Skip to comments.
Could your computer be a criminal?  
PCs hijacked to send spam, serve porn, steal credit cards 
MSNBC website ^
 | 7-15-03
 | Bob Sullivan
Posted on 07/16/2003 12:34:09 AM PDT by M. Peach
PCs hijacked to send spam, serve porn, steal credit cards 
By Bob Sullivan MSNBC 
July 15  One thousand home computers hijacked and used to serve up pornography. Perhaps tens of thousands co-opted by the SoBig virus, many of them turned into spam machines. Hundreds of other home computers loaded with secret software used to process stolen credit cards. If your biggest computer crime fear was lost or stolen files, think again: Someone may be using your PC to commit crimes. 
A CURIOUS SPAM mail went out and disappeared without much fanfare on June 25. Playing on a familiar prank, the e-mail urged recipients to visit Windows-update.com and download a security fix for their computers. Those who fell for the ploy were tricked into downloading a Trojan horse program. The malicious software steered the victim computer into an Internet Relay Chat room, where a computer criminal playing the part of the Pied Piper awaited to issue instructions to the now enslaved PC.
(Excerpt) Read more at msnbc.com ...
TOPICS: Announcements; Business/Economy; Crime/Corruption; Culture/Society; Extended News; Front Page News; News/Current Events
KEYWORDS: computers; virus
Navigation: use the links below to view more comments.
 first 1-20, 21-29 next  last
    It's important to keep current on computer safety.
1
posted on 
07/16/2003 12:34:10 AM PDT
by 
M. Peach
 
To: All
    
  
   
    
     | She wants to look her best for her subjects. | 
    
     |  > | 
       Make a fashion statement. Donate Here By Secure Server 
       Or mail checks to FreeRepublic , LLC
 PO BOX 9771
 FRESNO, CA 93794
 
       or you can use 
      PayPal at Jimrob@psnw.com 
        | 
    
     | STOP BY AND BUMP THE FUNDRAISER THREAD- It is in the breaking news sidebar!
 | 
   
  
 
 
2
posted on 
07/16/2003 12:34:52 AM PDT
by 
Support Free Republic
(Your support keeps Free Republic going strong!)
 
To: M. Peach
    Can a computer be a criminal? No more than a gun can. (This is a test of posting from Linux)
3
posted on 
07/16/2003 12:38:51 AM PDT
by 
drlevy88
 
To: M. Peach
    Spybot- excellent and free. Cleans up this sort of problem.
4
posted on 
07/16/2003 2:33:36 AM PDT
by 
KeyWest
 
To: M. Peach
    The best way to ensure complete computer security is to keep it turned off and disconnected from the Internet. :)
5
posted on 
07/16/2003 3:41:58 AM PDT
by 
goldstategop
(In Memory Of A Dearly Beloved Friend Who Lives On In My Heart Forever)
 
To: M. Peach
    
the e-mail urged recipients to visit Windows-update.com and download a security fix for their computers.
  This showed up as a popup yesterday  I guess theyve changed MO. It didnt look kosher, so I didnt bother with it.
 It did remind me to turn on the popup filter.
 
6
posted on 
07/16/2003 3:49:48 AM PDT
by 
R. Scott
 
To: goldstategop
    I use a fiber optic cable connection, so Im always on  but when not in use my computer is turned off.
7
posted on 
07/16/2003 3:51:05 AM PDT
by 
R. Scott
 
To: R. Scott
    People get it confused with Microsoft's legitimate Windows Update site. Then again Redmond doesn't send out e-mail reminders to get Windows updated.
8
posted on 
07/16/2003 4:03:25 AM PDT
by 
goldstategop
(In Memory Of A Dearly Beloved Friend Who Lives On In My Heart Forever)
 
To: M. Peach
    It's important to keep current on computer safety. "Current off" might be more effective.
 
To: M. Peach
    Could your computer be a criminal?
 It's possible. I can't watch it every minute.
10
posted on 
07/16/2003 6:06:50 AM PDT
by 
Xenalyte
(I may not agree with your bumper sticker, but I'll defend to the death your right to stick it)
 
To: Xenalyte
    Once mine came home with alcohol on its breath. I grounded it for a week.
11
posted on 
07/16/2003 6:08:32 AM PDT
by 
Wolfie
 
To: Wolfie
    Tough love is sometimes the only solution. I've had to lock mine in a room with just a mattress and a change of clothes . . . oh, wait, that was my little brother, not my PC.
12
posted on 
07/16/2003 6:10:55 AM PDT
by 
Xenalyte
(I may not agree with your bumper sticker, but I'll defend to the death your right to stick it)
 
To: M. Peach
    Thanks for the round about ping.
13
posted on 
07/16/2003 6:21:39 AM PDT
by 
Calpernia
(Runs with scissors.....)
 
To: Tamsey
    Ping
14
posted on 
07/16/2003 6:22:08 AM PDT
by 
Calpernia
(Runs with scissors.....)
 
To: M. Peach
    How would you not know if your hard drive was spinning, and how would your ZA or other firewall miss the incomings?
To: Chancellor Palpatine
    ........how would your ZA or other firewall miss the incomings? 
 
 
Most firewalls do not check emails. Many virus scanners do not look for this type of parasite. In short, it is the classic 2 phase attack. 
 
1) Send the target a ok looking email or popup and get them to run / open it. 
 
2) When the target executes the parasite allows the attacker access into the system 
 
Firewalls do not stop this because the traffic is coming from the "safe" network.
To: Calpernia
    Thanks for the FYI :-)
17
posted on 
07/16/2003 7:21:57 AM PDT
by 
Tamzee
(Peace is the prerogative of the victorious, not the vanquished.... Churchill)
 
To: Wolfie
    "Once mine came home with alcohol on its breath. I grounded it for a week." 
 
One time at band camp.....
18
posted on 
07/16/2003 7:37:57 AM PDT
by 
M. Peach
(eschew obsfucation)
 
To: KeyWest
    "Spybot- excellent and free. Cleans up this sort of problem." 
 
Spybot offers no protection from the problems described in the article, i.e., hacking, viruses, trojans, etc. 
 
Computer security software requirements: 
 
Norton Internet Security (Firewall and Antivirus). 
Adgone (Eliminates Ads and Popups). 
Spybot (Presents Spyware from being installed). 
Evidence Eliminator (cleans the hard drive of residual information)
19
posted on 
07/16/2003 8:18:32 AM PDT
by 
Search4Truth
(When a man lies he murders some part of the world.)
 
To: Search4Truth
    I think your list is good, but lacks: 
Secure configuration of operating system and internet applications. 
Good password policy. 
User awareness.
20
posted on 
07/16/2003 10:47:25 AM PDT
by 
D-fendr
(He lived and went on to win a physics prize in High School.)
 
Navigation: use the links below to view more comments.
 first 1-20, 21-29 next  last
    Disclaimer:
    Opinions posted on Free Republic are those of the individual
    posters and do not necessarily represent the opinion of Free Republic or its
    management. All materials posted herein are protected by copyright law and the
    exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson