Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

KaZaA users brace for hijack (more than a million PCs could be hijacked)
Sydney Morning Herald ^ | April 30 2002 | Nathan Cochrane

Posted on 04/30/2002 12:15:09 PM PDT by dead

Secreted in KaZaA software is Altnet — and it’s about to be activated, warns Nathan Cochrane.

The 20 million users of KaZaA Media Desktop, the world's most popular file-swapping software, have little more than a month to decide if they want their computers hijacked.

That's the time-frame laid down last Wednesday by Sharman Networks chief executive Nikki Hemming for the activation of Altnet, an alternative network to the Internet used to create a giant virtual supercomputer.

KaZaA Media Desktop is software bought by Sharman in January that lets computer owners swap music and other digital content. Technology boffins call it filesharing or peer-to-peer (P2P) because users communicate directly with each other.

Hidden inside KaZaA, however, is Altnet - Trojan software that aims to harness the spare processing, storage and communications power of the millions of computers connected to KaZaA's FastTrack network, a concept known as "distributed computing".

The Altnet software was created by Brilliant Digital Entertainment (BDE), a California-based multimedia company founded by former Australian entertainment software entrepreneur Kevin Bermeister.

Since March at least, Altnet has been downloaded, often without users' knowledge, secreted in the KaZaA software.

It is scheduled to be activated by a signal Sharman will send to users' PCs, in the next four to five weeks.

"The world is full of unused computing power," BDE said in a disclosure to the US Securities and Exchange Commission at the beginning of the month.

"You pay for this capacity whether you use it or not. Businesses, meanwhile, buy expensive facilities at massive . . . supercomputer centres.

"Altnet seeks to bring these two groups together."

Distributed computing has searched for extraterrestrial intelligence (SETI@Home) and an understanding of living cells (Folding@Home), although with the user's explicit consent and not clandestinely downloaded through a third-party software program.

But the prospect that more than a million PCs could be hijacked en masse chills information security specialists.

"Any attacker who can control 100,000 machines is a major force on the Internet, while someone with a million or more is currently unstoppable," Berkeley University computer science academic Nicholas Weaver wrote this month.

"As for Brilliant Digital, their horribly flawed business plan shows a grave misunderstanding of security. Since their proposed business can't possibly work, they should both protect themselves from legal liability . . . by producing a program on their update server which removes all traces of their trojan."

Australian distributed-computing researcher Rajkumar Buyya is optimistic that a successful deployment of Altnet will spur further development.

"It is wonderful to know that the industry is moving towards invisible distributed computing," Buyya says.

"(But) I have concern about their security protocols for activating the client and running programs that utilise idle resources . . . If someone finds out that, anybody can request your machine to do what they want, which is scary."

KaZaA, like the infamous file-swapping software before it, Napster, has been vilified by the recording industry for allegedly aiding and abetting theft.

Last September the chief of the Recording Industry Association of America (RIAA), Hilary Rosen, called for crisis talks with the heads of a dozen media groups to head off the "overwhelming volume" of piracy on the P2P networks.

Sharman's Nikki Hemming says she will schedule talks with Rosen soon. In the meantime, Hemming is eroding Rosen's support base by talking directly to artists' groups instead of publishers.

KaZaA, more wily than its file-swapping brethren, hired a Washington lobbyist, lawyer Phil Corwin, who previously represented the American Bankers' Association.

He is hawking the Intellectual Property Use Fee, an Internet tax, to be levied by ISPs on their customers.

"A similar levy . . . applied to a much broader base of parties, could provide a significant new revenue stream to copyright owners to compensate them for the inevitable 'leakage' (theft) resulting from Internet distribution," Corwin said in an April 8 submission to a US House judiciary committee on digital copyright.

That revenue would amount to $US2 billion a year in the US if a $US1 tax was charged on top of access fees, Corwin said.

"Every party from hardware manufacturers to ISPs to publishers of ripping software would pay a royalty . . . and provide a royalty stream to compensate (music artists)," Hemming said last week.

"At the end of the day we totally believe that artists, creators and those who represent them should be rightfully rewarded for creation of content."

Hemming said she was pursuing the authors, users and sponsors of KaZaA Lite, software that removes Altnet and other hidden software in the branded KaZaA software.

"There's a lot of concern in the market around these scam sites because they release ripped-off unstable code and it puts users at risk," she said.


TOPICS: Business/Economy; Culture/Society; News/Current Events; Technical
KEYWORDS:
Navigation: use the links below to view more comments.
first previous 1-2021-4041-45 next last
To: HairOfTheDog
bump
21 posted on 04/30/2002 12:59:22 PM PDT by billbears
[ Post Reply | Private Reply | To 20 | View Replies]

Comment #22 Removed by Moderator

To: Huck
I just downloaded Grokster, and for all intents and purposes, it looks and functions EXACTLY as KaZaA. I wonder if the two are are one in the same?
23 posted on 04/30/2002 1:15:25 PM PDT by X-USAF
[ Post Reply | Private Reply | To 3 | View Replies]

To: all
Thanks for all the information on this thread.

I have alot of clean-up ahead.

24 posted on 04/30/2002 1:29:47 PM PDT by dead
[ Post Reply | Private Reply | To 23 | View Replies]

To: sandyeggo;Penny1;JenB
Glad it worked for you! I followed those instructions and also got Kazaa off my machine. (After getting the file I was there for of course)

Hehehehe. And therein lies the rub. I have only a teensy bit of pity for any of us that were troubled by this little gremlin... After all, there is no free lunch. Or, if you hang out with theives, don't be surprised when they try to steal from you, too.

