Language Selection

English French German Italian Portuguese Spanish

Sasser worm suspect goes on trial

Filed under
Legal

A German teenager responsible for the Sasser computer worm pandemic goes on trial Tuesday. He faces charges of computer sabotage, data manipulation and disruption of public systems.

The Sasser worm didn’t require users to receive an email or open a file to be infected -- just having a vulnerable Windows machine connected to the Internet was enough.

The IT departments of many organizations were caught unawares, and the worm spread further. At the European Commission in Brussels, 1,200 computers shut down. In the United States, Delta Airlines was forced to cancel several flights.

In the German city of Hanover, staff at the Post Bank took a step back in time and recorded transactions on paper. And in Seattle, Microsoft promised a reward of $250,000 (210,000 euros) for information leading to the responsible hacker.

By exploiting a known hole in the local security component of Windows operating system, the worm spread quickly, infecting hundreds of thousands of computers in just a few days, overloading processors and forcing systems into an unstoppable pattern of shutting down, then rebooting. It apparently did no lasting harm.

Microsoft had issued a security bulletin and a patch to correct the problem two weeks earlier, but only the companies and individuals who installed the update were protected.

It's estimated that the economic cost of the Sasser worm attack ran into millions of dollars, and it was all caused by Sven Jaschan, an 18-year-old school student working from his basement in the small North German village of Waffensen.

Attracted by the reward, two of the hacker’s schoolmates tipped off Microsoft, who then informed the police.

Seven days after the worm was released, police arrested the hacker and seized his computer as evidence. After confessing, the youth was released, and within 5 months was employed as an IT trainee at Securepoint, a German software security company. But now it’s time for the now-19-year-old to face the music -- more or less.

Full Article.

More in Tux Machines

Security Leftovers

Leftovers: BSD

  • BSD Mag: Understanding Unikernels by Russell Pavlicek
    The number of tasks which lend themselves to being unikernels is larger than you might think. In 2015, Martin Lucina announced the successful creation of a “RAMP” stack. A variant of the common “LAMP” stack (Linux. Apache, MySQL, PHP/Python), the “RAMP” stack employs NGINX, MySQL, and PHP each built on Rumprun. Rumprun is an instance of a Rump kernel, which is a unikernel system based on the modular operating system functions found in the NetBSD project. So even this very common solution stack can be successfully converted into unikernels.
  • Summary of the preliminary LLDB support project
    Operating systems can be called monitors as they handle system calls from userland processes. A similar task is performed by debuggers as they implement monitors for traced applications and interpret various events that occurred in tracees and are messaged usually with signals to their tracers. During this month I have started a new Process Plugin within LLDB to incept NativeProcessNetBSD - copied from NativeProcessLinux - implementing basic functionality and handling all the needed events in the MonitorCallback() function. To achieve these tasks, I had to add a bunch of new ptrace(2) interfaces in the kernel to cover all that is required by LLDB monitors. The current Process Plugin for NetBSD is capable to start a process, catch all the needed events correctly and if applicable resume or step the process.
  • NetBSD Making Progress On LLDB Debugger Support
    NetBSD developers have been implementing the relevant interfaces needed for the LLVM debugger to effectively monitor and work on the operating system. As part of that they have also improved some of their own documentation, provided new ptrace interfaces, and more. Those interested in LLDB and/or NetBSD can learn more about this debugging work via this NetBSD.org blog post.

Firefox 51 Released With FLAC Audio Support, WebGL 2.0 By Default

Firefox 51.0 just hit Mozilla's FTP servers for those wanting the latest version of this open-source web-browser. Firefox 51 isn't a big feature release for end-users but notably does have support for FLAC audio, at long last! Great to see the web browsers finally shipping support out-of-the-box for this open-source audio codec. Read more

Intel Core i3 7100 Kabylake Linux Benchmarks

Last week I began delivering Linux Kabylake benchmarks with the Core i5 7600K while this week I finally am set to receive the Core i7 7700K. But for those curious how Kabylake is looking on the low-end, I picked up a Core i3 7100 as currently the cheapest Kabylake desktop processor. Here are some initial Linux benchmarks of this Core i3 processor on Ubuntu Linux. Read more