Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Hackers Hijack PC's for Sex Sites
The New York Times ^ | July 11, 2003 | JOHN SCHWARTZ

Posted on 07/11/2003 6:02:50 AM PDT by E. Pluribus Unum

More than a thousand unsuspecting Internet users around the world have recently had their computers hijacked by hackers, who computer security experts say are using them for pornographic Web sites.

The hijacked computers, which are chosen by the hackers apparently because they have high-speed connections to the Internet, are secretly loaded with software that makes them send explicit Web pages advertising pornographic sites and offer to sign visitors up as customers.

Unless the owner of the hijacked computer is technologically sophisticated, the activity is likely to go unnoticed. The program, which only briefly downloads the pornographic material to the usurped computer, is invisible to the computer's owner. It apparently does not harm the computer or disturb its operation.

The hackers operating the ring direct traffic to each hijacked computer in their network for a few minutes at a time, quickly rotating through a large number. Some are also used to send spam e-mail messages to boost traffic to the sites.

"Here people are sort of involved in the porno business and don't even know it," said Richard M. Smith, an independent computer researcher who first noticed the problem earlier this month. Mr. Smith said he thought the ring could be traced to Russian senders of spam, or unwanted commercial e-mail.

By hiding behind a ring of machines, the senders can cloak their identity while helping to solve one of the biggest problems for purveyors of pornography and spam: getting shut down by Internet service providers who receive complaints about the raunchy material.

The web of front machines hides the identity of the true server computer so "there's no individual computer to shut down," Mr. Smith said. "We're dealing with somebody here who is very clever."

By monitoring Web traffic to the porn advertisements, Mr. Smith has counted more than a thousand machines that have been affected.

The creators of the ring, whose identities are unknown, are collecting money from the pornographic sites for signing up customers, the security experts say. Many companies play this role in Internet commerce, getting referral fees for driving customers to sites with which they have no other connection.

The ring system could also be used by the hackers to skim off the credit card numbers of the people signing up, said Joe Stewart, senior intrusion analyst with Lurhq, a computer security company based in Myrtle Beach, S.C.

The current version of the ring is not completely anonymous, since the hijacked machines download the pornographic ads from a single Web server. According to the computer investigators, that machine apparently is owned by Everyones Internet, a large independent Internet service company in Houston that also offers Web hosting services to a large number of companies. Jeff Lowenberg, the company's vice president of operations, said that he was not aware of any illegal activity on one of his company's computers but said that he would investigate.

Mr. Stewart said the ring was most likely a work in progress, and that flaws, like being tied to a single server, would be eliminated over time.

He said the ring was troubling not just because of what it is being used for now but also because of what it might be used for next.

"This system is especially worrisome because they have an end-to-end anonymous system for spamming and running scams," he said. "It's not a far stretch to say that people who are running kiddie porn sites could say, `Hey, this is something we could use.' "

The computer ring is the latest in an evolution of attacks that allow creators of spam and illicit computer schemes to use other people's computers as accomplices. For several years, senders of spam have relied upon a vestigial element of the Internet mail infrastructure known as "open relay" to use Internet servers as conduits for their spam.

As network administrators have gradually shut down the open relay networks, spam senders have used viruses to plant similar capabilities on home and business computers.

But this appears to be the first viral infection to cause target computers to display whole Web sites, Mr. Smith, the researcher, said.

A Justice Department official said that the computer ring, as described to him, could be a violation of at least two provisions of the federal Computer Fraud and Abuse Act.

The ring has also been used to run a version of a scheme for collecting credit card information from unwary consumers that has been called the "PayPal scam," Mr. Smith said. The hijacked computers send e-mail messages that purport to come from PayPal, an online payment service owned by eBay, asking recipients to fill out a Web site form with account information.

It is unclear precisely how the program, which depends on computers hooked up to high-capacity, high-speed Internet connections, gets into people's computers. Mr. Smith said that he thought that the delivery vehicle was a variant of the "sobig" virus. But Mr. Stewart, the computer security expert at Lurhq, said he had seen no evidence that the "sobig" virus was the culprit, and is looking at other mechanisms for delivery.