I knew when I walked into the dark smoky room that is KazAa looking for an illegal stolen bootleg of a popular fantasy film not yet available on DVD... That I had left the moral high ground and was now swimming with alligators. Let is be a lesson to us all!

Go forth and sin no more!

At least until spring 2003, when another popular fantasy film shall hit the bootleg underground and tempt us to return... whispering rationalizations in our ears as we stand outside the door, wanting very much to go back into that place just one more time....

25 posted on 04/30/2002 1:30:15 PM PDT by HairOfTheDog
[ Post Reply | Private Reply | To 22 | View Replies]

To: all
If you use Ad-Aware, make sure you also download and frequently run RefUpdate. Here's the description from download.com:

Makes sure you always have the most recent referencefile for Ad-aware installed on your system. RefUpdate is a free add-on for Lavasoft's Ad-aware that automatically downloads and installs the latest adware definitions on your system. If no reference file can be located, the most recent file will always be downloaded and installed.
Note: You need to have Ad-aware installed on your system before you can use this free add-on.

26 posted on 04/30/2002 1:47:27 PM PDT by Tree of Liberty
[ Post Reply | Private Reply | To 25 | View Replies]

To: X-USAF
I believe they're both clients on the same network, called FastTrack. Morpheus used to be on FastTrack, but there were some licensing feudes, so it moved over to the Gnutella network.
27 posted on 04/30/2002 1:49:19 PM PDT by Tree of Liberty
[ Post Reply | Private Reply | To 23 | View Replies]

To: IoCaster
bump for later
28 posted on 04/30/2002 1:52:31 PM PDT by Huck
[ Post Reply | Private Reply | To 11 | View Replies]

To: Dick Vomer
if you remove the required .dll files from Kazaa, the program becomes disabled. Uninstall Kazaa, Morpheus, BearShare, LimeWire, Gator, and any other file sharing/known spyware program, then run the AdWare program I linked in my earlier post on this thread. THEN, run that program, and delete any adware/spyware it finds. Then you can download, install and ENJOY Kazaa Lite.

regards,

29 posted on 04/30/2002 1:52:35 PM PDT by Benson_Carter
[ Post Reply | Private Reply | To 18 | View Replies]

To: dead
I'm happy with WinMX, try it out.
30 posted on 04/30/2002 1:53:45 PM PDT by Schakaljager
[ Post Reply | Private Reply | To 4 | View Replies]

To: Tree of Liberty
Do you know if the Trojan Horse issue with KaZaA also applies to Grokster?
31 posted on 04/30/2002 1:55:48 PM PDT by X-USAF
[ Post Reply | Private Reply | To 27 | View Replies]

To: Benson_Carter
BearShare isn't spyware, itself. At installation, it asks if you want to install Gator, and some other programs which are spyware, though. You just need to be diligent and read each screen as you're setting it up.
32 posted on 04/30/2002 1:55:51 PM PDT by Tree of Liberty
[ Post Reply | Private Reply | To 29 | View Replies]

To: X-USAF
I'm not sure if the distributed computing thing is in Grokster, but it does contain other spyware. This link will tell you how to clean them out and still keep Grokster working.

I've got Kazaa-lite (which is on the same network as Grokster) on my system, and I couldn't find any of the distributed computing files listed above after I installed it. Here's a Wired article about it.

33 posted on 04/30/2002 2:01:52 PM PDT by Tree of Liberty
[ Post Reply | Private Reply | To 31 | View Replies]

To: Tree of Liberty
Thank you very much for your assistance!
34 posted on 04/30/2002 2:12:03 PM PDT by X-USAF
[ Post Reply | Private Reply | To 33 | View Replies]

To: Marine Inspector
bttt
35 posted on 04/30/2002 2:23:52 PM PDT by Marine Inspector
[ Post Reply | Private Reply | To 34 | View Replies]

To: all
bttt
36 posted on 04/30/2002 2:28:06 PM PDT by Registered
[ Post Reply | Private Reply | To 35 | View Replies]

To: HairOfTheDog
Bookmarked.
37 posted on 04/30/2002 2:29:01 PM PDT by SC Swamp Fox
[ Post Reply | Private Reply | To 16 | View Replies]

To: X-USAF
da nada
38 posted on 04/30/2002 2:47:20 PM PDT by Tree of Liberty
[ Post Reply | Private Reply | To 34 | View Replies]

To: Johnny Gage
This is a really interesting post.
39 posted on 04/30/2002 3:03:39 PM PDT by Jimbaugh
[ Post Reply | Private Reply | To 5 | View Replies]

To: MarkL
I'd have to disagree. A normal Trojan listens on a port, waiting for the hacker who sent it to you to connect. This is true of SubSeven, NetBus, BackOrifice, etc. Some of them post their IP to Usenet or send an email. Of course, you could write it so that it acts as a client and connects to a server, which is more typical of spyware-type Trojans. Once you have a TCP/IP connection, it doesn't really matter who contacted who, since the conversation is bidirectional.

In any case, you could solve this one by only allowing specific outbound ports, typically 20, 80, 110, and 119.

As for the ignorant masses who buy a router without knowing how to use it, I urge them to learn. Get the O'Reilly TCP/IP book and work through the examples on a Linux or Sun box.

40 posted on 04/30/2002 3:12:20 PM PDT by proxy_user
[ Post Reply | Private Reply | To 13 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-45 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson