Largest Hacking Scam in Canadian History 211
vieux schnock writes "Police raided several homes across Quebec on Wednesday and arrested 16 people in their investigation, which they say uncovered the largest hacking scam in Canadian history. (...) The hackers collaborated online to attack and take control of as many as one million computers around the world that were not equipped with anti-virus software or firewalls."
Really? (Score:2, Funny)
Re:Really? (Score:5, Funny)
Re: (Score:2)
Re: (Score:2, Funny)
Long live idiots, for without them, being smart means nothing, and pays less.
Re: (Score:3, Funny)
Re:Really? (Score:5, Informative)
That doesn't even address the vector of replacing the setup.exe (or equivalent) on, say, an Office 2003 cd posted on thepiratebay. Obviously, the install has to run as admin, so you pretty much know, you are a shoe in for a compromised machine for anyone who tries to install it. And again, it would be such a trivial, simple application, that you could change the attacking binary pretty much at will.
Re:Really? (Score:4, Insightful)
To make matters worse, some attacks may even occur if you are dealing with safe file types, like a PNG [microsoft.com] or even PDF [softpedia.com]. Some security problems exist due to the user's ignorance or idiocy but "some" isn't exactly the same thing as "all".
Re:Really? (Score:5, Interesting)
There are no safe file types. All files can be viewed as programs meant to run in a specialized virtual machine (the program which is used to open them). For example, a PNG file is a program which, when run, will compute an array of bytes (the image pixels). The same goes to PDF. In this view, since all files are programs, it is in principle possible that any of them could contain code which can result in unexpected behavior of the virtual machine executing them.
Of course some file types are easier to compromize than others, either due to sheer complexity or ambiguity of the specification or because they are Turing complete. However, it is impossible to guarantee that every viewer for any file type is free of defects. Anyone still remember ANSI codes for DOS, which could be embedded to text to change color but also to set macros to keyboard keys when the file was viewed ? And of course SQL injection attacks are based on formatting a text string so it will cause unexpected results, not to mention causing a buffer overflow with an overlong string.
I repeat: there are no safe file types. They all have a potential to contain malicious code, because there is no such thing as data which is not also a program. From a certain point of view, GIMP is simply a very specialized compiler...
Re:Really? (Score:5, Interesting)
It can be. For example:
'; ROLLBACK; UPDATE users SET admin = true WHERE username = 'ultranova'; 'If the virtual machine which handles the username field of Slashdot login form naively passed this string to the database layer without specifically quoting it, this text string would make my account an admin account; well, actually, since I haven't studied Slashdcode, it propably wouldn't, but the point still stands: even text is not an inherently safe data format in all circumstances.
The virtual machine in this case would be whatever program receives the input. And yes, the text you type is indeed a program being executed by that machine; each time it receives a keypress from you, that keypress instructs it to do something, right ? Even if that something is merely to output the letter (altought a text editor would also store the input internally, of course). And that is what a program is: a list of instructions.
It isn't.
Re: (Score:2)
No, but whatever program is running on the processor and interpreting the data will. SQL database, Python interpreter, Mozilla... all of these
Re:Really? (Score:4, Informative)
Why stop there? Most of the Windows OS torrents are slipstreamed. There's no reason to assume they didn't slipstream a few viruses, bots, and backdoors in there too.
Re: (Score:3, Informative)
Re:Really? (Score:5, Insightful)
The average user cannot tell there is a difference - because the Windows default is to hide the extension!
It may be criminally insane, but its the default.
Re: (Score:2)
Re: (Score:2)
To the extent Windows reliance on extensions actually works. What's one to do with greetingcard.exe.pdf, to say nothing of more creative variations on the file naming scheme, or similar URL mechanisms in the context of an email client?
Add to the equation that it would be highly unusual if the majority of files on a typical user's hard driver weren't cr
Re: (Score:2, Insightful)
The average user cannot tell there is a difference - because the Windows default is to hide the extension!
It may be criminally insane, but its the default.
That's one that's driven me crazy for years. I'm sure it goes back to early days of Windows and their attempt to look more like Mac OS 9 (which got the file type info from the resource fork). Any time I do something for anyone on their Windows machine and the extensions are hidden I just change the setting...I don't even ask if that's what they want.
Who else here has ever been trying to walk someone though a software install over the phone and said "Now double click 'Setup'"...and they respond "which one
Re: (Score:2)
It's also the default behavior for OS X.
You can check out any time you like, you just can never leave.
