Top US military research labs infiltrated by hackers

Hackers successfully infiltrated Oak Ridge National Laboratory (ORNL), one of the nation’s leading military research facilities. The attackers gained access by sending e-mails infected with trojan horses to ORNL employees. The lab claims that no classified information was retrieved, but admits that the perpetrators managed to acquire a database containing personal information about ORNL visitors and employees, including Social Security numbers.

“A hacker illegally gained access to ORNL computers by sending staff e-mails that appeared to be official legitimate communications. When the employees opened the attachment or accessed an embedded link, the hacker planted a program on the employees’ computers that enabled the hacker to copy and retrieve information,” ORNL revealed in a statement. “No classified information was lost; However, visitor personal information may have been stolen. If you visited ORNL between the years 1990 and 2004 your name and other personal information such as your social security number or date of birth may have been part of the stolen information.”

Top US military research labs infiltrated by hackers

Hackers Ram Through Security at Oak Ridge Lab

The Oak Ridge National Laboratory has warned that its computer systems have been infiltrated by one or more hackers who skirted system’s security to gain access to personal information on the lab’s visitors. The information was then used in a phishing scheme that attempted to convince victims to open a malicious e-mail attachment. The lab has not commented on the attackers’ suspected motives

E-Commerce News: Network Intrusion: Hackers Ram Through Security at Oak Ridge Lab

New Software Detects Web Interference

Increasingly worried over Internet providers’ behavior, a nonprofit has released software that helps determine whether online glitches are innocent hiccups or evidence of deliberate traffic tampering.

The San Francisco-based digital rights group Electronic Frontier Foundation hopes the program, released Wednesday, will help uncover “data discrimination” _ efforts by Internet providers to disrupt some uses of their services _ in addition to the cases reported separately by EFF, The Associated Press and other sources.

New Software Detects Web Interference | – Houston Chronicle

16 year-old ‘hacker’ designs Internet policy

A TEENAGE hacker who managed to get around the Aussie government’s $84 million internet filter scheme has been recruited by the opposition Labor party to design its cyber safety policy.

Tom Wood has now become the subject of a slanging match between the Labor and Liberal parties.

Liberal Communications Minister, Helen Coonan, denies that Wood “hacked” the software filters, saying he bypassed them by gaining access to the administrator account on his computer.

16 year-old ‘hacker’ designs Internet policy – The INQUIRER

After Ubuntu, Windows Looks Increasingly Bad, Increasingly Archaic, Increasingly Unfriendly

There are many night-and-day differences between Windows and Ubuntu and, for a guy that does 80% standard office tasks and the rest of the time I’m doing Linux admin tasks, it was nearly all in favor of Ubuntu after the first few weeks of the transition. Overall, my productivity and the scope of things I can do with Ubuntu far exceed what I could do with Windows and just as importantly Ubuntu (like any Linux would) lets me easily create my own productivity shortcuts of a variety of sorts.

After Ubuntu, Windows Looks Increasingly Bad, Increasingly Archaic, Increasingly Unfriendly @ LINUX.SYS-CON.COM

2007 A hacking Odyssey: Part One – Reconnaissance

2007 A hacking Odyssey – Reconnaissance

The aim of this series of papers that will take an in-depth look at how someone may target and electronically break into an organisation, is to educate people who may be tasked with looking after and securing a corporate network to do so in an effective manner.

My personal outlook on this issue is that if you have no idea about the steps a would-be attacker will take to try and gain access to your systems, then you as an administrator can not effectively secure your system to an acceptable standard. Some people may disagree about the concept of demonstrating to people how to gain access to networks they are not meant to, whilst others agree with the ‘full disclosure’ approach.

Take a firewall for example – if you don’t understand the steps an attacker will go through to try and get traffic through your firewall, then how can you stop them for doing it? All you can do is configure it the best way you know how and hope it is good enough.

2007 A hacking Odyssey: Part One – Reconnaissance

A Tour of the Google Blacklist

The full listing (1:1) contained primarily outdated URLs as 86% of the pages or sites were no longer available. While I would like to think that the existence of Google’s blacklist had contributed to the demise of these sites, phishing sites tend to emerge and disappear quickly, so I suspect that this is just a natural part of the phishing cycle. I had expected to see a combination of social engineering attacks, known vulnerabilities and 0day attacks used on the sites with the majority falling into the first category. I was therefore somewhat surprised to find virtually all sites using straight social engineering attacks. I was also surprised to see that the top three targets – eBay, PayPal and Bank of America accounted for 63% of the active phishing sites. One amusing finding was that Yahoo! commonly hosts pages that phish…wait for it…Yahoo! credentials. A breakdown of the full findings can be found below.

Michael Sutton’s Blog : A Tour of the Google Blacklist

Professional Paranoid

My research interests cover the design and analysis of security techniques and systems, with a sideline in various obscure security-related areas such as the recovery of deleted data from magnetic media, and whatever else happens to catch my interest. To view some of the documents referenced on this page you’ll need a copy of the free Adobe Acrobat reader software (note: This link takes you to Acrobat 5.1, which avoids the very buggy and unstable Acrobat 6 or the bloated mess that is Acrobat 7 which Adobe will force on you if you get it from their main download site). Alternatively, if you’re running Windows, you can try the Foxit PDF Reader, which is what the Acrobat reader would be if it lost about 15MB of bloat and ran about 50 times faster than it does.

One of the most popular pages that I maintain is my security resource link farm, a huge (around 1/2MB) collection of links to security and encryption products, companies, papers, conferences, e-commerce and digital cash, security and intelligence agencies, smart cards, digital certificates and CA’s, standards and publications, security problems and holes, and anything else vaguely related to encryption and security. If you’re looking for anything in this area…

Peter Gutmann’s Home Page