[iwar] [fc:Pro-USA.Hackers.Target.Pakistani.Defacement.Group]

From: Fred Cohen (fc@all.net)
Date: 2001-10-22 21:53:23


Return-Path: <sentto-279987-3278-1003812784-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 22 Oct 2001 21:55:12 -0700 (PDT)
Received: (qmail 28692 invoked by uid 510); 23 Oct 2001 04:52:34 -0000
Received: from n7.groups.yahoo.com (216.115.96.57) by 204.181.12.215 with SMTP; 23 Oct 2001 04:52:34 -0000
X-eGroups-Return: sentto-279987-3278-1003812784-fc=all.net@returns.onelist.com
Received: from [10.1.4.52] by n7.groups.yahoo.com with NNFMP; 23 Oct 2001 04:53:04 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 23 Oct 2001 04:53:04 -0000
Received: (qmail 28822 invoked from network); 23 Oct 2001 04:53:03 -0000
Received: from unknown (10.1.10.142) by m8.onelist.org with QMQP; 23 Oct 2001 04:53:03 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3 with SMTP; 23 Oct 2001 04:53:03 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9N4rNl14498 for iwar@onelist.com; Mon, 22 Oct 2001 21:53:23 -0700
Message-Id: <200110230453.f9N4rNl14498@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 22 Oct 2001 21:53:23 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Pro-USA.Hackers.Target.Pakistani.Defacement.Group]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Pro-USA Hackers Target Pakistani Defacement Group 
By Brian McWilliams, Newsbytes, 10/22/2001
<a href="http://www.newsbytes.com/news/01/171365.html">http://www.newsbytes.com/news/01/171365.html>

A group of vigilante hackers said it has identified the leader of a
rival Pakistani hacking group and has turned the information over to the
FBI. 
Members of Yihat, an international coalition of hackers attempting to
disrupt terrorist computer networks, said they have discovered the real
name and contact information for the co-founder of GForce Pakistan. 
GForce Pakistan defaced two Web sites operated by the U.S. government in
the past week and promised to attack hundreds more to publicize its
message about the injustice of the U.S. military raids on Afghanistan
and about the historic mistreatment of Muslims. 
A member of Yihat who identified himself as Pullerman said the GForce
leader's nickname "Heataz" was easily connected to his real name through
a simple Web search. According to Pullerman, Heataz is employed with an
online firm in Karachi, Pakistan. 
Attempts by Newsbytes this morning to reach the alleged GForce leader
were unsuccessful. 
Yihat's organizer, Kim Schmitz, announced the discovery during an
informal meeting of the group this morning over Internet relay chat. 
"GForce members will be busted soon! We delivered all (information)
about those terror-supporters to the FBI," Schmitz told chat
participants. 
FBI officials were not immediately available to comment on Yihat's
claims. 
Mark Rasch, a former computer crime prosecutor with the U.S. Department
of Justice, said American law enforcement officials are unlikely to
pursue computer attackers in Pakistan, an effort that would require
invoking a mutual legal assistance treaty with the Pakistan government. 
"If it's just a simple defacement, we wouldn't even bother going after
them," said Rasch, now vice president of cyber-law for Predictive
Systems. 
Even if GForce members were agents of the Taliban and plotting more
serious attacks on U.S. networks, the U.S. might be reluctant to
pressure Pakistan's embattled leaders to turn over the hackers, and
would instead contemplate what he termed "affirmative information
warfare." 
"They might try to shut down the company the hacker works for. But in
this climate, the U.S. would be very reluctant to engage in affirmative
information warfare within Pakistan," said Rasch. 
Yihat's Schmitz told Newsbytes that he does not believe GForce is
responsible for denial-of-service attacks that have knocked Yihat's Web
site offline since this weekend. Instead, the attacks on
<a href="http://www.kill.net">http://www.kill.net> are likely the work of "kids" 
that were prevented
from using the group's Internet relay chat channel, Schmitz said. 
Because of the attacks and other reasons, Schmitz said he has decided to
discontinue the Yihat site and to move the group underground. A core
group of 46 members will carry out Yihat's mission, according to
Schmitz. 
Before it shut down, Yihat's site contained a public message board area
used by the group to share information, as well as information for the
media and for recruiting new users. 
To date, Yihat claims it has launched attacks on two Arabic banks the
hackers believe were connected to Osama bin Laden. Officials from the
two financial institutions deny any security breaches occurred or that
the terrorist leader had accounts at the banks.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:56 PST