Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Spam

Day In The Life Of Net Scam Artists 257

NeoCode writes: "This articles chronicles a day in the life of two hackers. Seems like a reporter anonymously paid these hackers to log in their typical day. In the article, they talk about how they fool people with their spams and phreaking scams. Its in quite a bit of detail in terms of what these guys do to make money (and tons of it). Obviously these guys are breaking the law and nibbling on innocent/naive users. Looks like AOL and other ISPs still have to beef up their filters to stop spamming." Not a lot of details, but it's kinda interesting.
This discussion has been archived. No new comments can be posted.

Day In The Life Of Net Scam Artists

Comments Filter:
  • by Anonymous Coward
    I know hundreds (literally) of people who have this life -- exactly. They spend all day on AOL and drop out of school. They make money now, brag about it, but learn no valuable skills that'll get them a job when all their scams get caught. Now and then, there's someone who gets caught, but being that these people are between the ages of 10 - 20 (on average), nothing will happen to them.
    These people are *not* what are considered script-kiddies. They are not hackers. The author has no idea about this terminology. Any one of you can download a program and do exactly what they do. It takes absolutely no computer knowledge or intelligence.
    Most people are in the business of scamming for a few years, then realize it won't get them anywhere in life. Then, a new generation emerges, and the last generation become so-called "old school" (which, we know they really aren't).
    All and all, it's a black void drawing in lost teenagers through short-lived fame/money and steals away their future so they rot away and leech welfare.
  • by Anonymous Coward on Thursday March 29, 2001 @01:36PM (#329373)
    You're not kidding, my little brother had carded (stolen from AOLer) merchandise sent to the cardholder's name at his home address (my parents' house.

    He spent a few weeks in Juvie Hall and 18 months on probation as a 16-17 year old. He would have spent 6 months in the prison, but apparently the Juvenile Courts/ Corrections Dept for Cuyahoga County, Ohio have too many schoolyard drug pushers and child rapists to keep kids who "only defrauded a company for four thousand dollars" more than a couple weeks.

    He violated his probation several times by not checking in with his court-appointed supervisor (parole officer) and being picked up for curfew violations, but they never called him on it. They sealed his record at 18 because he hadn't commited any other serious offenses. He quit HS and nowworks at Pizza Hut as a 20-year-old, with no appreciable skills or education.

    Funny thing is, our parents were giving him plenty of stuff; new PCs, vidgame consoles, allowance. All they asked in return is that he go to school and study. He just wanted more without having to work for it. Bum.
  • by MoNickels ( 1700 ) on Thursday March 29, 2001 @11:42AM (#329376) Homepage
    Quick summary:


    This story is a huge crock of shit.

  • The behavior described in the article -- duping people, buying lists of stolen passwords, setting up phony web sites -- is barely even the domain of crackers, but still the article has to use the word 'hacker' in its title.

    Hackers are people who thrive on being faced with problems and finding clever, innovative solutions to them. Crackers are people who break into computer systems. Confusing the two is like calling every martial-arts student a 'ninja.'

    I'm annoyed that MSNBC doesn't understand the difference, and even more peeved that CmdrTaco didn't catch it, either.

  • 3. You *will* have the originating number even if *67 was used. This is because *67 is a feature set for end users which can be disabled/masked, whereas the originating number received on an ISDN PRI has been provided by SS7 signaling, and is mandatory to the system's proper functionning.

    A lot of older ISP lines, and even some newer ones from more out of the way places do not have ANI or caller ID.

    You can still get the account ID, and maybe the telco can get PEN info, or maybe not.

    5. All of the above requires about a day, depending on the size of the log files that have to be searched through, and the short delay in getting info from local telcos (they do move quickly if the right person asks).

    Or how well indexed the logs are. A big ISP gets over 300 login/logout events per second. You don't want to use a flat text file and grep for that. (Actually that number is about a year old, it may be 600/sec now)

  • One of the guys gets some CC numbers off the net and calls the 1-800 number on the back to see how much money is on the card?

    You can do that. As a credit card merchant making a data call at least. You can do a verify for a charge (that doesn't actually make the charge), or a reserve for the charge (which still doesn't make the charge, but eats up credit for something like a day or three, until there is another charge from the same merchant number). You could even make a charge, and then issue a credit (but that costs money). There may even be other things, but that was the set that the two places I had to write software to talk to would do.

    Of corse that requires a merchant account, and scamming those is probably a lot harder then snarfing up a few AOL accounts :-)

  • At the ISP I used to work for, our RADIUS servers logged to SQL servers.

    Four years or so ago Sybase couldn't even delete a day's data as fast as it was rolling in. Machines have gotten faster since, any maybe Sybase has too, but so has the call volume (I don't know of Oracle was tried). It ended up being done with Sleepycat's DB B-tree product and a lot of custom code.

    I can see a smaller ISP being able to get away with Sybase though. There are economies of scale, and diseconomies of scale too.

  • The "criminal mind" is different from others: they truely believe that they won't get caught. I think neither criminal was really worried about getting caught. They took certain precautions, but it is these precautions that allow them to feel uncatchable.

  • If that joker is a leet haxor, then so am I.

    This was a 15 year old wanking a gullible adult. A real criminal (one smart enough to be making "6 figures") does not brag about his exploits, and certainly do not write diaries to be published on MSNBC.

    Hell, for $250, I'll yank that reporter's chain, and give him a better diary, too. Drop me an email, guy, and I'll give you a Great Gatsby-like retelling of how I

    • cracked saddamscrib.iq, replaced "Death to the Imperialist Running Dogs" with "All Your Base Belong To Us"
    • ghosted Al Gore's email address to subscribe him to the fat-lover's listserv
    • stole a CC number belonging to Jeff Bezos, using it to buy "Seven Habits of Highly Successful People" from borders.com

    "Beware by whom you are called sane."
  • Might this be just a tad bit embellished for the reporter's sake?

    Did anyone else notice that the one guy was glad to get the $250 from the reporter so he could go out drinking?

    Yes, I definately think they're embelishing - at least in terms of how much money they're making with these scams. Others have commented that the logs were faked - I think the idea of suddenly getting $250 to go out drinking wouldn't occur to a reporter that hasn't lived down & out for a while - sounds a lot more like some of my friends back in college.

    -"Zow"

  • by Bob McCown ( 8411 ) on Thursday March 29, 2001 @12:28PM (#329386)
    I got a spam the other week that lead off with this gem: "This isn't spam. This is a legitimate business email, and I got your address from a list that I purchased"

    Sounds like spam to me.

  • People would learn to do research. Many of these scams fall apart under the smallest pretense of scrutiny. If people were willing to question, especially if it sounds 'To good to be true', these guys would have no niche to exploit.
  • by Dredd13 ( 14750 ) <dredd@megacity.org> on Thursday March 29, 2001 @12:28PM (#329391) Homepage
    I use www.anonymizer.com to go to the Yahoo account because I'm paranoid. Hell if anyone's going to get my IP (Internet address). Screw the Feds, they are lazy they won't trace me back that far.

    Uh... subpoena Anonymizer for logs (by law they have to keep them) then timestamp the occurances...

    Specifically, what law requires you to keep logs?

