English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

8 answers

Only after the Trojans had pushed worms through the optic fibers to pollute the rams. Bit by bit, they shook hands with correct protocol, and executed their scripts. Alas, the compromised domain succumbed to your culinary techs, and in the ensuing panic windows were seen popping up from nowhere.

2007-09-24 04:24:42 · answer #1 · answered by Norm 3 · 1 0

some people have no sense of humor. it is obvious that this needs to be investigated by Rachel Ray, Alton Brown, Bobby Flay, and other top sleuths from the food network. Ms Paula probably is the guilty person. and Emeril is always trying to get people to eat his stuff right there in the studio

2007-09-22 12:42:13 · answer #2 · answered by don't plagiarize 7 · 1 0

DNS cache poisoning occurs when an attacker hacks into a domain name server, then "poisons" the cache by planting counterfeit data in the cache of the name server. When a user requests, say, ebay.com, and the IP address is resolved by the hacked domain server, the bogus data is fed back to the browser.

Another tactic, dubbed "DNS hijacking," is similar, but simply changes the domain server so that traffic is actually re-routed.

It's unclear which of the two tactics this attack is using.

Even security firms had difficulty confirming the attack, however. Dan Hubbard, the senior director of security at San Diego-based Websense, for instance, said that his team had been investigating the report for several hours but had not yet been able to hit a domain server that had been poisoned.

But Websense's monitoring of its customer's usage patterns did pick up a spike in traffic to the three malicious sites supposedly feeding spyware to redirected users. (In turn, the three feed users to one single site.)

"It's circumstantial evidence," he said, "but it seems something is going on."

Nor was Hubbard able to confirm the targets of the poison and/or hijack. "We haven't been able to trace a redirect from, say, Google," he added.

The hack could be quite localized if, for instance, the affected domain server was one operated by an enterprise or small Internet service provider. "It's certainly not at the root level, or we'd all end up at this malicious site."

Domain cache poisoning and domain hijacking, while rare, are not unheard of. In the late 1990s, a vulnerability in BIND (Berkeley Internet Name Domain), the software used by nearly all of the name servers on the Internet, was disclosed. A few exploits followed. And in 2000, RSA Security was victimized by a Web defacement that really wasn't: instead, domain cache poisoning simply fed bogus pages to users.

"One interesting thing about malicious Web sites is that the hackers have to get people to the site," said Hubbard. "How they get people to their sites is becoming very important. In this case, they're getting more creative than the traditional phishing or instant messaging approach where links are sent to users."

The adware and spyware on the malicious sites is thankfully "not very dangerous," said Hubbard. The sites try to download and install code and an Active X control called "ABC Search Webinstall" that changes the browser's toolbar, its home page, and search preferences, among other things.

For additional details of the attack as they become available, refer to the Internet Storm Center's Diary page, which promises to update as the Center finds out more.

2007-09-22 10:53:46 · answer #3 · answered by Anonymous · 0 3

Making the net work without a network of network experts is virtually impossible. Sometimes those Yahoos don't technically do everything right but it is a bit of a stretch to blame them for all the ills in the world wide web.

2007-09-22 10:41:51 · answer #4 · answered by ghouly05 7 · 1 1

So I was right at blaming Bill Gates for my case of E-coli?

2007-09-25 14:39:18 · answer #5 · answered by Way Out There 6 · 1 0

I'd "bring" the possibility of "charges" to the server as well.

This is just a tip, and nobody call me Bill.

2007-09-22 12:46:16 · answer #6 · answered by morethan32characters 5 · 1 1

Whaaaaaaaa ????? LOL !!
Do we contact the FDA,
CIA, or AT&T to collect the
DNA or some other Yahoo
to investigate the infected
bytes ? I'm thinking AOL
has something to do with it !!
LOL !!
ENJOY !!

2007-09-22 10:57:58 · answer #7 · answered by iambettyboop 7 · 1 0

LOL, No it is not true. Nice oone. Read the following

The DNS cache poisoning that first struck more than a month ago and
led to users being redirected from popular Web sites to malicious
sites that infected their machines with spyware, is continuing, said
the Internet Storm Center (ISC) Wednesday. The attacks are taking
advantage of vulnerabilities and design flaws in Microsoft server
software.


DNS cache poisoning occurs when an attacker hacks into a domain name
server, one of the machines that translate URLs such as
www.techweb.com into the appropriate IP address. The attacker then
"poisons" the server by planting counterfeit data in the cache of the
name server. When a user requests, say, techweb.com, and the IP
address is resolved by the hacked domain server, the bogus data is fed
back to the browser and the user is directed to another Web site, not
the intended destination.


To highlight the danger, the ISC raised its Homeland Security-esque
alert color code from Green to Yellow. According to ISC, Yellow
represents that "we are currently tracking a significant new threat.
The impact is either unknown expected to be minor to the
infrastructure. However, local impact would be significant."


To set the DNS cache poisoning threat in perspective, Yellow is the
same alert color code that ISC used during the SQL Slammer, MSBlast,
and Sasser worm outbreaks, three of the nastiest in the last two
years.


The newest attack, said Kyle Haugsness, one of the ISC analysts, is
actually the third since March 4. Like the initial attack, the
motivation is certainly money, since the result is again the
installation of mass quantities of spyware on victims' PCs.


"The motivation for these attacks is very simple: money," Haugsness
said. "The end goal of the first attack was to install spyware/adware
on as many Windows machines as possible."


The second attack, he continued, "seems to have been launched by a
known spammer," said Haugsness. That second attack, which took place
starting March 24, redirected users from legit sites to sites selling
prescription drugs.


Initially, Haugsness and the other ISC analysts thought that a DNS
cache poisoning attack was beyond the skills of most spammers -- and
so might be proof that the original attackers were contracting their
services, but now he said "they might be completely unrelated. In
fact, one of the things we discovered after looking into these attacks
is just how easy they are to carry off."


The third, and still-ongoing attack, which began March 25, has the
same goal -- install spyware -- as the first, said Haugsness. One of
the DNS servers involved in the early-March attack wasn't cleaned up
properly, and the attacker returned and changed the poisoning tool.


"Right now this is still going on," said Haugsness. "The attackers are
changing IP addresses around and poisoning other DNS servers [to stay
ahead of security authorities]."


Among the domains included in one of the poisoned DNS servers during
the first attack were major sites such as americanexpress.com,
cnn.com, redhat.com, and msn.com. "These [665] domains organizations
did not have their DNS cache's poisonedthese organizations were not
compromised, although it is possible that customers of these sites
unknowingly gave out login information or personal information to the
malicious servers," wrote Haugsness in a long report posted on the ISC
site about the attacks.


Although there's essentially nothing an end-user can do to protect
him- or herself -- other than to regularly sweep the system for
spyware and/or have real-time anti-spyware defenses up and running --
DNS server administrators, particularly those in enterprises, should
scramble.


Windows-based DNS servers are particularly vulnerable, since Windows
NT Server 4.0 and Windows 2000 Server prior to SP3 are insecure
against DNS cache poisoning attacks. Windows 2000 Server SP3 and
later, as well as Windows Server 2003, are configured securely by
default. (For more information, see this Microsoft Knowledgebase
article. [1])


Other users that are vulnerable are those running various Symantec
gateway security products who haven't patched bugs the Cupertino,
Calif.-based vendor released in mid-March.


But the entire Windows server software platform -- including properly
configured NT/2000 and 2003 systems -- seems to have an architectural
design flaw, said Haugsness, that makes them vulnerable to cache
poisoning attacks. He said ISC was working with Microsoft to pin down
the exact cause.


"This is a lot easier to do than we thought," said Haugsness, who
noted that cache poisoning isn't new. "That's the main reason we went
out there with this, and bumped up to Yellow.


"What's scarier is that this could be used in lot more subtle fashion,
to make it difficult, or even impossible to detect."

2007-09-22 10:34:40 · answer #8 · answered by FLOWCOM 2 · 0 4

fedest.com, questions and answers