Experts send malicious code to 37,000 users

    Date02 Feb 2001
    CategoryHacks/Cracks
    3146
    Posted ByAnthony Pell
    It seems that even the experts get fooled sometimes. A Trojan horse posing as a security tool did just that Wednesday night, when experts at SecurityFocus.com-which moderates the popular Bugtraq security list-sent the mildly malicious code to the list's 37,000 users. . . . It seems that even the experts get fooled sometimes. A Trojan horse posing as a security tool did just that Wednesday night, when experts at SecurityFocus.com-which moderates the popular Bugtraq security list-sent the mildly malicious code to the list's 37,000 users. "It seemed like legitimate code," said Elias Levy, chief technology officer for SecurityFocus. "It was given to us late last night. We sent a copy to (security software maker) Network Associates, and they said it looked OK."

    The code posed as a so-called exploit, a program that identifies security flaws in a computer system. In this case, the exploit related to four flaws recently discovered in the common domain-name-service software known as the Berkeley Internet Name Domain, or BIND.

    In reality, the exploit code attempts to use any computer on which it runs to send a simple form of Internet data to a single domain name server, in an attempt to overwhelm the computer with information. That server, it turns out, belongs to the company that found many of the BIND flaws: Network Associates.

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Have you used our RSS feeds?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    21
    radio
    [{"id":"77","title":"Yes, for articles","votes":"3","type":"x","order":"1","pct":33.33,"resources":[]},{"id":"78","title":"Yes, for advisories","votes":"3","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"79","title":"Hybrid that contains both","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"80","title":"No","votes":"3","type":"x","order":"4","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.