    D

  • Look at the Jargon File entry for cracker and you'll see that if you REALLY want to be pedantic you should call them worms instead of crackers...since worm was the original neologism.
  • by kaisyain ( 15013 ) on Thursday March 29, 2001 @12:24PM (#329393)
    Hackers are people who thrive on being faced with problems and finding clever, innovative solutions to them. Crackers are people who break into computer systems.

    Says who? Try looking up "hacker" in, say, Merriam-Webster's Collegiate Dictionary. You seem to be under the mistaken impression that small subcultures get to force their own pet definitions on society at large. It works the other way around...words mean whatever the population at large decide they mean. Heck, even the Jargon File admits that hacker was originally used to mean "a malicious meddler" and only recently has that use become deprecated.

    Confusing the two is like calling every martial-arts student a 'ninja.'

    No, it's more like a subset of karate students (it's only a subset because not all karate students agree with them on this issue) suddenly deciding that, because of the increased media exposure that the movie Karate Kid brought to their subculture they now want to be called "judo-ka" -- and who cares if karate and judo are already in widespread use? -- and then getting their obi in a twist when everyone keeps calling it karate.

    Unless you are trying to suggest that there is some innate meaning in the two words completely separate from what society imparts to them.
  • Serious suggestion: In your copious spare time (that was very toungue in cheek -- I'm a sysadmin, I don't know what spare time is ) something you could do to fight the higher ups, is:

    make a list of all the costs involved with spam -- man hours tracking it down, downtime of mail servers swamped with it, getting yourself out of the RBL, business lost/cost to customers of being RBL'd -- make it as detailed as possible, be realistic, but remember that things like the amount they paid some sysadmin to come in at midnight to fix the mail server 'cos some spammer brought it down counts!

    Split this into per-spammer chunks (i.e. maybe each spamming incident costs $250 or something, this is, btw, probably too low an estimate)

    find out how much your lawyer costs

    compare number-of-spammers times per-spammer-costs to lawyer-costs

    if a is greater than b, tell the higher ups.

    otherwise, file it and return to it occasionally -- increases in costs or spammers might make it useful eventually

  • They don't mention it in their faq (funny that) but as of last year, at least (the last time I needed western union) they did allow you to pick up money without an ID. The sender had to specifically allow this, and a question was asked with an answer (theoretically) only you should know for authentication.

    To confirm this, go down to your local western union and read the 'to send money' form.

  • Found out her name was Rosie Palms. The date was cut short because the Five Blister Sisters were being abrasive.

    --
  • by TWR ( 16835 ) on Thursday March 29, 2001 @12:02PM (#329398)
    Methinks that "her place" is a glove...

    -jon

  • Is that, the gist of this is, get credit card numbers.

    How is using a friends house as a' drop site' for carded equipmetn safe? How do they not track it down? Someone explain this to me...
  • Where are your lawyers, and how exactly does the company justify not letting it go through? This is one for the lawyers.
  • "Rarely is the question asked: Is our children learning?" -- George W. Bush

    All your politician are belong to us.

    Dave
  • We could solve most of the spam problem If more people would fight back instead of just ignoring spam

    follow the link in my sig. to find out more about what you can do

  • Firstly, I'd like to quibble some semantics with you. These kids are not 'hackers', they are 'crackers'. A hacker wears a white hat. The crackers wear a black hat. As far as that goes, these kids are not even crackers, they are spammers and thieves.

    You can argue all you want, but "hacker" is understood by the general public, but "cracker" is not. In the same light, "Virus" may be something different from a "Trojan Horse", but you tell that to an average computer users and they'll say "huh?" MSN is written towards the general public and while the author may very well know the difference between cracker and hacker, he/she would rightly chose to say "hacker" rather than wasting the readers time with a paragraph explaining what a cracker is. It is a sign a good author to target the language to the reader. You just need to accept the fact that the general population isn't interested in learning a billion vocabulary words to make you happy. While it may seem important to you, it's useless trivia to most of the world.

    I would argue that the language of hacker and cracker does not even have the meaning you say. You can be a cracker and still be "one the side of good". Crack is actually a very positive word. "That is a crack team." Cracking generally means to "crack open", as an a bank vault, a copy protection scheme etc. It implies an action, not an intent. So a locksmith might be called to crack a safe for which the keys were lost, or I might be consulted to crack a copy protection software scheme and test it for weaknesses before it is released. I consider myself both a hacker and a cracker, but I do not use either talent for evil.

    jc @ crack.com (yes, my real email address)

  • Since when did the term hacker become a catch all for criminals who use a computer? I am absolutely appalled by this. While it is true that words should and will naturally evolve in a language, this is really not the case here.

    It seems to me that the author or editor decided to use the word hacker in the title for some sensationalism. This story does not even describe what an average citizen would call a hacker. Most people think of a hacker as someone who infiltrates a computer system. Most people also think that hackers steal information and damage property (e.g. delete or destroy data).

    In all reality, a hacker is someone who is extremely skilled with computers. A hacker also has knowledge about how to break into a system. For instance, any system administrator worth a damn is a hacker. That is to say that they are skilled with computers and know how to break into the system. This puts them in a position to keep computer criminals (note the word choice, criminals not hackers) from breaking into the system.

    In this article, the computer criminals are just that, criminals. They are simply modern-day scam artists. But hey, "Watch a computer scam-artist work the system" probably doesn't have that same ring to it.

    Originally I was going to send an e-mail to Bob Sullivan (the author) but if you do a search for the word hacker on the page you will not find it in his article, only in the headline and in links to other MSNBC headlines. Apparently this is just some editor with his head way up his ass.

  • by Polo ( 30659 ) on Thursday March 29, 2001 @11:46AM (#329412) Homepage

    That's the third time I had to enter my credit card info to post to slashdot.

    What's up with that?

  • One starts at exactly 11am the other starts at exactly 11pm? One of the guys gets some CC numbers off the net and calls the 1-800 number on the back to see how much money is on the card? Western Union gives out $250 in cash? One of the guys has stolen merchandise sent to his "friend's" house?

    This bullshit is worse than those hollywood movies showing a 16yr old breaking into the NSA and breaking their strongest encryption in 3mins with a full GUI animation sequence. At least the hollywood bullshit doesn't claim to be true. (It only claims to be entertaining, which is enough lying in itself).

  • The first kid was so worried about getting tracked, but he still wrote his document in word. He'll be tracked by Word's GUID and busted the same way the Melissa virus write was tracked. Oh well, it is good fiction.
  • ...the journalist who believed this story, or the Slashdot editors who gave it credence?
  • You know, I was going to reflexively say something about how the hacker/cracker speech is redundant and that it's pointless trying to educate anyone about what a hacker is, but this time they really went too far. This is horribly sloppy journalism and really unprofessional. It's one thing to juice up the headlines, it's another to completely misrepresent the article and the story. I don't see anything related to ANY definition of hacking here.

    Boss of nothin. Big deal.
    Son, go get daddy's hard plastic eyes.
  • by CAIMLAS ( 41445 ) on Thursday March 29, 2001 @02:20PM (#329420)
    What's the difference between scamming someone openly, as companies like AOL tend to do with their overly priced 'special AOL offer' products, and scamming them covertly as these individuals do? The only difference I see is that AOL has the backing of their big name, while these folks don't.

    -------
    CAIMLAS

  • Can we institute the death penalty for anyone who writes 'lol' and 'rofl' in random spots lol?

    I swear, if AOLamers actually talked like that, they'd be institutionalized... or shot...

    -grendel drago
  • cops go to his friend's house, his friend says "I have no idea what you are talking about" they search the place, can't find the equipment, no case.
  • yes well most people with half a brain dont use the same drop house more than once. But no one said this guy had half a brain
  • by QuantumG ( 50515 ) <qg@biodome.org> on Thursday March 29, 2001 @11:49AM (#329427) Homepage Journal
    Why not just buy a list of a few thousand card numbers from real hackers.. fucking tossers. It is amuzing that there is actually ways to get cash off CC's these days. Carding was never popular because you had to get physical goods delivered and then sell it to make cash.. ie you had to know a fence and frankly if you're gunna go into that business why not just steal cars or break into houses?
  • Comment removed based on user account deletion
  • > But in typical Bell Canada fashion, they've blocked all traffic eminating FROM port 25, not traffic with a DESTINATION of port 25.

    So lemme get this straight - punk spammers doing direct-to-MX out of port 25, who are easily traced, are blocked, but dirtbags who relay-rape anonymizing Sendmail 8.6 relays in China (traffic to port 25) continue to abuse with imputiny?

    Fuck, that is clueless.

  • When I first read this article, I thought "Oh no, tomorrow there'll be another 10,000 chickenboners who think they can make $100K/year spamming".

    But between the "*67 protects you from being traced", the "I use my friend's house to drop off carded stuff", and all the other things in that article that don't work, I'm kinda glad this article got published.

    This article phishes for punk spamming wannabe-thieves in the same way punk spamming wannabe-thieves phish for AOLamer accounts with spams saying "AOL billing needs your password".

    I love the smell of roast spammer in the morning... Dawn is but a few hours away.

  • > it turns out it's just and advertisement for Adcops.com.

    And who do we know from adcops.com?

    Why, it's Maurice O'Bannon [google.com]!

    What does Maurice do for a living? Why, he's the Treasurer [google.com] of Empire Towers!

    And what does Empire Towers do? Why, they're a bunch of spammers [spamhaus.org]!

    What an amazing coincidence!

  • > Kudos on the investigative journalism,

    Not my research, I just read about it in nanae and followed a few links in google.com.

    > I'm off to DDoS adcops.com...

    Please don't.

    The way to DDoS spammers is to teach all your friends how to read headers so they can report the spammers to their upstream ISPs.

    Likewise, teaching your friends to report pump-and-dump spams to the SEC, Nigerian 419 scams to the SS, tax evasion scams to the IRS, quack medicine to the FDA, and Make-Money-Fast to the USPS, is a highly effective ways to deny service to the scammers behind the spammers.

    Traditional DDoS over a network is (a) illegal, and (b) network abuse, the very thing anti-spammers are trying to prevent. We're the good guys, remember?

    But getting the spammer deleted - whether from his network (abuse @ his upstream ISP) or from society (various .GOV agencies weilding heavy LART) - is a much more satisfying way of denying service to spammers. Best of all, it's (a) legal, and (b) prevents network abuse.

  • The best scam, IMHO, is this:

    1. Download some X Rated pics from your news server (alt.binaries.pictures.erotica.female.*)
    2. Set up an adult site on a free server or your own server (say, on a DSL line)
    3. Spam the hell out of AOL
    4. Get some people to pay $10 for a one-time sign-up fee, with lifetime subscription
    5. Take down the site
    6. Wait a few days, weeks, or whatever
    7. Repeat


    You can just repeat the last few steps... don't even need to change the pictures or the HTML, unless you want to scam the same people over and over. Just make sure to change the name of the site and the name of the management.

    I would set up an adult site of my own, but it's too much bother. Oh yeah, and my girlfriend would kill me. :)
  • >>11:03 a.m. Open up one of my new Yahoo accounts through an untraceable NetZero account.

    >Uh... And how do you suppose your gonna dial into it?

    Maybe using one of the scammed cell phones? Its not hard, not even remotely hard. One laptop (which he talks about getting), and a dongle, and he is all set with a cellphone that is -- somewhat -- untraceable.

    >Uh... subpoena Anonymizer for logs (by law they have to keep them) then timestamp the occurances...

    As far as I know, they dont keep logs there *AT ALL*, on purpose.

    >.. Boy is this moron sure dumb
    Actually, I know a few darker-hat individuals, and this is rather close to their actions. Maybe a few key details were left out for those with less of a clue, but hey, it's not his fault you cant connect the dots.

  • Unlike the reputability of "your girlfriend", I actually work for a national wireless company myself. I can tell you that is bull. To track a cell's location *is* possible, and is done on a not-so-often basis. However, it is by long/lat, and to do so on a end user in a non-test environment requires a subpeona.

    At least in OUR company, thats how it is done.

    Sounds like you smoked a little too much while watching the net. :)
  • by Twid ( 67847 ) on Thursday March 29, 2001 @12:23PM (#329439) Homepage
    They get away with it because law enforcement and the credit card companies generally don't care. I know someone who was involved in investigating the egghead compromise last year. One credit card company had over one million credit card numbers stolen. They decided that it was cheaper to deal with fraud on those credit card numbers than to reissue and remail one million credit cards.

    For the credit card companies, it's a business decision, in the USA you can only be held liable for $50 in fraud if you report it, so they likely feel it's the consumer's problem to report it.

    For law enforcement, it's only a few thousand dollar scam at most, and they are probably more interested in going after murderers and higher profile criminals. If these scam artists don't get too greedy and don't make too much noise, I'm sure they can keep up scams like these for years.

    For the internet computer store, it's a tough call, many customers really do buy laptops as gifts or want stuff sent to a different address, are you going to turn away that business?

    Here's a typical story from here [scambusters.org].


    Here's a personal example: Our company experienced its first encounter with credit card fraud last month. Someone stole a credit card account number, then used the stolen number to purchase a $500 product from our company. The crook knew the cardholder's correct address, provided our company with that information, but requested that the product be shipped to a different address.

    Since it's not uncommon for our customers to request a "ship to" address which is different than the "bill to" address, at first, we didn't think much of it. Our policy is to send the invoice to the "bill to" address -- which we did. A few days later we got a call from the customer (whose card number was stolen) informing us that he never purchased anything from us.

    This particular scamster used one of the free email services (Juno) to open an email account in the stolen cardholder's name -- which made the transaction appear more legitimate. We informed Juno's security department of the fraud taking place. (Juno said that they shut down the scamster's account.)

    Although we got authorization and approval from our merchant account vendor, we bear all the loss.

    We contacted the banks and the merchant providers involved, and even contacted the police. The banks, merchant providers and police were not able to help -- mainly because they were too busy or felt that the dollar amount involved ($500) was not significant enough to warrant further action.


    While I think the stories are probably somewhat exaggerated, I think that there is more truth than many posters have been willing to admit.

    - Twid

  • by emf ( 68407 ) on Thursday March 29, 2001 @11:47AM (#329440)
    "11:01 a.m. Well, I just checked www.westernion.com and he wasn't lying, he sent the funds. I got the tracking number and he paid by cash so I can pick up the money without an ID. Secret question/answer was "what's your mother's maiden name?" Answer was "tu madre." "

    Can you really pick up money from Western Union without an ID? I checked their website and their FAQ says:

    "You may pick up your money transfer at any Agent location. You will need to complete a "To Receive Money" form with the following information: name, address, telephone number, amount expected, as well as the sender's name, telephone number, city and state being sent from. Valid identification is also required. Some restrictions may apply."

    Seems fishy...

    I also found this interesting:

    "Screw the Feds, they are lazy they won't trace me back that far. Plus I got *67 on, they'll need subpoenas to, and a ton of tracing to even get close to me."

    I'm pretty sure *67 doesn't work on some ISDN/PRI Lines (which many ISP's used). I know for a fact it didn't work at a local ISP here (I tested it personally).

  • i think you need a better example than priests and con artists. some of us are not sure what the difference there is. :)

    I figured that someone would point this out sooner or later. I thought that priests seemed like the professional speachmaker most likely to produce images of good honest people. Especially when compared with the other obvious choice..... Senators.
    _____________

  • Hackers are people who thrive on being faced with problems and finding clever, innovative solutions to them. Crackers are people who break into computer systems. Confusing the two is like calling every martial-arts student a 'ninja.'

    These guys aren't even crackers. They aren't breaking into computer systems or anything like that, they just steal credit cards. The only way in which they even resemble a hacker is that they use a computer to do their 'job'. But so do most receptionists. Confusing web con artists with hackers is like confusing real world con artists with priests because both make speaches as part of their work.
    _____________

  • by Stonehand ( 71085 ) on Thursday March 29, 2001 @12:06PM (#329444) Homepage
    Are you talking about H.R. 718, "Unsolicited Commercial Electronic Mail Act of 2001", sponsored by Rep. Heather Wilson (R-NM)?

    According to CNN, it's passed Committee vote and will be sent to the House floor for consideration. A version needs to be introduced and passed in the Senate, the two reconciled, then sent to POTUS.
    Here's the text [loc.gov], if anybody's interested. Actually, that's probably a temporary link which will break VERY soon, so you can instead use this link [loc.gov], which should hopefully re-exec the query, and then click 'Full Display'.

    It's actually fairly interesting. There's explicit protection for service providers to take 'good faith' efforts to block UCE, which would appear to protect users of things like the real-time black-hole list for mail servers, and what not. And you can't go after them for innocent retransmission, either.

    It's probably based on existing telemarketing law, with its references to pre-existing business relationships, opt-out (they need to provide a means for opting out of lists in their UCE, but they don't need you to opt in BEFORE they send the first UCE) and all.

    Interestingly, it only refers to individuals. I'm not sure how it applies to UCE from corporations -- for instance, whether the entire company is liable as a whole or just the employee(s) who decided to spam, or whether this could in any way be applied to spam-friendly ISPs.
  • I'm sorry, but this has my "bull-meter" pegged at maximum, and here's why:

    Well, I just checked www.westernion.com and he wasn't lying, he sent the funds. I got the tracking number and he paid by cash so I can pick up the money without an ID.

    Regardless of whether you can get cash by Western Union with an ID (which has been touched upon by others), we're supposed to believe this guy didn't just take the money and run? The same guy who has stolen countless credit card numbers, bought thousands of dollars of merchandise, and is "untraceable"?

    Please.

  • ....which would make them phreaks, no?
  • by Eil ( 82413 ) on Thursday March 29, 2001 @05:03PM (#329454) Homepage Journal

    A lot of my spam now shows that type of disclaimer. (well, it did before I switched accounts). The most common line goes something like:

    <BEGIN PASTE>

    "Duruing your recent visit to our affiliate, <some fake site>, you "opted-in" to our email promotion campaign to alert savvy web users to outstanding online offers. This is not Spam. We are adhereing to <some fake law>, <some fake section>, <some fake paragraph>, where it states that <what we are doing is compleltely legal, you turd>. If you wish to be removed from this mailing list, plase vist <fake web address> or reply to this email message with only the word REMOVE. <...which won't work, because we forged the headers, haw haw.>

    COMPLETELY FREE PENIS ENLARGMENT, PLEASE CALL THIS INTERNATIONAL NUMBER TO ORDER YOUR KIT TODAY!

    <END PASTE>
  • by Speare ( 84249 ) on Thursday March 29, 2001 @11:36AM (#329455) Homepage Journal

    How much validation is done on these claims of great exploits?

    "9:15am Cracked a Brinks truck using my PalmOS hackmaster app called 'cash'."

    "9:45am Almost tripped the goons at Fort Knox, but hid in the bushes an extra five minutes. An hour later, a five-nines bullion bar in my backpack, and off for new challenges."

    Might this be just a tad bit embellished for the reporter's sake?

  • I agree small claims is designed for exactly this problem. Additionally it usually only costs a small amount to file a claim (here its ~$30) and if the other party doesn't show up they default and you win the judgement and even if you lose your action you only are out the cost of filing and if you get a judgement in your favor and they don't pay they are in contemp of court and judges tend to take that seriously (can you say Bench warrant).
  • d33z d00dz R k-1337 h4x0rs!!!

    And to think...I thought hackers wrote tight code, and messed with hardware and such. Boy was I ever wrong...it's all in the credit card fraud, banner ad fraud, spamming, and porn! So many wasted nights...

    Speaking of nights, what hackers work from 11 am to 11 pm?! And when was somebody going to tell me that netzero and AOL were the ISPs of choice? This article has really opened my eyes, and I'm going to get a few phony email accounts and turn my life around!!

    .....*grumble*
  • Exactly, but who wants to read a story about something as mundane as spamming? People get spammed several times a day, but rarely do people get 'hacked'. Saying it's hacking and not spamming lends a credibility, and no small measure of mystique to the story. Spamming is irritating...hacking is exciting. Besides, do you think this reporter cares about the gross misuse of the term? He's just trying to make a buck, and he'll get more bucks for his story on 'hacking' than 'spamming'.
  • I feelthis may be at best exaggerated, and at worst a hoax. Just sounds too cliche.

    Why would there be a hoax? Well, hmm. Follow the money. I went to the Adcops site where the original story comes from. Poked there a bit before finding out that to be a member (and read or see the 'Fraud Museum' or other valuable evidence, you need to fork over US$90.

    Hmm. Perhaps Adcops did a little hack job of their own to get publicity and increased revenue sales. Ya Think?
  • or doing what Kevin Mitnick did

    considering how things worked out for him, i don't know if i would reccomend following in mitnick's footsteps...
  • They're scam artists, so they must be trustworthy. =) [error... entering paradox mode... brain shutting down.]

    Did you know that they have removed the word "gullible" from the dictionary?
  • Assuming the reports are accurate, the only reason these guys/gals are successful in these schemes is because there are people out there naueve enough to fall for their social attacks.

    Yes, they did work the system, but I don't see anything here to be worried over - people will simply have to learn that you don't give your credit card details out on a whim...

    The only thing that does concern me is that people like this provide the powers at be the perfect excuse to attack anonimity... :(

    Ah well - rant over.
  • ... By blocking all port 25 traffic.

    But in typical Bell Canada fashion, they've blocked all traffic eminating FROM port 25, not traffic with a DESTINATION of port 25. So those of us who run SMTP servers for a useful purpose (receiving mail at erik@ is quite useful) are screwed ... and the true spammers will just reconfigure their spambots to send out traffic on port 31337 or something.

    If you use Bell Sympatico HSE (I'm in Montreal, but they go over to Toronto, Ottawa, maybe out to BC I don't remember), check out SympaticoUsers [sympaticousers.org]. You'll find the messageboards and announcements quite useful.
    --

  • "He was too stupid to be a Fed. Hell I don't care if he is, he can't track me."

    What?! If he can't "track" him how was he able to contact him with the request in the first place?!!!

    Such reports by notable journalist coming from a well known source, MSNBC.com, does nothing but scares the hell out of your average computer users. MSNBC.com would have done a better *service* to its readers if it educated them about how to *NOT* become victims.

    ---------------
    Sig
    abbr.
  • by Oztun ( 111934 ) on Thursday March 29, 2001 @12:01PM (#329493)
    As someone who was into the underground scene on EFNet from 91' to 95' let me tell you, don't think you can do this.

    The first guy collects his money at western unions. This will not work because the feds work with AOL and you will scam a fed who will be at the western union waiting to meet you.

    The second guy has his carded mail sent to a friends house. Whoever signs for this is going to jail. Once the friend gets arrested he will rat him out.

    I bet these two guys pulled this off once or twice and wrote about it like its a day job. If someone stupid falls for it you might make quick cash once or twice. If you keep trying it you will get busted sooner than later.
  • Lawyers fees are more than the cc charge. CC company has more lawyers and we could wait up to 2 years to get the cash. I've simply been told by the highest person in the company to "Let it go" it costs to much to pursue it. Sad Fact of Life, money buys you the ability to fight. Welcome to the real world.
  • by cluge ( 114877 ) on Thursday March 29, 2001 @11:50AM (#329495) Homepage
    I work for a small ISP and we have a Zero tolerance policy regarding SPAM. We clearly state that if you spam we will charger your account 500 dollars and send you on your way. We do the research (sometimes newbiews/chruch groups get a second chance) and bill the SPAMMER. The SPAMMEr then complains to his CC company and they ALWAYS give him a refund and charge for the pleasure of enforcing a CLEARLY stated policy. It doesn't matter if i provide a contract SIGNED by the customer, and have logs with phone numbers etc etc etc add nauseum. The CC people simply will not let the charge stick.

    Now according to this acrticle these people use SPAM as one of their main forms of getting to victims. Hmmm how can we fight this problem?? If we were ALLOWED to enforece our AUP, and our contract that a customer signs then this activity would be less profitable and easier to trace.

    For isntance, joe/badboy/hacker uses a stloen card signs up for a throw away account and start spamming. If joe is useing a stolen card a 19.95 gets looked over, but a 500 dollar charge gets noticed. So come on Credit Card people, if we can PROVE it why can't we charge these people for taking up our time, system resources etc. As this article clearly points out SPAM is used very often for illegal practices.

    Why won't the credit card companies help us clean up?

  • Okay, so this guy has a million stolen credit cards, and you don't think he's made/bought a couple of fake IDs with made up names? As for *69, this guy doesn't sound too bright, so maybe he never really tested it?

    Anyway, I'm not saying you're wrong, it does seem a little fishy, but on the surface the facts seem reasonable enough.

    The only "intuitive" interface is the nipple. After that, it's all learned.

  • subpoena Anonymizer for logs (by law they have to keep them)

    Excuse me? Since when was any entity required by law to keep logs of anything?!

    --
  • by susano_otter ( 123650 ) on Thursday March 29, 2001 @01:38PM (#329503) Homepage

    You know what, though? I'd rather return to the days when the "hip" thing for highschool outcasts to do was warez scams and carding.

    It sure beats the current fad of shooting your classmates.

    (Lovecraftian emphasis added)

  • Damn media. Ok, I read the article. All it really shows me is that AOL users are easily duped. Other than being yet another example of how easily script kiddies can work, was there anything informative about that article? I think not.
  • Man, that shit's better than Gibson. I'm surprised the author managed to resist the temptation to go overboard on the haX0r slang.

    Welp, I gotta jet. sQu1db0y (a 'hacker') teld me hes gonna score me some perqs. (UNIX 'shell' accounts) Dam. Some days it just feels like the whole worlds smeared with Vaz. (?)


    --

  • Firstly, I'd like to quibble some semantics with you. These kids are not 'hackers', they are 'crackers'. A hacker wears a white hat.

    I thought the ESR fanboys had given up. If all hackers wore a white hat, then why the need for the term 'white hat hacker'. While its obvious that these guys are not hackers, crackers, or script kiddies by any sense of the word, claming that 'hackers' are all good guys is ludicrist. Please stop, you're making us all look stupid.

    Rate me on Picture-rate.com [picture-rate.com]
  • by slashdoter ( 151641 ) on Thursday March 29, 2001 @11:44AM (#329516) Homepage
    there's a sucker born every min....

    Education is the only way to stop this type of thing. heh and castration


    ________

  • The people who signed the AUP and then spammed owe you $500. The credit card companies won't collect this debt for you (even though it seems they should). So take the spammers to small claims court - you have a signed agreement and proof they violated it - just because the CC companies won't enforce it doesn't mean it's not a real debt, and small claims is designed for collecting on debts like this. No lawyers needed.
  • If you read the article, the second hacker at midnight starts netting ccs. At 12:30 he has about 30. Then he calls the 800 numbers on the back. What, did he get the actual credit cards in his email? or did he not check his facts?
  • Somethings not right... Hacker #1 takes a break at 5:30PM to have a dinner-date with a girlfriend, and then returns at 7:30PM? I'd believe it more if he didn't have a girlfriend, or 2) took the reset of the night off to be with his honey.
  • by SquadBoy ( 167263 ) on Thursday March 29, 2001 @11:51AM (#329524) Homepage Journal
    "SECURITY EXPERTS WILL tell you most of the computer attacks they see every day are initiated by clever teen-agers, so called ?script kiddies.?"
    I started laughing when I read that. Most of the rest of it was very funny also. I never thought I would read the words "clever" and "script kiddie" in the same sentance. LOL
  • Damn media. Ok, I read the article. All it really shows me is that AOL users are easily duped. Other than being yet another example of how easily script kiddies can work, was there anything informative about that article? I think not.

    It may not have been informative for you or most other Slashdot readers, but it wasn't aimed at you. If you notice, the article was posted on MSNBC News, not on Slashdot. It wasn't aimed at informing people who already know about this problem, it was aimed at informing the vast majority of Internet users who aren't aware of this kind of activity.

    Sometimes its easy to forget that 99.9% of Internet users have never even heard of Slashdot and don't have the same background and interest in technical matters that Slashdot readers have.

  • I can assure you that I've counted the bullion bars inside, and I'm full.
    No one can steal crap from me... :-P

    Sorry, the title forced me to reply....
  • by electricmonk ( 169355 ) on Thursday March 29, 2001 @12:29PM (#329528) Homepage
    Plus I got *67 on, they'll need subpoenas to, and a ton of tracing to even get close to me. By then I'll have a new number. Hell, I go through telephone lines about one every 2-3 months.

    Uhh... No matter how many times you change your number, there is always a record

    A little clarification on this:

    Almost all large customers of the phone company (i.e. those who have some kind of leased line or ISDN services) have a service called ANI, which stands for (AFAIK) Automatic Number Identification. The *67 service has no affect on whether this aquires your number or not, so you are pretty much screwed if you call in on your own phone line.

    The only way I know of to get past ANI is to trick the operator to diverting your call to the number that you wish to call, thereby having the number of the operator (always xxx-0000) showing up on ANI. But, of course, you can't route data calls this way, so you are pretty much limited to either using someone else's line, or doing what Kevin Mitnick did and aquire a different number through the cellular telephone network, although, with the state of cellular networks today, that is considerably harder to do than it was 5 or 6 years ago.

  • by taliver ( 174409 ) on Thursday March 29, 2001 @11:57AM (#329533)
    since somebody who lays in bed all day typing on a computer and eating pizza claims to have a real life girlfriend.

  • by DeadVulcan ( 182139 ) <dead,vulcan&pobox,com> on Thursday March 29, 2001 @11:51AM (#329537)

    5:30 p.m. I'm going to go meet my girlfriend. Take her out to dinner, go back to her place.

    How did he meet this girl? By spamming a whole bunch of E-mail addresses??

    Hey, then again...

    --

  • by BeerSlurpy ( 185482 ) on Thursday March 29, 2001 @01:01PM (#329538)
    Oztun couldnt be more right.

    A lot of people got rounded up for just this sort of naughtiness in the late 80s and early 90s and it changed a lot of things in the underground. The warez d00dz and the carderz and the coderz (phone code guys) all used to be part of the same clique. It was good fun for bored high schoolers everywhere- like I said, this changed.

    The FBI made some very prominent credit card fraud arrests due to guys using this exact scheme. The carders were buying computer equipment and hanging out on BBSes with warez doodz. They were also posting CCs to a number of warez BBSes for trading purposes. Unfortunately for the warez dudes who weren't involved with the carders, the FBI found out about the use of the BBSes and infiltrated and raided a huge number of them. When the busts started going down, there was a huge media shitstorm.

    Anyway, word got around that carding was a quick ticket into jail, so almost everyone avoided it from then on. Warez is a fun hobby for some (I dont "get it" personally), but these guys arent looking for jail time. I strongly disagree with the 6 figure salary. Once the CC companies notice a pattern, the feds will be invited in almost immediately. Once they compromise a single carder, they will eavesdrop on his dealings for a while to pick up all his friends. Then they raid. Like Oztun said, this has happened before.
  • Well... people like to brag. Gets 'em in trouble, but it's often little to do with the monetary aspect. But I have to agree with you--the whole thing smells like BS. The only question is, is the reporter making the whole thing up, or is he just getting his chain yanked by some thirteen year-old who saw an opportunity in a chatroom?

  • by agentZ ( 210674 ) on Thursday March 29, 2001 @02:06PM (#329550)
    An update for modern times? "There's a sucker logging on every minute."
  • Specifically, what law requires you to keep logs?

    I don't recall the exact name of the law, but I believe the bill in congress was HR1984.
  • Drat. You ruined my joke. HR1984. 1984. Get it?
  • The "reporter" is just running free advertising for Dan Clements of AdCops, who's fevered imagination is responsible for this piece of tosh.

    Exactly! And by the way, how comes those kids make $4,000 a day when AdCops' Top3 list of cheaters contains a $5,000 fraud guy?
    All this is is free adverisement, stupid e-journalism, and ridiculous fiction.

    --
    "Moderate down and we'll get your balls in Meta-Moderate."

  • Yea, that was pretty dumb ordering pizza on a stolen phone and having it delivered! I had a friend who had a phone, and he opted to leave it on to put a way the crook. It worked. A quick check of all the people he phoned the day before gave all the info needed. Who called you yesterday at 2 "my son" Did you deliver a pizza yesterday to XXXX nw 55th st. at 7:45 PM? Yea. Did they pay by check? Yea. May I have it? Yea.... End of story.
  • Compared to the average AOL'er, script kiddies are geniuses. Then again, so would be a house cat, dog, wren or wombat.

    When I was a begining programmer, back in the days of yor, we regularly wrote fake-login programs. Some with malicious intent, and some, like me, to see how clean an imitation we could write. Not hard to leave one running, come back in an hour, type KWIT and see how many accounts and passwords I collected. Only caught if there was an admin on duty that night (rarely.)

    I have in my email box a fake request to update PayPal account information, very well done, but obvious that it forwarded to an ISP with free accounts and CGI support. The spammer sent this out on a Friday, at the time the staff at the ISP went home. After a few calls to InfoSpace, I knew this ISP (a subsidiary of InfoSpace) didn't have abuse/support staff on call all weekend. A perfect choice and the timing was thoughtful. An entire weekend for the password stealer to collect PayPal accounts from unwitting people.

    This diary, if you view it in the correct light, betrays some lack of understanding on the part of the perpetrator, but it would be an error to assume that it's all BS because of the *67 part. People misunderstand many things and a criminal usually gets nabbed when they get lazy. (a la, returning to the scene of the crime, because it worked so good the last time.) Clever in some ways, stupid in others.

    --

  • by Dr. Awktagon ( 233360 ) on Thursday March 29, 2001 @12:58PM (#329567) Homepage

    Either dinner was really short, or something else was.

    Nah, she charged by the hour and he didn't want to run up the cc bill too high.

  • I notice one thing from this fake article. MSNBC bashing their biggest internet rival, AOL. well at least bashing their users.
  • by Nucky ( 248447 ) on Thursday March 29, 2001 @12:31PM (#329580)
    Come on, if this were real, it would look more like this:

    11:00AM: I just woke up. Apparently I fell asleep while loading slashdot. I reload again.

    11:01AM: Reload slashdot. I have a script to reload slashdot for me. I'll be sure to get "First Post" today!

    11:02AM: Reload slashdot.

    11:03AM: Reload slashdot.

    11:04AM: Reload slashdot.

    ...

  • by cmowire ( 254489 ) on Thursday March 29, 2001 @11:54AM (#329582) Homepage
    If that article is, in fact, true (I have some doubts about the veracity of it)...

    Obviously, straightforward scams like getting AOL accounts and cc numbers are much more productive than stupid pyramic schemes. ;)
  • by jamtz ( 254744 ) on Thursday March 29, 2001 @03:39PM (#329583)
    Did anyone else notice that bad guy #1 only spent 2 hours at his girlfriend's place for dinner? Not much time...

    Wouldn't it be because he is supposed to be a great hacker-geek who also has a girlfriend, something NOT seen in real life?
    In real world, Mr. Hacker would be having dinner with his old granny, tops...

  • by Anoriymous Coward ( 257749 ) on Thursday March 29, 2001 @12:01PM (#329584) Journal
    And he was back by 7:50pm. Either dinner was really short, or something else was.

    --
  • by Shoten ( 260439 ) on Thursday March 29, 2001 @12:37PM (#329588)
    Oh, there's a lot more to it than that...I simply cannot believe how many things in this story make no sense. For starters, here's where I think thing really went wrong at first:

    OK, some guy on Efnet (an Internet chat area) told me last night he would Western Union me $250 if I wrote a diary of one of my typical days and e-mailed it to him in .doc format.

    Okay...anyone who knows IRC knows what insano things that posers will say in channels. Enough said, just someone say it to a reporter before he does this sort of story again?

    He was too stupid to be a Fed.

    Ok...maybe that one is credible. If I were a journalist doing a story on something that gets as technical as this topic, I'd have someone backing me up who can smell the difference between truth and what these guys are dishing out.

    ...through an untraceable NetZero account. I use www.anonymizer.com to go to the Yahoo account because I'm paranoid. Hell if anyone's going to get my IP (Internet address). Screw the Feds, they are lazy they won't trace me back that far. Plus I got *67 on, they'll need subpoenas to, and a ton of tracing to even get close to me.

    Um...ok...I don't follow that NetZero is untraceable because it is free. And if he knows it's untraceable, why use anonymizer? Or try to hide his number from logging systems by using *67 (which won't work, btw)? And he talks as though subpoenas are hard to get...fact is, getting a subpoena for a phone number is a piece of cake. All you need to do is file a "John Doe" lawsuit and request an expedited subpoena. The ISP will gladly turn over the information...they have entire departments just for this purpose usually.

    By then I'll have a new number. Hell, I go through telephone lines about one every 2-3 months.

    Um...dude? Word of warning...the phone companies keep their records longer than that...some of them actually remember your address for upwards of 4 or even as many as 5 or 6 months...amazing huh?

    At that point I started tuning out. These guys supposedly are pulling in thousands a month in fraud, yet somehow they have managed to elude capture despite the incredible numbers of mistakes they make in covering up their tracks? This is ludicrous...but the biggest scam is the fact that a reporter got a great story that even got slashdotted, for $250. Too bad it's all lies...it looks as though these two losers really ended up scamming even more people than they claim to.
  • by deran9ed ( 300694 ) on Thursday March 29, 2001 @12:07PM (#329592) Homepage
    11:03 a.m. Open up one of my new Yahoo accounts through an untraceable NetZero account.

    Uh... And how do you suppose your gonna dial into it?

    I use www.anonymizer.com to go to the Yahoo account because I'm paranoid. Hell if anyone's going to get my IP (Internet address). Screw the Feds, they are lazy they won't trace me back that far.

    Uh... subpoena Anonymizer for logs (by law they have to keep them) then timestamp the occurances...

    Plus I got *67 on, they'll need subpoenas to, and a ton of tracing to even get close to me. By then I'll have a new number. Hell, I go through telephone lines about one every 2-3 months.

    Uhh... No matter how many times you change your number, there is always a record

    If I'm super paranoid, I skip Anonymizer and hack me a Wingate. Then the Feds will trace back to one of the lamers' home computers not mine ;) LOL! Basically if I use a Wingate they can't track me at all! I should use gates more often ;( Hell I'm getting almost as lazy as a Fed. Ha!

    Boy is this moron sure dumb

    Seems to me like the only thing he "hacked" was some dumb ass reported who was an ass enough to get conned into thinking this e-tard was anyone special or had any talent other than bullshitting.

    The media is going ballistic on "hacker" cases these past few months, and I'm starting to think they should be held accountable for promoting this activity, especially when you pay someone to do this (basically).

    The media has totally bastardized hacking and those in the computer security field like the hackers at companies like @stake, Neohapsis.com, etc, end up getting bad reputations from morons like this. Its a shame to think people actually pay mind to idiots like this often casting dark shadows on to those that "hack" for just cause, such as fixing issues, e.g., Rain Forest Puppy [antioffline.com], DugSong [antioffline.com], obecian [antioffline.com], etc..

    Stupid news [antioffline.com]
  • by deran9ed ( 300694 ) on Thursday March 29, 2001 @12:56PM (#329593) Homepage
    Part 1: A School Day

    7:20am: Elite hax0r wakes up to prepare for another challenging day of 7th grade.
    7:25: Elite hax0r signs onto AOL (computer is never turned off)
    7:30: Elite hax0r checks new mail for elite hacking progs and warez
    7:40: After 10 minutes of chatting in with the folks in leet, elite hax0r's mom takes the telephone off the hook.
    7:55: m0m and elite hax0r are having an argument about wasted time online.
    8:00: elite hax0r's dad drops him off at Mitnick Middle School
    8:05: elite hax0r enters typing class. this is his elite hacking playground, and he loves to confuse the teacher by pressing num lock, and shouting '3y3 hax0red j00!!!'
    9:00: typing class is over, and elite hax0r travels to his history class. No 'puters here, so, he strategically places his copy of 2600 inside his history book and memorizes the 'how to steal stuff' article.
    9:30: history teacher catches elite hax0r with the clandestine 2600 and takes it away from him. elite hax0r begins a heart-wrenching speel about freedom of speech, and his right as a citizen of this country to read his elite 2600 whenever he pleases. he compares this atrocity to the unjust imprisonment of hax0rs everywhere, and takes comfort in his martyrdom. leet is definitely hearing about this tonight.
    10:05: elite hax0r goes to english.
    10:50: elite hax0r goes to lunch period. here, he sits with his class in the cafeteria and takes his usual spot near the lunchlady's cashregister so he can write down people's lunch numbers. This comes in handy, as they could possibly use their lunch number as their AOL password. And if not, its always really leet to have even the most insignificant 1nph0z.
    11:25: elite hax0r goes to pre algebra. today, he makes the kid in the desk next to him ph33r when he types 1134 on the calculator and holds it upside down. he wonders if this is similar to hacking an LED sign like in 2600..?
    12:15: elite hax0r goes to science class where he learns about the reproductive system. elite hax0r excuses himself from class where he performs a quick wetware hack.
    1:30: elite hax0r gathers his books and stands in front of the school
    1:35: elite hax0r is picked up by the small yellow bus with the power lift on the back.
    2:00: elite hax0r is dropped off at home, and he rushes inside to sign on and check his mail.
    2:30: after 30 minutes online, elite hax0r is forced to sign off and take a nap. Ms. Hax0r cant have her baby getting cranky.
    4:45: elite hax0r wakes up, and begins writing his manifesto, which he plans to present to his history teacher tomorrow.
    4:47: elite hax0r gets tired of writing and feels like going outside. he and his little brother ride their bikes around in circles in the carport.
    5:15: Ms. Hax0r calls the children inside for dinner.
    6:00: hax0r children finish dinner, and elite hax0r asks for permission to get online and hack some stuff.
    6:05: elite hax0r battles AOL's perpetual busy signal; its probably just a ploy by AOL to block him from coming online, in ph33r he might hax0r their network.
    7:05: elite hax0r continues to hax0r away at AOL's "busy signal"
    7:30: finally, elite hax0r crax0rs the busy signal and sneaks his way inside. He checks his mail for leet progs and tries to enter pr 'leet'. But, in another attempt by AOL to bring him down, the room is full (its really just their $3cur1ty 3xp3rt$ trying to keep him out).
    7:40: elite hax0r finally busts into 'leet' in 137 tries. he chats with his homies.
    8:00: elite hax0r is still chatting with the leets, when Ms. Hax0r picks up the fux0ring telephone and signs him offline.
    8:35: after 20 minutes of crax0ring the "busy signal", in an angered retalliation attempt, elite hax0r steals mom's credit cards and scrolls them in 'leet' and 'phreak'.
    9:00: elite hax0r finally finishes scrolling, and takes some time to work on his webpage; http://members.aol.com/Leethax0r/index.html. Here, he posts his new hax0r's manifesto, and lists $houtoutZ to his homies in 'leet' and 'punt', and his main chix0r Annie.
    10:00: after an hour of figuring out how to use the AOL webpage software, he grows tired of all this brain work, and signs offline.
    10:25: leet hax0r brushes his teeth,puts on his kevin mitnick pajamas, and goes to sleep.
    11:00: leet hax0r dreams that he is Dade Murphy, and that he is having wild sex0r with Acid Burn, while hacking the FBI's Main Gibson.

