Information Security News mailing list archives
Spy agencies join forces to hunt cyber saboteurs
From: William Knowles <wk () C4I ORG>
Date: Sat, 6 May 2000 18:55:07 -0500
http://www.sunday-times.co.uk/news/pages/sti/2000/05/07/stinwenws01028.html A SHADOWY government organisation set up to protect Britain's infrastructure from "cyber attack" is investigating the love bug virus, as well as at least two attacks on government computers that have been linked to foreign powers. The havoc spread across the globe by the world's fastest-moving computer virus has brought to light the role of the National Infrastructure Security Co-ordination Centre (NISCC), a front for MI5 and GCHQ, the government listening centre. The two have joined forces to protect critical computers, including those operated by Whitehall departments, the national grid, air traffic control, rail networks and the stock exchange. NISCC experts are studying unpublicised attacks from outside Britain on Home Office and Treasury computers. Hackers bypassed Whitehall protection systems to steal confidential data in recent months, two Ministry of Defence websites were corrupted in other incidents and MoD and Home Office computers suffered four internal attacks. Dr Richard Walton, GCHQ's chief cyber expert, said that Britain's computer infrastructure was at risk from "a Libya or Iran", or from a cyber-terrorist with sufficient expertise. He said that NISCC experts were working to find out how the love bug virus penetrated firewalls. He warned that the same method could be used by rogue states to deliver more destructive forms of the virus. "I regard it as the most serious technology for threatening systems worldwide. This particular manifestation is on the benign side; the same technology could be used far more malevolently. It should serve as a wake-up call and persuade the sceptical to take better security precautions." GCHQ was even more concerned about "invisible" viruses planted by thieves and saboteurs, he said. "What worries me is that the same technology could be used to deliver things that are not intended to be discovered . . . sitting there in the background milking private data and sending it off to an unknown recipient, or ready to bring systems down at a crucial time." NISCC has run mock attacks on vulnerable targets including the London Underground and the National Air Traffic Control Service. A confidential NISCC briefing said the organisation had not been publicised to avoid spreading alarm. "It has deliberately been kept low-key," the document said. The danger was foreshadowed at a closed meeting of NISCC "clients" earlier this year, including BT, the national grid and rail companies. Margaret Beckett, leader of the House of Commons, told the meeting there was a need for greater vigilance. "I don't want to exaggerate the danger of a malicious attack on the infrastructure, but it is real," she said. NISCC is working with the FBI in the hunt for the programmer, or group, which planted the love bug virus. Victims included Microsoft, Ford, the CIA and the Pentagon in America, and Vodafone AirTouch and Parliament in Britain. About six copycat bugs have already spawned, and experts fear new variants as hackers tinker with the code. One copycat arrives as confirmation that the recipient's credit card has been billed for a mother's day gift. Speculation was rife on internet chat sites about the identity of the author of the love bug virus. The Washington Post reported that the FBI was moving to seize computers used by a suspect in the Philippines. The report was based on the discovery of the word "Barok" embedded in lines of computer code in the virus. The same codeword was used in a virus written by a suspect in the Philippines last year. The Swedish media reported that the creator was a German student called Michael, studying in Australia. "I can say on good grounds that I have probably found the creator of the virus," said Fredrik Bjoerck, a computer expert at Stockholm university credited with helping the FBI track down the author of Melissa - an e-mail virus launched last year. "The virus was activated in the Philippines, but it is not certain that Michael was there in person." Computer Economics, a research company based in California, said at least 45m people worldwide had received the infected e-mail and estimated the cost of damage at 6.3bn. *-------------------------------------------------* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen. Alfred. M. Gray, USMC --------------------------------------------------- C4I Secure Solutions http://www.c4i.org *-------------------------------------------------* ISN is sponsored by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- Spy agencies join forces to hunt cyber saboteurs William Knowles (May 07)