Neither Mr. Smith nor Mr. Stewart has found a simple way to tell whether a computer is infected. Technically, the rogue program is a reverse proxy server, which turns a computer into a conduit for content from a server while making it appear to be that server. Mr. Smith said when word of the program gets out, antivirus companies are likely to offer quick updates to their products to find and disable the invasive software.

Computer owners can protect themselves by using firewall software or hardware, which prevent unauthorized entry and use of computers, Mr. Smith said. The rogue program does not affect the Apple Macintosh line of computers or computers running variants of the Unix operating system.

Mr. Stewart, who has written a technical paper to help antivirus companies devise defenses against the porn-hijacking network, has named the program "migmaf," for "migrant Mafia," because he thinks the program originated in the Russian high-tech underworld.

Hackers from the former Soviet Union have been linked to several schemes, including extortion attempts in which they threaten to shut down online casinos through Internet attacks unless the companies pay them off.

Antispam activists have also accused Russian organized crime organizations of taking over home and business PC's to create networks for sending spam. "They always seem to lead back to the Russian mob," Mr. Stewart said.


TOPICS: News/Current Events
KEYWORDS: hackers; porn
Someday, having an isecure computer will be a crime.

There has to be some method of defining ordinary citizens as criminals so that our prisons "look like America."

1 posted on 07/11/2003 6:02:50 AM PDT by E. Pluribus Unum
[ Post Reply | Private Reply | View Replies]

To: All
LOOK! Another Freeper Just Gave To The Cause! WAY TO GO!
We Salute Free Republic's Donors! Be one! Donate Here By Secure Server
Or mail checks to FreeRepublic , LLC PO BOX 9771 FRESNO, CA 93794
or you can use
PayPal at Jimrob@psnw.com
STOP BY AND BUMP THE FUNDRAISER THREAD- It is in the breaking news sidebar!

2 posted on 07/11/2003 6:05:36 AM PDT by Support Free Republic (Your support keeps Free Republic going strong!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum
...The rogue program does not affect the Apple Macintosh line of computers or computers running variants of the Unix operating system....

Someday, having an isecure computer will be a crime.

I look forward to the day that running windows becomes a felony! WooHoo!

3 posted on 07/11/2003 6:25:23 AM PDT by zeugma (Hate pop-up ads? Here's the fix: http://www.mozilla.org/ Now Version 1.4!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum
This is why firewalls are necessary.
4 posted on 07/11/2003 6:26:59 AM PDT by Xenalyte (I may not agree with your bumper sticker, but I'll defend to the death your right to stick it)
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum
Someday, having an isecure computer will be a crime.

It already is, basically.

For example, if you buy a wireless router and do not enable the encryption, and if someone connects to your network and does naughty and illegal things, the FBI can track it back to you and charge you with a crime if they can't trace it back further to the real perp.

5 posted on 07/11/2003 6:33:36 AM PDT by krb (the statement on the other side of this tagline is false)
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum
Someday, having an isecure computer will be a crime.

Not by bootstrapping from this incident. Since the computers are being hijacked to distribute porn, we can't do anything to these hackers because that would violate their First Amendment rights. In fact, when this case makes it to the Supreme Court, I'm sure they'll rule 6-3 that not only are these pornographers protected, but that we as PC users must remove all firewalls from our machines as these abrdige these guys' rights to flood the Internet with smut using our resources.

</fed up with rampant judicial activism rant>

6 posted on 07/11/2003 6:34:26 AM PDT by CFC__VRWC (Hippies. They want to save the earth, but all they do is smoke dope and smell bad.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Xenalyte
Do you know how you find out if you have downloaded this software. I have a DSL line and the past week it boggs down every once in a while. Somebody changed my password yesterday and I did not do it.
7 posted on 07/11/2003 6:57:46 AM PDT by truthandlife
[ Post Reply | Private Reply | To 4 | View Replies]

To: truthandlife
I checked with Xena's Guy, who recommends for home use ZoneAlarm or Sygate, both of which are free. We're using Norton Internet Security.

