Lexington Herald-Leader (KY)

January 13, 2002

A NEW TARGET
HACKERS SET THEIR SIGHTS ON HOME COMPUTERS

Author: D. Ian Hopper
Associated Press

Edition: Final
Section: Technology and Your Money
Page: E1
Dateline:
WASHINGTON

Estimated printed pages: 3

Article Text:

WASHINGTON -- Computer hackers, once satisfied to test their skills on large companies, are turning their sights on home computers that are faster, more powerful and less secure than ever before.

The hackers can steal your identity, destroy your data or use your computer to launch attacks on Web sites or your friends.

"Home machines weren't very interesting targets a few years ago," said Mikko Hypponen of anti-virus company F-Secure in Finland. "That's all changed now."

Experts attribute the threat to several factors:

* Many home computers are now as powerful as business computers, with enough memory and processing power to make them alluring staging areas for wide-scale Internet attacks that affect other computers.

* A growing number are connected directly to the Internet through high-speed DSL and cable lines that remain open all the time. Computers that are left on around the clock are vulnerable.

* Unlike businesses with permanent security staff, most home users are slow to secure their computers with the latest anti-virus and firewall software and plug security holes by downloading the necessary fixes from software makers such as Microsoft.

* Many home users are unaware of Internet threats and are too willing to click on unsolicited e-mail that might be infected with malicious programs.

"Home users have generally been the least prepared to defend against attacks," Carnegie Mellon University's CERT (Computer Emergency Response Team) Coordination Center warns. "In many cases, these machines are then used by intruders to launch attacks against other organizations."

Viruses and worms -- which are viruses that don't need human intervention to multiply -- make up a large part of the new threats to home computers. In the past year, users' computers have been infected with malicious programs with catchy names like Code Red, Nimda, SirCam, Anna Kournikova and others that could be spread through Internet e-mail or surfing.

Anti-virus firm Message Labs reported that it detected one virus per 370 e-mail messages in 2001, double the rate of the previous year.

The potential damage from hackers is also growing.

Several years ago, virus writers were content to simply destroy data on a computer.

Now they can imbed malicious programs that spy on users or steal their identity; use personal computers to attack other systems; and use your e-mail address book to unwittingly infect the computers of friends.

Even the most savvy users have been victimized.

An FBI cybercrime researcher's computer infected with the SirCam program sent out official documents that spread the virus, to the bureau's embarrassment.

The outbreak of the Code Red Internet worm last summer sparked an unprecedented show of force from government and private industry.

"We've never seen a virus before that would not affect end-user machines at all; it just jumped from one Web server to another," Hypponen said. "It really made Code Red more like a weapon than anything else."

Although home computers were not affected, the message government and private security experts want home users to take from that threat is that computer maintenance needs to become as routine as locking your house and car.

Home users need to routinely update their anti-virus and Internet firewall software against the latest threats and checks for fixes against threats that software makers provide for free.

"If you've got a system out on the Net and it's not patched, there's a very high degree of likelihood that literally in a matter of hours you'll be popped," warned Amit Yoran of computer security firm Riptech.

New technologies will be at risk to hacking this year, Yoran cautioned. Wireless networking, which is now so cheap and easy to use that consumer models are growing popular, is especially vulnerable.

"The standard itself is insecure," Yoran said. In a large-scale test of urban wireless networks done by Riptech, experts couldn't find a corporate network they couldn't break into.

"What we're faced with is widespread adoption (of wireless networks) throughout corporate America and throughout consumer markets, and people haven't really thought through how to protect," he said.

With more and faster computers on the horizon and no sign of hackers giving up their pursuits, home users will have to take security more seriously. "They think if they don't have any secrets, they aren't a target," Hypponen said. "But it's not like that at all."

Caption:
ILLUSTRATION BY CRAIG JOHNSON/STAFF

Copyright (c) 2002 Lexington Herald-Leader
Record Number: 0201140406