[iwar] [fc:Stand.by.for.more.nasty.Web.attacks.in.2002]

From: Fred Cohen (fc@all.net)
Date: 2001-12-27 21:39:06


Return-Path: <sentto-279987-4138-1009517913-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 27 Dec 2001 21:40:08 -0800 (PST)
Received: (qmail 10403 invoked by uid 510); 28 Dec 2001 05:38:55 -0000
Received: from n30.groups.yahoo.com (216.115.96.80) by all.net with SMTP; 28 Dec 2001 05:38:55 -0000
X-eGroups-Return: sentto-279987-4138-1009517913-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.162] by n30.groups.yahoo.com with NNFMP; 28 Dec 2001 05:38:33 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 28 Dec 2001 05:38:33 -0000
Received: (qmail 75868 invoked from network); 28 Dec 2001 05:38:33 -0000
Received: from unknown (216.115.97.172) by m8.grp.snv.yahoo.com with QMQP; 28 Dec 2001 05:38:33 -0000
Received: from unknown (HELO red.all.net) (12.232.125.69) by mta2.grp.snv.yahoo.com with SMTP; 28 Dec 2001 05:38:33 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fBS5d6604008 for iwar@onelist.com; Thu, 27 Dec 2001 21:39:06 -0800
Message-Id: <200112280539.fBS5d6604008@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 27 Dec 2001 21:39:06 -0800 (PST)
Subject: [iwar] [fc:Stand.by.for.more.nasty.Web.attacks.in.2002]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit

Stand by for more nasty Web attacks in 2002

By Elinor Mills Abreu, Reuters,12/27/2001
<a href="http://www.reuters.co.uk/news_article.jhtml?type=businessnews&StoryID=478566">http://www.reuters.co.uk/news_article.jhtml?type=businessnews&StoryID=478566>#

If security experts are calling 2001 the worst year for computer
viruses, and December the worst month, how bad will things get in 2002? 
Experts are predicting that viruses and their cousins, the
self-propagating worms, will find new and even more nasty ways to attack
computer systems, possibly even hitting mobile devices, pocket PCs and
smart phones in the coming year. 
Computer users should expect to see more viruses that try to dupe them
into taking action that will execute the malicious code, said Vincent
Weafer, senior director of Symantec's security response centre. 
Virus writers have learned that it's easy to trick people into opening
attachments by telling recipients they are photos of Russian tennis star
Anna Kournikova or labelling them "naked wife." 
Other virus ruses included misleading people into believing that by
clicking on an attachment they could participate in a survey about the
events in Afghanistan, or indicating that it was an antivirus software
update from an established vendor. 
While such gimmicks were popular, the most damaging virus didn't spread
via e-mail. At an estimated $2.6 billion (1.8 billion pounds) in damages
and 300,000 computers infected, Code Red was the biggest virus this
year. It spread by exploiting a known vulnerability in servers running
Microsoft's Internet Information Server Web software. 
'BLENDED THREAT' 
This year was the year of the "blended threat" virus, featuring multiple
attack modes such as Nimda, which spread via e-mails and infected Web
pages and servers. The more methods of attack, the faster and farther a
worm can spread, experts say. 
"You've traditionally had hacker tools in one corner and virus writers
in another corner," said Weafer. "Now they've come together." 
Vincent Gullotto, senior research director of Network Associates'
antivirus response team, also warned of more attacks that lure computer
users to visit infected web pages. 
In such attacks, victims receive e-mails that include Web addresses
that, when visited, download malicious code to the computer. 
"You don't have to double click on anything. There's no attachment,"
Gullotto said. 
Because devices like the Microsoft Pocket PC 2002 and Nokia Communicator
can be plugged into a desktop computer to download information, they are
susceptible to some of the same computer viruses and worms that infect
PCs, said Mikko Hypponen, manager of anti-virus research for
Finnish-based F-Secure Corp. 
"The next wave of attacks are not going to come from the PC, but from
wireless viruses," George Samenuk, chief executive of Network
Associates, told Reuters in an interview recently. 
"Less than five percent of wireless devices have anti-virus software,
while wireless networks are really taking hold," Samenuk said. 
'SCRIPTS' AN EVEN GREATER CONCERN 
Another Network Associates researcher said experts are even more
concerned with scripts, or malicious pieces of code, that are
transferred between mobile phones via the instant messaging system. 
"There are things that can be done today in which you can send a script
and it can shut the phone off," said Vincent Gullotto. 
But the mobile virus threat was played down by Sophos Anti-Virus senior
technical consultant, Graham Cluley. 
"Is there a mobile threat? One year after the first warning we haven't
seen a single mobile device virus in the wild," he said. 
Cluley added that Sophos has a team looking at mobile viruses, but for
2002 he advised that corporate clients spend their anti-virus budgets in
other areas with higher risks. 
As of early December, corporations had spent an estimated $12.3 billion
to clean up virus damage for the year, according to Computer Economics,
a Carlsbad, California, firm that analyses the economic impact of
viruses and other computer security threats. 
After Code Red, the second most-costly virus, at an estimated $1
billion, was an e-mail worm dubbed SirCam that exported random documents
from infected machines, putting the privacy of computer users at risk. 


© Copyright Reuters 2001. All rights reserved. Any copying,
re-publication or re-distribution of Reuters content or of any content
used on this site, including by framing or similar means, is expressly
prohibited without prior written consent of Reuters. 
Quotes and other data are provided for your personal information only,
and are not intended for trading purposes. Reuters, the members of its
Group and its data providers shall not be liable for any errors or
delays in the quotes or other data, or for any actions taken in reliance
thereon. 
© Reuters 2001. All rights reserved. Republication or redistribution of
Reuters content, including by caching, framing or similar means, is
expressly prohibited without the prior written consent of Reuters.
Reuters and the Reuters sphere logo are registered trademarks and
trademarks of the Reuters group of companies around the world. 
www.reuters.co.uk

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Send FREE Holiday eCards from Yahoo! Greetings.
http://us.click.yahoo.com/IgTaHA/ZQdDAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 21:00:00 PST