->PConnect(script.ftech.net,mi2gl,m4d2e,mi2gl)
 

Millennium hackers plan City assault

By John Leyden

Network News, © VNU BusinessPublications 1999

The millennium date change will be used as a cloak by hackers and cyber terrorists to mount attacks against corporate networks, security experts warned last week.

The warning came as evidence emerged from US cyber activist Ricardo Dominguez that the radical Reclaim the Streets group sought advice on sabotaging computer sites and recruited teams of UK based hackers.

The group aims to increase the network damage caused by protests it organised on 18 June (J18), when hackers used Floodnet to block or crash Websites in the City of London.

Ex hacker turned consultant at Tiger Security, Mathew Bevan, warned that network managers should expect the worst from opportunist or planned attacks.

"People don't know who Year 2000 contractors are, so how can they trust their code? There is proof the Mafia was backing hackers posing as year 2000 programmers," said Bevan. "People will have hacked some machines and no one will know until too late."

Malcolm Skinner, marketing director at Axent Technology, said: "There will be an enormous amount of hacking activity camouflaged by Year 2000 issues."

Skinner said hackers intend to disguise attacks so that they look like a series of unrelated incidents. Unwary network managers would dismiss even sustained attempts to take ownership of systems as simple Year 2000 glitches.

DK Matai, managing director of software consultant mi2g, which works with a number of City firms, said the biggest risk comes from Trojan Horse programs which may be activated when network managers disable security protocols to carry out Year 2000 network diagnostics.

The threat is being taken seriously by the banking community. The British Bankers' Association has issued a Planning Guide for the Millennium, advising extra security precautions over the period.

Renowned worldwide for the ATCA Briefings. Subscribe now.
 
Home - Profile - Values - People - Careers - Partners - Contact Us
D2 Banking - Bespoke Security Architecture - Digital Risk Management - Tools

Intelligence Briefings - Brochures - Case Studies -
SIPS Methodology FAQ (pdf)
Keynote Speeches - Articles - News Feeds - Glossary (pdf)
Terms and Conditions - Privacy Policy