[iwar] More on Microsoft...


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Tue, 31 Oct 2000 17:57:02 -0800 (PST)


fc  Tue Oct 31 17:57:13 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 31 Oct 2000 17:57:13 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Wed Nov  1 01:57:08 2000)
X-From_: fc@all.net  Tue Oct 31 19:57:01 2000
Received: from mr.egroups.com (mr.egroups.com [208.50.144.80]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id TAA07367 for ; Tue, 31 Oct 2000 19:56:59 -0600
X-eGroups-Return: sentto-279987-723-973043823-fc=all.net@returns.onelist.com
Received: from [10.1.10.37] by mr.egroups.com with NNFMP; 01 Nov 2000 01:57:03 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-6_2_1); 1 Nov 2000 01:57:03 -0000
Received: (qmail 7538 invoked from network); 1 Nov 2000 01:57:03 -0000
Received: from unknown (10.1.10.142) by m3.onelist.org with QMQP; 1 Nov 2000 01:57:03 -0000
Received: from unknown (HELO all.net) (65.0.156.76) by mta3 with SMTP; 1 Nov 2000 01:57:03 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id RAA27909 for iwar@onelist.com; Tue, 31 Oct 2000 17:57:02 -0800
Message-Id: <200011010157.RAA27909@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 31 Oct 2000 17:57:02 -0800 (PST)
Reply-To: iwar@egroups.com
Subject: [iwar] More on Microsoft...
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Anonymized for your protection...

Vladimir Levin exploited an open modem port at Citibank back in 94, as I
recall, when he relieved them of over $10,000,000 with his laptop.

Per statement *attributed* to Microsoft in the media [By TODD R. WEISS (October 30, 2000)] :
# # # # # # # # # # # # #  # # # # #
The intruder may have viewed source code "for a single future product under
development," the company acknowledged. But an internal investigation "has
confirmed that [the source code] has not been modified or corrupted in any
way," Microsoft said. "We have no evidence to suggest that the hacker gained
any other access to any other source code."
# # # # # # # # # # # # # # # # # # #

In the world I'm familiar with, to "view" source code (over the net) is to
"own" it . . . I was looking to "own" the new Linux 7.0 today as I "viewed" the
ISO image (660 megs) while downloading it over my T-1 at work today.

I certainly would not second guess how long a company might allow an intruder
to muck about on its network before going public or to law enforcement. After
all, the DOE knew about the Cuckoo's Egg cracker for quite some time before
going to law enforcement or going public. However, it *would* take some
chutzpah to allow an attack to continue which could quickly change course (vs
at the relatively leisurely pace that the modem connections hacked at Lawrence
Berkeley labs in the 80's).

I am also quite confident that this kind of crack would have likely taken place
long before now (and certainly with greater frequency) were it not for the
aggressive security initiatives Howard instituted at microsoft after he joined
them.

-------------------------- eGroups Sponsor -------------------------~-~>
eGroups eLerts
It's Easy. It's Fun. Best of All, it's Free!
http://click.egroups.com/1/9698/14/_/595019/_/973043823/
---------------------------------------------------------------------_->

------------------
http://all.net/