in a cyberwar, w ... read more


CYBER WARS
Into A Volcano To Test Suitcase-Sized Science Lab

US lunar pull-out leaves China shooting for moon

Astronomers Say Presence Of Water On Moon Will Lead To More Missions

Moon Exploration is Not Dead

CYBER WARS
Mars Express To Make Closest Ever Approach To Phobos

Journey To The Center Of Mars

More Silence From Phoenix

Spirit Hunkers Down For Winter

CYBER WARS
NASA Increases Support Contract To Mid-Atlantic Regional Spaceport

Northrop Grumman Foundation Weightless Flights Of Discovery

SwRI Announces Pioneering Program To Fly Next-Gen Suborbital Experiments With Crew

US committed to space: Obama tells astronauts

CYBER WARS
UK's First China Space Race Exhibition Launched

No Spacewalk From Tiangong-1

China's Mystery Spacelab

China launches orbiter for navigation system: state media

CYBER WARS
Endeavour Home After Completing A Special Delivery To ISS

Endeavour Crew Delivered Last Major US Portion Of ISS

Endeavour astronauts prepare to unveil room with cosmic view

Astronauts Move Cupola

CYBER WARS
Eutelsat's W3B On Fast Track For Ariane 5 Launch

French Guiana Welcomes The Second Passenger For Ariane 5's Upcoming Mission

Dispenser For Globalstar Constellation Declared Flight Worthy

Payload Prep Underway For Arianespace's First Launch Of 2010

CYBER WARS
Watching A Planetary Death March

Seeing ExoPlanet Atmospheres From The Ground

New Technique For Detecting Earth-Like Planets

New technique helps search for another Earth

CYBER WARS
Meet Element Copernicium 112

Water May Not Run Uphill But It Practically Flies Off This Surface

Multi-Beam Antenna Integrated With First MUOS Satellite

NASA Breaks Ground on New Deep Space Network Antennas




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement