Who is causing denial of access?

When some spamming is detected by web hosting companies or spam filters, the concerned IP addresses are blocked automatically. At present I have observed that BSNL ip addresses are frequently found in the blocked lists.

When a particular IP address is blocked by a web host, the users of the dynamic IP addresses of the subject ISP experience a “Denial of Service”.

Web server administrators should exercise some due diligence before they block a given IP address since blindly blocking the IP address tantamounts to a “Denial of Access offence” under ITA 2008.

It is possible that some competitors of BSNL in the ISP business may be targetting BSNL by getting the BSNL addresses blocked by undertaking an organized spam attack from BSNL IP addresses.

BSNL should do a study of how many of their IP addreses are now in the blocked list of major spam filters.

I have been experiencing such blocking of addresses in the range 117.192.128.0/20 during my site maintenance activities. In such cases I need to use an alternate ISP to log in and request the web host manager to unblock my IP address.

Though on my specific request my web host manager removes it from the IP block list since I am maintaining my site with them, the visitors have no such choice to get their IP addresses unblocked and the site therefore remains blocked for them.

A solution needs to be found to this problem. Comments are welcome.

Naavi

Posted in Uncategorized | 2 Comments

Botnet steals US$6 million from advertisers

Simulating visitors to a website who click on advertisements, a botnet named “Chameleon” is reported to have stolen around US$ 6 million in the form of false clicks on advertisements. The botnet used about 120000 hosts simulating the ad-clicking.

Report: 

About 5000 IP addresses participating in the botnet have now been disabled.

Posted in Uncategorized | Leave a comment

Cyber attack on South Korea

South Korean networks were down in what is believed to be a Cyber Attack from North Korea.

The attack has crippled Bank transactions including the ATM networks.

Report here:

Posted in Uncategorized | Leave a comment

MD5 to SHA256..but password cracking becomes easier

In an interesting evelations, it is stated that CISCO has recently started using a different method for storing user’s passwords which involves shifting from MD5 to SHA 256 which makes passwords more vulnerable to cracking.

We are aware that MD5 is reportedly compromised and in fact Indian CCA has dis-accredited MD5 algorithm for DigitalSignature purpose and shifted to SHA256/512.

According to security experts the new password storing system converts passwords into SHA256 hash code using a single iteration and without any cryptographic salt(Randaom data input).

The earlier methodis reported to have used 1000 iterations of MD5 hash with a cryptographic salt to each password. This is said to make cracking slower and requiring more tries.

Security specialists have also pointed out that at present relatively inexpensive systems outfitted with 2 AMD Radeop 6990 graphic cards and working with “Hashcat password cracking program can make 2.8 billion cracking tries per second.

CISCO is reported to have acknowledged the issue and stated that adoption of the low security method was forced by certain implementation problems.

Hopefully CISCO is working on setting right the weakness.

Refer details here:

Posted in Cyber Crime, ITA 2008 | Leave a comment

Delhi High Court Decision hurts Digital Media

Delhi High Court has recently held that “Dissemination of ball by ball information of a cricket match” is not included in “Press Freedom”. In a strange decision the Court has held that Press should confine its activities to report only after 15 minutes.

Report

The order grants “A limited interim injunction restraining the defendants from disseminating contemporaneous match information in the form of ball-by-ball or minute-by-minute score updates/match alerts for a premium, without obtaining a license from the plaintiff”

However “There shall be no restriction upon the defendants to report noteworthy information or news from cricket matches as and when they arise, because stale news is no news.”

also, “There shall be no requirement for the license if the defendants do it gratuitously or after a time lag of 15 minutes”

The judgement also has many other debatable decisions such as distinguishing the rights of the “Free” vs “Premium” recipients of information.

According to observers, STAR has already issued notices to service providers as if they have “Absolute Rights” instead of the 15 minutes rights.

The decision is a set back for “Press Freedom” and in particular for digital media including SMS, Blogging etc and needs a serious review.

Copy of Judgement

Naavi

Posted in Uncategorized | Leave a comment

Brazillian Doctors expose the vulnerability in Biometric systems

According to a report from Brazil,  5 doctors in a hospital in Sao Paulo were discovered to have bogus silicone digits and recorded the presence of some of their friends. It is estimated that there were around 300 bogus doctors present in the hospital whose attendance was being marked through such bogus methods.

The system also reveals that ordinary finger print scanners which don’t detect the pulse or don’t scan “below the skin level” are vulnerable to this type of attacks.

It is stated that the biometric scanners used and approved by the UIDAI in India are “Touch Scanners” which are susceptible to this kind of attack.

It is also known that even those scanners which try to read the finger print along with additional features such as temperature etc to detect if the print is from a live person can be fooled. More details are available here

Naavi

Posted in Cyber Crime, Uncategorized | Leave a comment