Re: (Score:2, Funny)
Thank god I do. I would much rather have the malware ridden U2-SomeSong.exe than an actual MP3 by U2. That would just be awful.
Re: (Score:2)
Re: (Score:3, Interesting)
Yes, I'd believe those numbers.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
so yes, there are more than 1 million PCs without Working firewalls, or working anti-virus.
You're kidding, right? (Re:Really?) (Score:2)
Here I was, planning to mod this discussion, but I can't believe what you just wrote.
You're kidding, right?
Please, tell me you are kidding!
Why in the name of GFSM or whatever deity you care to insert would anyone in their right mind do or propose this? It boggles my mind since what you propose is already [grisoft.com]
You just know it'll be disappointing.. (Score:1, Troll)
Spot the key words (Score:5, Insightful)
Re:Spot the key words (Score:5, Insightful)
Alternatively they probably have a pretty good idea of the ranges involved, but hey, high numbers make a better press release.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
Except that a good botnet doesn't have to have machines talking to each other. Each comprom
Re: (Score:2)
Why would you instruct them all yourself ? Send the instruction into 10 machines (or even a single one). They each send it to ten other machines, they each to 10 and so on. While some machines will of course receive the same instruction twice, it still won't take long to cascade the instruction through the network.
Re: (Score:2)
Obligatory: (Score:5, Funny)
From TFA: (Score:2, Funny)
Surely they must mean unauthorized use of other people's computers?
Re:From TFA: (Score:5, Insightful)
Then again, in today's climate, maybe not...
Re:From TFA: (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Hardly the first time Canada has caused problems (Score:5, Funny)
Re:Hardly the first time Canada has caused problem (Score:2)
If you REALLY want to hit Canada where it hurts you need to bring up Celine Dion.
Of course they will DENY, DENY, DENY
Urgh, I feel dirty for just bringing it up
Re:Hardly the first time Canada has caused problem (Score:5, Funny)
Re: (Score:2)
Re:Hardly the first time Canada has caused problem (Score:2)
Re: (Score:2)
Re: (Score:2)
Perhaps I'm showing my age, but I find that somewhat disturbing [ycdtotv.com].
Re: (Score:2)
(For the record I have always thought she was nothing special to look at, and neither was her music.)
Re: (Score:2)
Re: (Score:2)
Profitable (Score:2)
1) Go to prison for some short time.
2)Then dived 45 million dollars Canadian (now worth more than the US green back... but what isn't these days) by 16.
3) Profit
This time we can fill in the blank(s).
Re:Profitable (Score:4, Funny)
Sounds like advertising. (Score:2, Insightful)
Eh? (Score:3, Funny)
That summary needs fixing. (Score:4, Insightful)
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2, Informative)
After all, what they were sold is good enough, right? They didn't exactly buy the "turn your computer into a botnet zombie" feature (bad jokes featuring MS aside). They still expect companies to have integrity, and to make products that actually work, and that don't explode when you tu
Re: (Score:3, Insightful)
All but the fanciest grocery stores will have expired stuff on the shelves if you look well enough. You have to be selective in what food you pick, make sure to read the exp
Haha (Score:5, Informative)
Wouldn't you say the RCMP is just hunting down script kiddies?
Re:Haha (Score:4, Informative)
I used to hang out in chat rooms with guys who were developing their own exploits in C on netBSD machines they set up on their own, etc. etc.. (mid to late 90s).. They were all in their late teens, average of around 17 or 18 years old, no joke. There were a couple guys in college who were 20 or 21 or so, but really, the teens and early 20s is pretty much the prime time to delve into 'questionable' types of endeavours in the high-tech realm.
Oh, by the way, for a little personal anecdote, I cracked/hacked/obtained/whatever the admin password for our Mac lab in my elementary school when I was 9 years old, in grade 3 or 4 (and got banned from the lab for a while of course). Then again, I used utils I found on the net (a keylogger IIRC), but I still think that required a lot more knowledge and investigation than most 9 year olds are willing to pursue. Actually, I created a custom HyperCard stack that let me execute any program I had on a floppy disk - it just had to match the same type/creator code as any of the programs that were available in At Ease. That's pure hack-mindedness at work, and no outside help was consulted.
Re: (Score:2)
Crackers, not hackers (EOM) (Score:2)
Re: (Score:2)
Re: (Score:2)
Or was that the other way around? I forget now.
