For the past year, Eastern European-based hackers have been systematically exploiting known Windows NT vulnerabilities to steal customer data, according to reports from the FBI and SANS Institute.
Published:
13 March 2001 y., Tuesday
More than a million credit cards have been taken and more than 40 sites have been victimized to date. According to SANS Institute, The Center for Internet Security will be releasing Patchwork, a scanning utility that that automatically checks systems for the vulnerabilities and also looks for files the FBI has found present on many compromised systems.
The tool was developed for the FBI by Steve Gibson of Gibson Research. The Center's tools are normally available only to members, but because of the importance of the problem, the Center agreed to make it available to all who need it.
Patchwork will scan servers for signs of files left behind by intruders, as well as the presence of a set of known hacking tools. The free utility will also check the system to make sure it is running all the latest security patches from Microsoft.
The FBI and Secret Service Thursday released forensic information from ongoing investigations because of the importance of the attacks. According to the data, the National Infrastructure Protection Center (NIPC) has been coordinating investigations into a series of hacker activities that specifically target U.S. computer systems associated with e-commerce or e-banking.
The hacking activities initiated from Eastern Europe, specifically Russia and the Ukraine, and have penetrated U.S. e-commerce computer systems by exploiting vulnerabilities in unpatched Microsoft Windows NT operating systems.
Šaltinis:
internetnews.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
Moto 360, Motorola's upcoming entry into the smartwatch industry, is rumored to be preparing for a July release.
more »
Unisys Corporation has announced Choreographer, a cloud management platform designed to direct and optimise key IT services and processes. Choreographer automates the lifecycle management of data centre and public infrastructure resources to help more efficiently deploy applications in both private and public cloud environments.
more »
This February 24-27, the world’s largest mobile technology exhibition “Mobile World Congress 2014” shall take place in Barcelona.
more »
Unisys Corporation reported a third-quarter 2013 net loss of $11.6 million, or a loss of 26 cents per diluted share, which included $22.6 million of pension expense. In the third quarter of 2012, the company reported a net loss of $12.4 million, or a loss of 28 cents per diluted share, which included $28.9 million of pension expense and $23.1 million of debt reduction charges.
more »
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced plans for future integration of Akamai Unified Performance technology into the Cisco® ISR-AX series of routers.
more »
Microsoft is to allow independent games developers to self-publish on its Xbox One games console. "Indies" will be able to create their own games, publish to the Xbox when they like, and set their own pricing, the computer giant has confirmed.
more »
Nokia has unveiled the Lumia 625, the largest Lumia Windows Phone yet, with a 4.7-inch screen and 4G.
more »
Unisys Corporation (NYSE: UIS) announced the availability of its Unisys Stealth Solution for Amazon Web Services (AWS) designed to enhance security for clients moving data into the cloud.
more »
The Open IPTV Forum (OIPF) has published a profile of HTML5, CSS, DOM3 and other related web technologies aimed at connected TV services and devices that implement a browser-based application environment.
more »
According to new research conducted by Unisys Corporation (NYSE: UIS), a majority of Americans are concerned about data breaches involving large organizations, but are evenly mixed on whether legislation should require private businesses to share cyber attack information with the government.
more »