Trail of clues pointed to Blaster B author
30th August, 2003
On Friday evening [BST] US authorities charged Jeffery Parsons with creating a variant of the Blaster worm know as “Blaster B”. Such a trail of clues pointed to Parsons that those investigating the case must have initially expected that they were dealing with a case of identity theft, but from the reports it seems that Parsons had modified and re-released the worm “because he could” giving no thought to the potential consequences for himself.
Files were created in the modified worm with the same name as Parsons’ domain name and IRC handle, and infected machines registered themselves with a host in Parsons’ domain, which is registered in his own name and to his home address. The front page of Parsons’ web site is presently the default Apache installation page, but the Google cache reveals an interest in software for covert mass remote control, including IRCbots, Worms and Viruses.
Posted by Mike Prettejohn in Security
Related News
Outages Continue at SCO
15 Dec 2003
Performance, Security
The web site outages continue at SCO, which was unreachable for much of the weekend and is currently experiencing its fourth incident of extended downtime since it came under a distributed denial of service (DDoS) attack last Thursday. A dynamically...
View full post
CAIDA: Data Confirms DDoS at SCO
12 Dec 2003
Performance, Security
A data-based analysis of SCO's web site by the Cooperative Association for Internet Data Analysis (CAIDA) has found that this week's outage was related to a distributed denial of service attack (DDoS). Data collected by CAIDA's Network Telescope indicates...
View full post
IE Flaw Allows Spoofed URLs
12 Dec 2003
Security
A newly publicized bug in Internet Explorer shows that it is possible to craft html which causes Internet Explorer to display an incorrect URL in its address and status bars, making it easier for Internet fraudsters to trick web users into divulging...
View full post