• If you would like to get your account Verified, read this thread
  • Check out Tickling.com - the most innovative tickling site of the year.
  • The TMF is sponsored by Clips4sale - By supporting them, you're supporting us.
  • >>> If you cannot get into your account email me at [email protected] <<<
    Don't forget to include your username

SECURITY WARNING...NOT a joke or hoax!

TicklingDuo

3rd Level Yellow Feather
Joined
Oct 23, 2001
Messages
3,733
Points
0
After about two months of e-mail bombs and thousands of attempts to intrude into my system, I went out and got Norton Internet Security. We were very pleased when we found and rid ourselves of 3 viruses that the regular norton software hadn't caught and were able to block all sorts of spyware and other attempts at intrusions...over 2,000 attempts in just a couple hours.

Then, suddenly, last night...everything went on us. We couldn't get into any of our homepages, e-mail accounts, etc. When we pulled up Norton, it had been shut down and was not letting us back in without a password...something we hadn't set up. Apparently, whoever the hacker/virus sender is knows enough about systems to turn the very program that's meant to protect us into a weapon to be used against us. We are still unable to access mail normally. We're having to use my in-laws computer for much of our activity.

I share this on here because we are not the only ones in the community who are under attack. I've spoken with a number of others as well. I don't know if it's someone attacking us because we're members of the community, or if it's just random. But, the pattern makes it appear to be an attack on the community. So, keep your guards up and watch out for suspicious mail and other activity. If anyone gets an e-mail claiming to be from me, delete it! I'm not planning to send any mail to ANYONE until we're sure we're clean.

I won't be around much until this gets resolved. It's also making the updates to our site get delayed again. We didn't want to chance uploading infected files. So, we've trashed everything and are going to start from scratch. The site is still there. But, the updates will likely now have to wait until at least the end of the month, if not into June.

If whoever the hacker is happens to be reading this...We WILL track you down and press charges!

Ann
 
Firewalls....

...security is a big issue, and should be a constant concern for every user, especialy those of you who have websites and such. Your first line of defense should be a firewall...

All internet communication is accomplished by the exchange of individual "packets" of data. Each packet is transmitted by its source machine toward its destination machine. Packets are the fundamental unit of information flow across the Internet. Even though we refer to "connections" between computers, this "connection" is actually comprised of individual packets travelling between those two "connected" machines. Essentially, they "agree" that they're connected and each machine sends back "acknowledgement packets" to let the sending machine know that the data was received.

In order to reach its destination — whether it's another computer two feet away or two continents distant — every Internet packet must contain a destination address and port number. And, so that the receiving computer knows who sent the packet, every packet must also contain the IP address and a port number of the originating machine. In other words, any packet travelling the net contains — first and foremost — its complete source and destination addresses. An IP address always identifies a single machine on the Internet and the port is associated with a particular service or conversation happening on the machine.


Look what this means! . . .

Since the firewall software inspects each and every packet of data as it arrives at your computer — BEFORE it's seen by any other software running within your computer — the firewall has total veto power over your computer's receipt of anything from the Internet.
A TCP/IP port is only "open" on your computer if the first arriving packet which requests the establishment of a connection is answered by your computer. If the arriving packet is simply ignored, that port of your computer will effectively disappear from the Internet. No one and nothing can connect to it!

But the real power of a firewall is derived from its ability to be selective about what it lets through and what it blocks. Since every arriving packet must contain the correct IP address of the sender's machine, (in order for the receiver to send back a receipt acknowledgement) the firewall can be selective about which packets are admitted and which are dropped. It can "filter" the arriving packets based upon any combination of the originating machine's IP address and port and the destination machine's IP address and port.

So, for example, if you were running a web server and needed to allow remote machines to connect to your machine on port 80 (http), the firewall could inspect every arriving packet and only permit connection initiation on your port 80. New connections would be denied on all other ports. Even if your system were to inadvertently pick up a Trojan horse program which opened a Trojan listening port to the outside world, no passing Trojan scanner could detect or know of the Trojan's existence since all attempts to contact the Trojan inside your computer would be blocked by the firewall!

Or suppose that you wish to create a secure "tunnel" across the Internet to allow your home and office computers to share their files without any danger of unauthorized intrusion. Firewall technology makes this possible and relatively simple. You would instruct the firewall running on your office computer to permit connections on the NetBIOS file sharing ports 137-139 only from the IP address of your home computer. The firewall running on your home machine would similarly be instructed to permit connections on ports 137-139 only from your office machine's IP address. Thus, either machine can "see" the other's NetBIOS ports, but no one else on the Internet can see that either machine has established such a secure tunnel across the Net.

But what about you originating your own connections to other machines on the Internet? For example, when you surf the web you need to connect to web servers that might have any IP address. You wouldn't want all those to be blocked just because you want to block everyone from getting into your machine. It turns out that this is easy for a firewall too. Since each end of an Internet connection is always acknowledging the other end's data, every packet that flows between the two machines has a bit set in it called the "ACK" bit. This bit says that the packet is acknowledging the receipt of all previous data. But this means that only the very first packet which initiates a new connection would NOT be acknowledging any previous data from the other machine. In other words, a firewall can easily determine whether an arriving packet is initiating a new connection, or continuing an existing conversation. Packets arriving as part of an established connection would be allowed to pass through the firewall, but packets representing new connection attempts would be discarded. Thus, a firewall can permit the establishment of outbound connections while blocking any new connection attempts from the outside.

Another example of the power of a high-quality firewall is "application level" filtering and response: Most firewalls do pretty much what I've explained above, and this affords tremendous protection. But they don't attempt to "understand" the data in the packets they're admitting or blocking. Their "permit" or "deny" decisions are only based upon the source and destination addresses. But an "application level" firewall involves itself in the actual dialog taking place. For example, we've seen that one of the biggest problems with Microsoft's file and printer sharing is its lack of ability to prevent password crackers from pounding away on a password until it's broken. But an intelligent application level firewall can monitor what's happening on port 139 (where password protection occurs) and step in to completely block an offending remote computer! It can automatically "black list" the originating IP address to completely prevent any and all future access from that outsider.

Most firewalls cost under $50...a bargain as Ann & Drew can now attest when faced with the frustration and anger that getting hacked can generate.... Good luck getting back up, btw, guys... Q
 
Thanks for the tutorial Q! Too bad we didn't know about this before. We had 3...that's right THREE software firewalls up along with the antivirus, etc. when they hacked us last night. We just went out and got an external one. But, we still have to totally wipe and reformat our entire system.

Whoever this jerk is, I want to kick his butt from here to China...and back! Well....maybe only half way back. We'll drown the SOB in the ocean on the way!

Ann
(thankful for friends and relatives with computers)
 
sorry to hear about your problems ann,if it`s any consolation you`re not the only ones who seem to be getting targeted,in the last 8 days i`ve accumulated 5 variants of the klez virus in the quarantine section of my norton av,which have all arrived via e-mail.as my e-mail addy is only posted on tickling sites,mainly yahoo,i suspect you`re correct in speculating about the community being targeted as i can`t believe this is random bad luck,i`d strongly suggest that any un-protected surfers take qjakals advice !!😡 😡 😡 😡 😡 😡
 
Tracing...

Not worth the effort Ann...concentrate your resources on playing "D"...any hacker worth his/her salt would have covered their info using any of about 3 different methods, none of which are going to be discussed by me here...continue upgrading and "walling" yourself off...you're on the right track. Once bitten...etc. Q
 
Packet Shapers

I have heard a lot of good things from a company called Packeteer in Cupertino that makes packet shapers for data transfer. If you are running a network at home you might want to visit their website (I believe it is www.packateer.com) and look into it.

I know that the Israeli military buys them as well as a lot of companies and universities which can be inundated with such nasty viral data.

It also helps speed up data transfer rates.
 
a good firewall is zonealarm..i use it..i have tested my system and nothing gets in or out that i dont authorize..plus it gives you an option to shut the internet off immeadiately by clicking one button. the version i have also checks emails for script attatchments..and it has a free edition.

http://www.zonealarm.com/
 
Re: Tracing...

qjakal said:
Not worth the effort Ann...concentrate your resources on playing "D"...any hacker worth his/her salt would have covered their info using any of about 3 different methods, none of which are going to be discussed by me here...continue upgrading and "walling" yourself off...you're on the right track. Once bitten...etc. Q

Disagree with tracing being a waste of time ..already got a line on an aol hacker as we speak......


Ven
 
Yup, I got nailed by the Klez virus too. Just spent an hour scrubbing my damn system clean of it :Grrr: The worst part is that it wasn't even my fault. I NEVER, repeat NEVER open attachments unless I am expecting it. But I got this virus from an exploited security hole in Outlook 2000. I went right to MS's web site, and they naturally proclaimed it couldn't possibly be their fault 🙄 got the patch, and now my system is theoretically clean.

