Return-Path: <sentto-279987-3278-1003812784-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 22 Oct 2001 21:55:12 -0700 (PDT) Received: (qmail 28692 invoked by uid 510); 23 Oct 2001 04:52:34 -0000 Received: from n7.groups.yahoo.com (216.115.96.57) by 204.181.12.215 with SMTP; 23 Oct 2001 04:52:34 -0000 X-eGroups-Return: sentto-279987-3278-1003812784-fc=all.net@returns.onelist.com Received: from [10.1.4.52] by n7.groups.yahoo.com with NNFMP; 23 Oct 2001 04:53:04 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 23 Oct 2001 04:53:04 -0000 Received: (qmail 28822 invoked from network); 23 Oct 2001 04:53:03 -0000 Received: from unknown (10.1.10.142) by m8.onelist.org with QMQP; 23 Oct 2001 04:53:03 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3 with SMTP; 23 Oct 2001 04:53:03 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9N4rNl14498 for iwar@onelist.com; Mon, 22 Oct 2001 21:53:23 -0700 Message-Id: <200110230453.f9N4rNl14498@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 22 Oct 2001 21:53:23 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Pro-USA.Hackers.Target.Pakistani.Defacement.Group] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Pro-USA Hackers Target Pakistani Defacement Group By Brian McWilliams, Newsbytes, 10/22/2001 <a href="http://www.newsbytes.com/news/01/171365.html">http://www.newsbytes.com/news/01/171365.html> A group of vigilante hackers said it has identified the leader of a rival Pakistani hacking group and has turned the information over to the FBI. Members of Yihat, an international coalition of hackers attempting to disrupt terrorist computer networks, said they have discovered the real name and contact information for the co-founder of GForce Pakistan. GForce Pakistan defaced two Web sites operated by the U.S. government in the past week and promised to attack hundreds more to publicize its message about the injustice of the U.S. military raids on Afghanistan and about the historic mistreatment of Muslims. A member of Yihat who identified himself as Pullerman said the GForce leader's nickname "Heataz" was easily connected to his real name through a simple Web search. According to Pullerman, Heataz is employed with an online firm in Karachi, Pakistan. Attempts by Newsbytes this morning to reach the alleged GForce leader were unsuccessful. Yihat's organizer, Kim Schmitz, announced the discovery during an informal meeting of the group this morning over Internet relay chat. "GForce members will be busted soon! We delivered all (information) about those terror-supporters to the FBI," Schmitz told chat participants. FBI officials were not immediately available to comment on Yihat's claims. Mark Rasch, a former computer crime prosecutor with the U.S. Department of Justice, said American law enforcement officials are unlikely to pursue computer attackers in Pakistan, an effort that would require invoking a mutual legal assistance treaty with the Pakistan government. "If it's just a simple defacement, we wouldn't even bother going after them," said Rasch, now vice president of cyber-law for Predictive Systems. Even if GForce members were agents of the Taliban and plotting more serious attacks on U.S. networks, the U.S. might be reluctant to pressure Pakistan's embattled leaders to turn over the hackers, and would instead contemplate what he termed "affirmative information warfare." "They might try to shut down the company the hacker works for. But in this climate, the U.S. would be very reluctant to engage in affirmative information warfare within Pakistan," said Rasch. Yihat's Schmitz told Newsbytes that he does not believe GForce is responsible for denial-of-service attacks that have knocked Yihat's Web site offline since this weekend. Instead, the attacks on <a href="http://www.kill.net">http://www.kill.net> are likely the work of "kids" that were prevented from using the group's Internet relay chat channel, Schmitz said. Because of the attacks and other reasons, Schmitz said he has decided to discontinue the Yihat site and to move the group underground. A core group of 46 members will carry out Yihat's mission, according to Schmitz. Before it shut down, Yihat's site contained a public message board area used by the group to share information, as well as information for the media and for recruiting new users. To date, Yihat claims it has launched attacks on two Arabic banks the hackers believe were connected to Osama bin Laden. Officials from the two financial institutions deny any security breaches occurred or that the terrorist leader had accounts at the banks. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:56 PST