New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online.
image
Prime Choice
· Head Lines
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 18)
· Marcia's (QA2)
· Bill G's (CO4)
· Paul's (AR 5)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
Which Anti-Virus product do you use?

Computer Associates
Eset (NOD32)
F-Secure
Frisk (F-Prot)
Grisoft (AVG)
Kaspersky
Network Associates (McAfee)
Panda
Sophos
Symantec (NAV)
Trend Micro
Other



Results
Polls

Votes: 18319
Comments: 152
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image fbi: Busted!: Teen Arrested in Blaster Case image
FBI
Teen Arrested in Blaster Case
Paul Roberts, IDG News Service
Friday, August 29, 2003

A Minnesota teenager will appear in federal court in St. Paul, Minnesota, to face charges stemming from the release of a variant of the virulent W32.Blaster Internet worm that ravaged computer systems worldwide earlier this month.

Jeffrey Lee Parson, 18, will appear before federal magistrate Judge Susan Richard Nelson on Friday at 2 p.m. CDT at the James R. Dougan Federal Building in St. Paul, according to Deputy Clerk Mike Chutich.

According to a complaint filed at the court, Parson will face one count of intentionally causing or attempting to cause damage to a protected computer in connection with the release of W32.Blaster-B, a variant of the original W32.Blaster-A worm.

The Blaster-B variant appeared on August 13, within three days after Blaster-A first appeared, and was nearly identical to the original Blaster worm. However, Blaster-B used a different file name, teekids.exe, as opposed to msblast.exe, according to antivirus company Sophos PLC.

Teekid was also an online handle used by Parson, according to the complaint, which was filed in the Western District of Washington in Seattle, according to Chutich.

Developing Story
The complaint lays out Parson' role in modifying the original Blaster worm and in releasing the Blaster-B variant, as well as some of the process law enforcement used to track the virus back to Parson.

The U.S. Federal Bureau of Investigation and other law enforcement officials declined to provide more information about the case or the identity of the teenager.

The FBI and the U.S. Attorney's Office scheduled a press conference for Friday afternoon regarding the worm, according to U.S. Attorney John Hartingh in the U.S. Attorney's Office for the Western District of Washington in Seattle.

Further details about the case will be presented then, Hartingh said.

Blast From the Past
Blaster-A first appeared on August 11 and exploited a widespread vulnerability in Microsoft's Windows operating system.

The worm takes advantage of a known vulnerability in a Windows component called the DCOM (Distributed Component Object Model) interface, which handles messages sent using the RPC (Remote Procedure Call) protocol.

Vulnerable systems can be compromised without any interaction from a user, which helped Blaster spread quickly on machines running the Windows XP and Windows 2000 operating systems.

At the height of the Blaster outbreak, the worm was credited with shutting down the Maryland Motor Vehicle Administration.

Tracking a Hacker
Virus experts were surprised that an arrest was pending, citing the difficulty in tracing computer viruses back to their author.

I think it gets back to how they caught him, said Chris Wraight, a technology consultant at Sophos. It wasn't digital forensics, but the human intelligence. They did it the old-fashioned way, with human intelligence.

However, Wraight was not surprised to learn that the suspect in the Blaster-B case was a teenager.

He and others long maintained that Blaster's blatant copying of proof-of-concept code for using the RPC vulnerability, known as the DCOM exploit, meant that Blaster was the work of a novice virus writer, rather than a pro.

The alleged modification of that code by Parson is typical, Wraight said.

This clearly shows what happens in the virus world--people take and modify other people's code and try to one up each other. But most of these guys are not too swift and they get caught because of an error, Wraight said.

Developing Laws
While most worm authors are careful to cover their tracks and escape capture, those who are caught face toughened computer crime laws in the U.S. and Europe, he said.

In July, for example, a UK court rejected an appeal by 22-year-old Simon Vallor, who was sentenced to two years in prison for writing and releasing three e-mail worms.

In less-developed countries, however, there are few laws governing cyber crimes, Wraight said.

The author of one of the most destructive viruses, LoveBug, never faced charges because the Philippines lacked laws on its books to prosecute him, he said.

PC World
Posted on Friday, 29 August 2003 @ 19:59:34 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· Microsoft
· Intel
· HotScripts
· W3 Consortium
· More about FBI
· News by phoenix22


Most read story about FBI:
Sobig.G

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 0 comments
Threshold
  
The comments are owned by the poster. We aren't responsible for their content.