Something else I use is Ad-Aware, which you can download for free at http://www.lavasoftusa.com/. Many of the annoying pop-ups you get during surfing are planting cookies on your machine, and Ad-Aware searches and destroys. I run it every morning.
8 posted on 07/11/2003 7:16:37 AM PDT by Xenalyte (I may not agree with your bumper sticker, but I'll defend to the death your right to stick it)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Xenalyte
Thanks! Just downloaded Ad-Aware and found some Alexa stuff that I took off. Great software and fast to download.
9 posted on 07/11/2003 7:21:40 AM PDT by truthandlife
[ Post Reply | Private Reply | To 8 | View Replies]

To: zeugma
Hehehehe.....I love it....
10 posted on 07/11/2003 8:08:49 AM PDT by TheBattman
[ Post Reply | Private Reply | To 3 | View Replies]

To: TheBattman
Ya, me too. It's a shame that the weasely NYT didn't come out and say, "this only affects people who use ms windows".
11 posted on 07/11/2003 8:46:41 AM PDT by zeugma (Hate pop-up ads? Here's the fix: http://www.mozilla.org/ Now Version 1.4!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: TheBattman
Someday you'll have to give up your toy for a machine that works.

lol
12 posted on 07/11/2003 8:52:43 AM PDT by mike_9958
[ Post Reply | Private Reply | To 10 | View Replies]

To: mike_9958
Someday you'll have to give up your toy for a machine that works.

A machine that works - I already have. I am forced to use Windows based PC's at work and I hate them - they are constant trouble with chrashing/freezing ane unexplainable loss of communication with the network.

My Mac just works - No crash on this computer since I have owned it - 4 months. It stay on 24/7. I don't have a need for anti-virus software or add-on firewall. I can run any and every piece of software I have a desire to run. I can even run a lot of windows software (via VirtualPC -albeit slowly).

DSL connection via PPoE is simple - I plug the ethernet into my computer and give it my account name and password (actually that was just the first time) and all is automatic. I take it to work and plug it into the network and I don't need a client (Novell/Windows network) and all works.

Continue in your delusional world that only Windows PC's "work". In the meantime - while you are fixing and troubleshooting, I will get stuff done.

And spare me the "market share" arguement. History has shown that the best product doesn't always get the market share.

And what I really am looking forward to when my finances can support it:

13 posted on 07/11/2003 2:12:02 PM PDT by TheBattman
[ Post Reply | Private Reply | To 12 | View Replies]

To: TheBattman
Chill.. dude.

To each his own. I find Macs too elementary. I like the flexiblity I get with the PC's. I enjoy programming "close" to the processor, and with a host of compilers. I found Macs too restrictive - its a personal thing.

I know a pile of folks that use Macs - and strangely enough they are rather militant about it also.

Macs remind me of WebTV terminals - they just work too.

lol

(love pushin the buttons)

14 posted on 07/13/2003 12:55:43 PM PDT by mike_9958
[ Post Reply | Private Reply | To 13 | View Replies]

To: mike_9958
I think the mac crowd's inclination towards being "rabid" has something to do with the "underdog" status we tend to endure.

Since you broght it up - you enjoy programming. Do you do any Unix programming? With OS X's Unix core, my understanding that any programming done with Unix in mind is easily ported or re-compiled to X....

Just curious.
15 posted on 07/13/2003 6:16:11 PM PDT by TheBattman
[ Post Reply | Private Reply | To 14 | View Replies]

To: Xenalyte
Just tried Ad-Aware - amazing how much stuff was stashed into my PC. Thanks!
16 posted on 07/13/2003 6:35:46 PM PDT by P.O.E.
[ Post Reply | Private Reply | To 8 | View Replies]

To: P.O.E.
You're welcome - I run it every day. Surprising, how many sites I visit (like NR.com) put stuff on my PC.
17 posted on 07/14/2003 7:14:28 AM PDT by Xenalyte (I may not agree with your bumper sticker, but I'll defend to the death your right to stick it)
[ Post Reply | Private Reply | To 16 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson