Posted on 08/29/2003 11:10:45 AM PDT by Toidylop
WASHINGTON - U.S. cyber investigators arrested a Minnesota teenager Friday who the FBI (news - web sites) said has admitted unleashing one version of a damaging virus-like infection weeks ago on the Internet.
|
|||||||||||
A court official identified the teenager as Jeffrey Lee Parson, 18, of Hopkins, Minn., known online as "teekid." A U.S. official in Washington also confirmed an arrest was made early Friday.
Court papers said FBI and Secret Service agents searched Parson's home on Aug. 19 and seized seven computers, which are still being analyzed. In an interview with FBI Special Agent Eric Smithmier, Parson admitted modifying the original "Blaster" infection and creating a version known by a variety of different names, including "Blaster.B.," court papers said.
FBI Director Robert Mueller hinted earlier this week that an arrest was imminent, when he cited the damage from the recent Blaster and "SoBig" infections.
"We employ the latest technology and code analysis to direct us to potential sources, and I am confident that we will find the culprits," Mueller said Tuesday.
Parson a physically imposing presence at 6-foot-4 and 320 pounds told the FBI he built into his version a method for reconnecting to victim computers later, according to court papers. Infected computers automatically registered themselves with Parson's Web site so he could keep track of them.
Parson operated the t33kid.com Web site, according to Internet registration records.
The Web site, which was operated from computers physically in San Diego, appeared Friday not to have any content on it but previously contained software code for at least one virus and a listing of the most-damaging viruses circulating on the Internet.
The FBI said in court documents that at least 7,000 computers were infected by Parson's software.
Further details were expected to be disclosed Friday by the FBI and U.S. attorney's office in Seattle, which has been leading the investigation. The case was being handled from Seattle because the infection affected software sold by Microsoft Corp., based in nearby Redmond.
Prosecutors said Microsoft suffered financial losses that "significantly" exceeded $5,000, the statutory threshold in most hacker cases.
Collectively, different versions of the virus-like worm, alternately called "LovSan" or "Blaster," snarled corporate networks worldwide, forcing Maryland's motor vehicle agency to close for one day. The infection inundated networks and frustrated home users.
Symantec Corp., a leading antivirus vendor, said the worm and its variants infected more than 500,000 computers worldwide. Experts consider it one of the worst outbreaks this year.
The "Blaster.B" version of the infection, which began spreading Aug. 13, was remarkably similar to the original Blaster worm that first struck two days earlier; experts said the author made few changes, renaming the infecting file from "msblast" to an anatomical reference.
All the Blaster virus variants took advantage of a flaw in Microsoft Corp.'s flagship Windows software. Government and industry experts had anticipated such an outbreak since July 16, when Microsoft acknowledged the software problem, which affects Windows technology used to share data files across computer networks.
The infection was quickly dubbed "LovSan" because of a love note left behind on vulnerable computers: "I just want to say LOVE YOU SAN!" Researchers also discovered another message hidden inside the infection that appeared to taunt Microsoft Chairman Bill Gates (news - web sites): "billy gates why do you make this possible? Stop making money and fix your software!"
Infected computers were programmed to automatically launch an attack on a Web site operated by Microsoft, which the software maker easily blunted. The site, windowsupdate.com, is used to deliver repairing software patches to Microsoft customers to prevent these types of infections.
Is this guy Darwin Award material or what?
"Is this guy Darwin Award material or what?No kidding. Criminals tend to outsmart themselves, ya know :)
Correction: WAS used to deliver . . . Microsoft had to take that address out of service (apparently permanently) and switch to a different address.

You think he might be related to the Star Wars Kid?
Just damn.
If you want on the new list, FReepmail me. This IS a high-volume PING list...
I stand corrected. He is rather ... imposing.
Techies - what is the best email interrogation program that works?
Actually, Sobig is spread by user ignorance. You have to open the email, then open the attached file! I still can't believe that it spread as fast as it did.
On the other hand, I believe that this guy spawned a version of MSBLAST, which preys on a vulnerability within Windows 32 bit systems (WinNT, Win2000, WinXP, WinServer2003). It utilized the messenger service (not to be confused with any IM program, like MSN or AOL Messenger), and took advantage of a known problem that would force the computer to run program fragments that would compromise the system.
As far as what the "best" email program is, beats me. I'm quite fond of GroupWise, but it won't run outside of a Corporate environment (like Lotus Notes, both need their own Email server).
I've been playing with Mozilla at home, but it's just too unstable, crashing multiple times an hour.
Mark
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.