    Stupid News [antioffline.com]
  • by chathamhouse ( 302679 ) on Thursday March 29, 2001 @01:53PM (#329594) Homepage
    "Screw the Feds, they are lazy they won't trace me back that far. Plus I got *67 on, they'll need subpoenas to, and a ton of tracing to even get close to me."

    I'm pretty sure *67 doesn't work on some ISDN/PRI Lines (which many ISP's used). I know for a fact it didn't work at a local ISP here (I tested it personally).

    The "hacker/cracker/bad guy's" comment made me laugh uncontrollably for a few minutes. Having recovered from the initial shock at the stupidity of his comment, I'll share a bit of info as to how hard one would have to dig to find out who he was, or at least where he was calling from:

    Note: I work for a national telco/isp, the combination of which greatly helps this process.

    1. Find just one of spam boy's emails originating from his "phished" account. The message's headers will be more than pleased to provide you with time stamps.

    2. Take the time stamps and userid, and compare them to the logs in the authentication servers (tacacs or radius, normally). These logs should, unless morons setup the system, indicate which NAS (network access server, the box you dial into) was used to logon to the ISP. The NAS should have sent a string to a syslog with connection speed (upstream/downstream), dialed number, and originating number.

    3. You *will* have the originating number even if *67 was used. This is because *67 is a feature set for end users which can be disabled/masked, whereas the originating number received on an ISDN PRI has been provided by SS7 signaling, and is mandatory to the system's proper functionning.

    4. With the originating number, the local telco will provide the line's physical address. This is assuming that a police officer/investigator/detective makes the request. Of course, there are many free number-to-address directories on the net that could provide this data.

    5. All of the above requires about a day, depending on the size of the log files that have to be searched through, and the short delay in getting info from local telcos (they do move quickly if the right person asks).

    All this to say that if these guys are getting away with their crimes for the time being, good for them. However, some "cyber crime" unit will eventually do a sweep, grab all of the above info for a bunch of small time operators in a given city, and shut them down. Yee-haw.

    Did anyone else notice that bad guy #1 only spent 2 hours at his girlfriend's place for dinner? Not much time...

  • by banuaba ( 308937 ) <drbork@@@hotmail...com> on Thursday March 29, 2001 @01:32PM (#329602)
    Here is the text of an email I sent to the author of this article. I just copied and pasted from my email window before sending, so please excuse any spelling errors. And the formatting sucks. But, if anybody has any feedback, I'd love to hear it. Or anything to suggest to him if he emails me back.

    Bob--
    I read your article located at http://www.msnbc.com/news/550567.asp and I found some things that I disagreed and thought that I would share my ideas with you. I am basing my statements from both my personal knowledge and a thread at /., a 'News for Nerds' website. The thread can be found at: http://slashdot.org/article.pl?sid=01/03/29/163624 0&mode=nested .

    Firstly, I'd like to quibble some semantics with you. These kids are not 'hackers', they are 'crackers'. A hacker wears a white hat. The crackers wear a black hat. As far as that goes, these kids are not even crackers, they are spammers and thieves. They do not bypass system security in any way, they do not have to show any cleverness. Speaking of clever, you say "clever teen-agers, so called "script kiddies" Script kiddies are not clever. That is the point of the term. They use scripts that were formatted by someone who possessed skill and they just run them. This is not clever, it is, to use thier lingo ' 74m3' (lame).

    Secondly, I think that you were had. I think that these were just a couple of bored guys on EFnet who decided to see how much money they could leach from 'the man'. If they are, in fact, making $100k+ a year or anything even close to that (which I doubt), why would they risk jail for a measly 250 bucks? There are, as noted on slashdot, numerous errors and inconsistencies which I won't go into here.

    Thirdly, unless you knew this story was false, it seems like you were subsidizing criminal activity by paying these children to steal cc numbers; which is, last time I checked, illegal. A way your article could have helped people, instead of just making AOL users paranoid is to have explained what it was these people were doing and how to know to be suspicious. You could have made a sidebar of the major free e-mail providers and free webspace providers (geocities, yahoo, hotmail, e-mail.com, freeyellow, juno, ad infinitum) and explained how easy it is to get multiple emails/webpages from them. Also, did you do any validation of this story? I could have written a diary for you that would have been written better and more technically accurate. And you could have sent me a check at home instead of bothering with the Western Union subterfuge.

    If you would like to contact me, feel free to do so by any of the information listed below.

    Brant Pierce
    512-xxx-2732
    brant.pierce@xxxxxxxx.com
    Numeric Paging: 888-536-7251
    Text Paging: 5367251@skytel.com
    ----
    This letter represents the opinions of Brant Pierce. It does not represent the views or opinions of xxxxxxxxx Communications, Inc. or any of its subsidiaries.
    Brant
  • by TechnoGrl ( 322690 ) on Thursday March 29, 2001 @12:44PM (#329613)
    It must be true- I saw it on the Internet! In the midst of a growing government PR campaign to demonize those with a bit of knowledge and to reduce the abilities of the rest of us to access information (all in the name of protecting our children from porn of course) comes this wonderful piece of fluff from MSNBC. I mean if you can't trust the combined corporate integreties of Microsoft and General Electric corporation well then - I mean who can you trust? Bob Sullivan, the article's author, is a corporate tool who has brought us such notable articles as: "Now, e-mail is even more dangerous", "'Melissa' Continues To Wreak Havoc" and (who could forget) "Surgeon general of the Web? - The eruption of a new virus leads to confusion" Can you say agenda? I knew that you could? The article about the alledged hackers smells worse then a Unix geek on a three day coding binge - I don't believe a bit of it. Wonderful piece of fiction though. Want to find out how and why this kind of crap gets passed off as "news"? Check out these articles about cia partnership with our national news media: http://www.mprofaca.cro.net/ciapress1.html http://www.whatreallyhappened.com/RANCHO/POLITICS/ MOCK/mockingbird.html

Without life, Biology itself would be impossible.

Working...