The Unwritten Story... (Score:5, Funny)
Re: (Score:2)
Quebec is NOT a bilingual province, the only official language is French. New Brunswick [wikipedia.org] is the only constitutionally bilingual province.
Check out the very recent bruhaha caused by an Irish Pub in Montreal having Guinness posters on the wall that didn't have French on them [canada.com]. I'm a anglophone born and raised in Montreal, who has since moved down
Re: (Score:2)
Re: (Score:2)
Quebec's Bill 22 of '74 and of course Bill 101 of '77 state Quebec's official language as French, and the Canadian Charter of Rights and Freedoms states that New Brunswick is bilingual. Ontario has the French Language Services Act, stating provincial services are to be available in the parts of Ontario where there is a large French-speaking population, as well as legislation declaring French an official langu
Re: (Score:2)
Outdated security setups? (Score:2)
How about outdated software/updates (e.g., virus definitions)? What are the statistics for those?
Canadian Prisons (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
There's a couple prisons just outside of Winnipeg. That's pretty much the middle of nowhere. As cold as Siberia and nowhere to run to except Regina.
More Canadian Ripping... (Score:2)
Props to Weird Al!
Prison...really? (Score:2, Insightful)
The people who got hacked are facing a maximum of 10 years in prison but with Québec's system, they really do 1/6 of this time so it's not that bad..
The "$45 million" profit claim is highly unlikely (Score:4, Interesting)
Most of the large-scale botnet scams I've heard of don't yield anywhere near that kind of money. The botnet operators maybe pull down $3-10,000 a month renting out the botnets. Even large-scale identify theft rings are reaching for anything like $45 million.
Unless these guys were targeting rich people, I don't see it. And since most of the alleged compromised computers were in South America, I doubt they hit a lot of rich people.
Why not? (Score:2)
> I doubt they hit a lot of rich people.
How is the location of the hijacked PC hosting the fake website relevant?
The people that respond to phishing attempts don't have to reside in the same country where the hijacked PC that hosts the fake site does. The aim of the phishers is that the fake site, the attacker and the victim would be in different jurisdictions.
Anyway, I've seen an Israeli financial services advertise services
Re: (Score:2)
My point was that every botnet operation I've heard of wasn't making $45 million in revenue. As much as several million perhaps, for the largest botnet operations I've read about. But no where near $45 million.
It's much more likely that the police were overestimating - particularly because of all the reasons you cite why it would be hard to prove who did what.
If the cops find $45 million worth of bank assets or records indicating that much revenue went through th
Re: (Score:3)
Still recommend to install more than the paper tiger at the gate if you get that chance, but, anything is better than nothing for most users yes? If they mean hardware firewalls, I know very few home users that have one...
Re: (Score:2)
Re: (Score:2)
So... take away her admin account?
It's kinda unfair to expect you to keep fixing her computer when she keeps uninstalling the firewall.
Re:So which is it? (Score:5, Funny)
Re: (Score:2)
Re:So which is it? (Score:5, Insightful)
16 people were arrested.
14 of those 16 were arrested on Wednesday.
Re: (Score:2)
I read this as the investigation led to raids on Wednesday that led to 14 arrests. Two others were likely arrested before those raids but still as a result of the same investigation.
Re: (Score:2)
Is it really that much of a mental leap to conclude the other 2 suspects were not between the ages of 17 and 26?
Re: (Score:2)
But then the article would have phrased it as something like "14 of the suspects arrested Wednesday are between the ages of 17 and 26". Since it started off as "The 14 suspects arrested..." means that 14 suspects were arrested and the modifier "are between the ages..." applies to all of those arrested.
Re: (Score:2)
Re: (Score:2)
The actual sentence from the article is this:
"The 14 suspects arrested Wednesday are between the ages of 17 and 26, and face charges related to the unauthorized use of computers."
What's confusing about that? 14 suspects were arrested on Wednesday. They were all between the ages of 17 and 26. They all face charges related to unauthorized use of computers. Simply adding "All of" to the beginning of that s
Re: (Score:2)
Re: (Score:2, Funny)
there. fixed it for you.
Good job demonstrating that it's the English who are the stupid ones.
Re: (Score:3, Funny)
Re: (Score:2)
H33Z 4 S00P3R H4X0R! (Score:2)
Re: (Score:2)
Not enough coffee again. (Score:5, Funny)
I read it as Moderators ...
For one brief second, I thought there was real justice Up There.
Time to crank the espresso machine up again.
Re: (Score:2)