On another note, I'm guessing the virus originated from someone for which English is definitely not a native tongue. They were babbling something about "if AV monitor starts crying, click continue button for great justice!"

(ok I made the last three words up...but the part about the anti virus software crying isn't made up. And, despite the fact I found out I had a virus, that note made me laugh out loud)
 
Hacker vs schmoe...

Disagree with tracing being a waste of time ..already got a line on an aol hacker as we speak......

Then its not a hacker Ven..it's a kid who went to one of the all too many websites that promote crap like this and read enough to be able to launch an attack...if you were hit by a true hacker you'd be stonewalled already. Here's an excerpt from a recent article in one of the trade journals for Security/Network work:
-------------------------------------------------------------
"Although the word "hacking" originally refers to acts requiring great skill and knowledge of computer systems, it has by now become almost synonymous with illegal activities like breaking into protected computer systems, releasing viruses, stealing passwords or other sensitive data, denial of service and so on. Many of these activities require a certain amount of skill and knowledge and so could be seen as hacking in the traditional sense, but the motives involved are quite different.

Also, a large number of today's "hackers" do nothing more than running publicly available programs ("scripts") that automate attempts to break into systems. While easily defeated on a one-to-one basis, the sheer number of such "script kiddies" makes them a very real threat."
------------------------------------------------

Anyway, if you DO "find" him/her, what are you planning to do about it, btw? After verifying that this is the actual attacker and not just an innocent IP addy being used to mask the attack, of course? Have you investigated the legal recourse available to you ? :wow: Q
 
Last edited:
This is some eye opening info! Let a caveman like me make an
inquiry...If I contract a virus say....days or hours before I shut my system down to move to a new locale, when I fire up the p.c. at my new locale does the virus continue? And I'm assuming my p.c. can spread it to others!

Very sorry to hear about the crap some of you are going thru!

Tact
 
time vs location...

Yup...the virus is contained in your computer/ HD...doesn't matter where you move it to...other than the junkyard...lol. Do yourself a favor and get an anti-virus program at the very LEAST. Q
 
Q..Basically Aol has said that if it's an aol user, they will prosecute (along with seeing that that IP no longer has aol access)
They restored my ftps within minutes so nothing was lost.

We like Ann have been atttacked by a hacker, but have the firewall protection. They have been trying to send a trojan horse to become resident in our system. 2 different but similiar IP are being traced and I did my own trace the first time we were hit and almost managed to access the hackers system through one of his ports before his protection knocked me out. I have 2 close friends (one of whom does net security for a living) working on breaking this person. I will let you know how successful they are.

It's amazing how many virus, pest, and other security programs there
are available out there. Good protection is easy to come by......


Ven
 
Luck....

Hopefully it's just a kid, and you'll be able to contact his "parents' and make them and the authorities aware of his/her actions....as you have noted, these attack programs are everywhere, but the remedy to them, as well as a host of other isuues is readily available. Be careful about counterattacking...while tempting, you leave yourself open on many levels when you do that, as I'm sure your friend can attest to.....if you need any "help", feel free to contact me, and if it's fairly legal, or at least fun, I'm in! 😛 Q
 
Re: Luck....

qjakal said:
", feel free to contact me, and if it's fairly legal, or at least fun, I'm in! 😛 Q

It will definitely be "at least fun"..and I will keep you posted.



hacker



Ven
 
oblesklk,up to 6 in quarantine now 😡 im using millenium with outlook express 6 , like you i never open attachments , theyre self executing on my computer , i`ve been to the windows site , no luck in finding a fix , mind me asking....where you found your patch ?
 
this may add somelight to the situation....

As a preface for the following information .. I saw this SECURIRTY ALERT post from Ann lastnight and wanted to add some information for those that are also having the same problem. In short I get this information at work in a daily alert email.
---------------------------------------------------------------

Dear Colleagues:

The following article is an excellent summary of the havoc being
caused by the Klez worm.

This malicious software is using social engineering (deception) to
generate confusion and even anger among its victims. The worm sends
e-mail with fake FROM addresses that it picks at random from the
e-mail distribution lists on infected computers. Sometimes it
subcribes victims to e-mail newsletters or other distribution lists.

Because of the misleading FROM and SUBJECT lines, it is not
reasonable to suppose that every infected message indicates that its
apparent sender's computer is infected. Do not get angry at friends
and colleagues who are apparently sending you virus-laden messages;
they probably aren't.

As always,

* Keep your antivirus program up to date, preferably
automatically.

* Unless you have utilities that can let you examine the content
of e-mail attachments safely, don't open such attachments if you are not
expecting them, regardless of the supposed sender or ostensible
subject.


Best wishes,


- -------------Forwarded Message-----------------



RE: Klez: Don't Believe 'From' Line

Klez: Don't Believe 'From' Line
By
2:00 a.m. April 30, 2002 PDT

Some Internet users have recently received an e-mail message from a
dead friend. Others have been subscribed to obscure mailing lists.
Some have lost their Internet access after being accused of spamming,
and still others have received e-mailed pornography from a priest.

They're actually experiencing some of the stranger side effects of
the Klez computer virus.

These ersatz e-mails containing the virus are creating Klez-provoked
arguments and accusations that are now spreading as fast as the worm
itself.

The latest variant of the Klez virus started spreading 10 days ago.
The virus e-mails itself from infected machines using a bogus "From"
address randomly plucked from all e-mail addresses stored on an
infected computer's hard drive or network.

Recipients of the virus-laden e-mails, not understanding that the
"From" information is virtually always phony -- or even that they
have received a virus -- have been clogging networks with angry and
confused e-mails that are causing a great deal of cyber-havoc.

People signing up for newsletters and mailing lists that they never
subscribed to has been a major source of frustration for both users
and the list owners.

If Klez happens to send an e-mail "from" a user to an e-mail list's
automatic subscribe address, the list software assumes the e-mail is
a valid subscription request and begins sending mail to the user.

A mailing list for fans of the Grammy Award-winning Steely Dan band
has posted an explanation directed to those who were subscribed to
the list by the virus.

"We are not infected with the Klez virus. We don't know if you are
infected with the Klez virus. You may be. But even if you are not,
someone out there who is infected has both your address and our
address on their computer ... and therein lies the problem," the
explanation reads, in part.

Even when users understand the source of newsletter-generated
e-mails, the amount of mail some lists generate is causing problems.

"Last week I suddenly started getting hundreds of e-mails, daily,
with information about raising tropical fish, purchasing cosmetics
and staying in youth hostels," Victor Montez, a sales rep for a
publishing firm, said. "I do not keep fish, wear makeup or travel
rough."

Montez now understands the e-mails came from Klez-subscribed news
lists. But he said that since his free e-mail account only stores a
certain amount of messages, he's lost access to the account twice
this week. He believes he's also lost a significant amount of
business-related e-mails.

"If this keeps up, I may end up having to stay in hostels and I'll
have plenty of free time to devote to raising fish," he said.

In some cases, it almost seems as if Klez is specifically targeting
particularly vulnerable e-mail addresses onto which it can piggyback.

E-mails containing an invitation to view what purports to be an
attachment with pornographic images appears at first glance to have
been sent out by Catholic parishes in New York and Maryland. The
attachment actually contains the Klez virus, and tracing information
indicates the e-mails were actually sent from an Internet service
located in the United Arab Emirates.

"While we would obviously never choose to have our churches' names
affiliated with such material, this is a particularly difficult time
to have e-mail with obscene references -- which appear to have been
sent by church staff -- circulating," an archdiocese spokeswoman
said, referring to the worldwide sex abuse scandal.

Other newsletter owners are also suffering. Some say their Internet
service providers have accused them of spamming non-members. Many
ISPs cut service when they receive a certain amount of spam
complaints.

"I was reported to my ISP over a dozen times this week for spamming,"
said Keith Carlone, the manager of an e-mail newsletter for classic
car enthusiasts. "My ISP threatened to pull my account after the
third complaint and we went down shortly afterwards. It took four
days to sort the problem out."

Andrew Fiber, maintainer of a Jewish folk music mailing list, said
that the list has been inundated with messages about widely off-topic
subjects, so much so that Fiber wondered if most of his members had
suddenly gone "meshuga (a little crazy)."

But then Fiber began getting the complaints.

"All of a sudden we had e-mails coming in from around the world, with
people yelling we had sent them Klez," Fiber said. "The thing is that
'Klezmer' is a type of traditional folk music which we often discuss
on the list and sometimes refer to as Klez. So I thought people were
protesting about our folk music. It was very confusing for a while."

Some users have even reported receiving spooky e-mails from deceased
friends.

"I belonged to a tattoo artists' list that closed down a few years
ago. Last week, I began getting e-mails from the list. Even weirder,
I got eight e-mails with subject lines that read 'SOS' and 'Eager to
See You' from a list member who died last year. It totally creeped me
out," said "Bear" Montego.

Klez e-mails' subject lines are randomly chosen from a pre-programmed
list of about 120 possibilities, including "Let's be friends,"
"Japanese lass' sexy pictures," "Meeting Notice," "Hi Honey" and
"SOS."

Klez also sends fake "returned" or "undeliverable" e-mails, advising
the supposed sender that their original, refused e-mail is contained
in the attachment. Clicking on the attachment triggers the virus.

The virus can launch automatically when users click to preview or
read e-mails bearing Klez on systems that have not been patched for a
year-old vulnerability in Internet Explorer, Outlook and Outlook
Express. Klez only affects PCs running Microsoft's Windows operating
system.

As of Monday afternoon, Klez's spread seems to have slowed, but
antiviral experts warn that the worm will be around for a while.

"Anytime you have a virus that is not easily identifiable visually,
it tends to linger," Rod Fewster, Australian representative for
antiviral application NOD32, said. "SirCam and Klez both vary the
subject lines of the e-mails they send, which makes it hard for the
average user to spot."


If you are still reading I just want to add...... take a deep breath ....this too shall pass........ ; )

Donna
 
Donna....thanks for the info. Though this is definitely a problem, what we are experiencing (yes, folks, it continues) goes beyond this. E-mail bombs are only a part of the problem.

What you posted suggests that this particular virus creates RANDOM choices of who to hit with it. The pattern here indicates that it's not random, but calculated and deliberate. Also, the e-mail bombs generally arrive when we're online in a visible way...such as posting here. This virus, however, does not explain the dozens of crack (malicious hacking) attempts that we've been hit by...also when we're visible here.

It is very obvious that someone, for whatever reason, is trying to hurt the community. While they may be using that virus and others (these are readily available for DL) as one of their tools, the actions are deliberate and calculated. I see it as an attempt to hurt not only individuals, but also the community as a whole. We have a good deal of information that has been gathered to date. It seems to point to a single individual or group of individuals. If that person is innocent, one hell of a frame job is being done. Rest assured, we'll get to the bottom of it, no matter what the result may be.

peace!
Ann
 
Venray...

More info coming your way that I received today thanks to someone else in the community!

Jan
 
I have a question for all you technically minded folks. When I got my new PC I installed AVG 6.0 for anti virus and the Zone Alarm firewall. Both versions were the free versions. Do you guys know if these are any good and will keep normal "hackers" out? I know virtually no firewall and AV program will keep a serious hacker or the FBI out, but will these suffice for general protection?
 
Jim...

Both are considered to be pretty good. But, vigillence is your best weapon when they're trying to hack in. Repeated bombardment with intrusion attempts overwhelmed THREE firewalls on our system. Now, we shut down (the modem) temporarily when we get more than 2 or 3 hits in a row. Since we have a constant live connection with cable, we no longer leave it connected when we aren't right at the computer. A simple unplug and push of a button and we're safe until we get back online again.

Ann
 
TicklingDuo said:
Jim...

Both are considered to be pretty good. But, vigillence is your best weapon when they're trying to hack in. Repeated bombardment with intrusion attempts overwhelmed THREE firewalls on our system. Now, we shut down (the modem) temporarily when we get more than 2 or 3 hits in a row. Since we have a constant live connection with cable, we no longer leave it connected when we aren't right at the computer. A simple unplug and push of a button and we're safe until we get back online again.

Ann

Thanks Ann. I too am on a cable now, but I always switch of the PC when I'm not surfing. Apparently this prevents anyone from getting in. I get quite a few red alerts from people scanning to get in, but so far the firewall has blocked them all. Of course, one might have gotten in and been so good that the firewall didn't detect it. 😡

Thanks again........
 
What's New

3/10/2025
Stop into our Welcome Forum and take a moment to say hello to us!
Door 44
Live Camgirls!
Live Camgirls
Streaming Videos
Pic of the Week
Pic of the Week
Congratulations to
*** brad1701 ***
The winner of our weekly Trivia, held every Sunday night at 11PM EST in our Chat Room
Back
Top