[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

[Happy New Year. Looks like things went pretty well, but we'll see. -
FC]

Defacements on other side of midnight
Australia and New Zealand see minor date-stamping
problems, plus 'spray painting' of some Web sites
in a so-far-quiet launch to the new millennium.
Some minor hacking. Australian Webmasters are also
reporting a rash of harmless, but annoying, Web
site spray-paint attacks. Typically, these attacks,
like the one on the investment site Technology
Investments, leave the home page without any links
to the rest of the site and the message: "I hacked
this site simply to say ... welcome to the Y2K!
... by siko!"
http://www.zdnet.com/zdnn/stories/news/0,4586,2415792,00.html

No signs yet of Y2K cyber-chaos
A world remade by technology began the rollover to
the year 2000 today with no early signs of cyber-chaos,
after years of preparation and billions of dollars
spent to fix a simple but widespread computer bug.
http://www.sjmercury.com/svtech/news/breaking/ap/docs/43725l.htm

DOD's IT shop find no Y2K glitches, hackers
One hour after midnight Zulu -- Greenwich Mean Time,
which the majority of military communications systems
use -- the Defense Information Systems Agency-Pacific
could determine that the 120,000 circuits it relies on
to provide connectivity for U.S. forces survived the
key New Year time change without a bump. DISA-Pacific
also had not detected any increase in hacker attacks
or probes, Harvey said, "which really surprised us
because this is a period of heightened vulnerability.
I have three analysts engaged in threat detection and
analysis, and though they're busy [monitoring the
networks], they're not seeing anything."
http://www.fcw.com/pubs/fcw/1999/1227/web-disazulu-12-31-99.html

Domain hack hits wireless modem company
Metricom's Ricochet.net domain name was allegedly
commandeered by hackers Tuesday, causing emails sent
to users of the company's wireless modems to bounce
back to their senders for about 48 hours, the company
confirmed. Visitors to the Ricochet.net Web site also
were redirected to a pornographic site for nearly two
days and some incoming emails continued to bounce back
until early yesterday, according to Metricom executives.
Service returned to normal by yesterday afternoon,
executives said.

http://news.cnet.com/news/0-1004-200-1510319.html
Hackers break into rail network's Web page
Hackers broke into an official Web site and issued a
false warning that train service in Britain had been
canceled Friday due to millennium bug problems. The
warning, which read ``No trains today,'' was discovered
on Railtrack's Internet site at about 9 a.m., officials
said. The hoax message also sent greetings to all
Railtrack directors and ``all the sheep in Wales.''
http://www.sjmercury.com/svtech/news/breaking/merc/docs/068585.htm

FC