[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-users] IPs related to hackers
- Subject: RE: [cobalt-users] IPs related to hackers
- From: "Donna Lever" <webmaster@xxxxxxxxxxxxxxxxxx>
- Date: Mon Feb 12 08:33:37 2001
- List-id: Mailing list for users to share thoughts on Cobalt products. <cobalt-users.list.cobalt.com>
>
> * could they be getting info on RaQ's from this email list?
This list (and others like it, including support newsgroups) must be a goldmine for hackers.
By monitoring this list, they get a target domain name they can identify as very probably running a RAQ of some sort. Even if you don't use a sig, the info is likely in the email headers. If you're asking a question, you'll say what machine you have - the standard version of all programs that comes on those particular machines is public knowledge. All they need to do is test those holes, and if you haven't been up-to-date with the patches, they're in again. You might even say you're having trouble with version x.x of a inet program. If that program has a known exploit, their work is done.
Some people use their phone numbers in their sigs. One phone call to a non-technical person could have them inadvertantly revealing a username and password. Harvesting these email addresses could result in bogus email campaigns hoping to reel in some unsuspecting people.
They don't even need to subscribe to the list - all the info they need is neatly stored in the archives and available with a few search words and a mouse click.
It's food for thought, and the only way I see to shut down these type of predators is for a single depository of Q&A that strips email headers/sigs and such and reveals no identities. To be safe, tech questions that require server details need to be asked in anonymity - or at least give you the option of anonymity. I know it's a tall order, but it would send nosy hackers off to easier pastures.
--
Donna Lever
Smart Artist Web Services
http://www.smartartist.com.au/