Early Phishing

Early Phishing

Koceilah Rekouche krekouche@pushstart.info

The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.

Is Your Son a Computer Hacker?

Is Your Son a Computer Hacker?

1. Has your son asked you to change ISPs? Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change.....

Adrian Lamo

Adrian Lamo

img-article-shenon-adrian-lamo_075825934724-300x199

Inverview taken on: 1/12/01

What are your current AIM screen names? Line Trace
What is your e-mail address? adrian@adrian.org
Do you have a web site? inside-aol.com, terrorists.net, securid.org
What is your real name? Adrian Lamo. . if you want to be technical, its the Doctor Reverend Adrian A. Lamo, Ph.D . . Doctor of Divinity and minister through the Universal Life Church, the grandma of all diploma mills everywhere. . .i don’t take those seriously, and don’t expect anyone else to, but i put them on my resume and my business cards to make a point of my disdain for the certification and educational process.
Where do you live? i move around alot .. i like to travel, and have lived on both coasts, and spent a couple years in south america. . i’m in transit right now. . but am based out of San Francisco.
How old are you? 19
What are your hobbies? i like to break and explore. breaking things is integral to the progression of technology. . people accuse me of being directionless, but i think its important to drop dynamite into the pond sometimes, to see what floats up. in my copious free time, i like to explore abandoned buildings and sewer systems, as well as exploring occupied buildings – its amazing how many security guards will escort you up to the roof of a skyscraper if you only ask, or won’t even stop you if you look like you know where you’re going. . urban exploration is definitely a big passtime. one of the reasons i like to travel, too., i used to be involved in local activism and whatnot. . worked with the city government, stuff like that. . i’m massively disinterested in politics now though.
How would you describe your physical appearance? scrawny geek ; )
What do you hope to do as a profession? same as i do now. . short term, interesting contracts for worthwhile places. i’ve been working since i was 16, and have run through a pretty big variety of jobs and contracts. . most of them designed to be short term .. i did a 3 month security audit for a fortune 500 company once, that was probably the most interesting. . but i’ve worked for everything from nonprofits to law firms to private investigation firms. . i set up a Netzero account for one of kevin mitnick’s former attorneys at one of them, of all the ironic things. . thats the sort of thing i want to keep doing. i don’t want to be stuck behind the same desk all my life, working at the same place until i have too much invested in what i’m doing to be able to do anything to risk it.
How long have you been on AOL? used the service briefly when i was younger, when it was known as Quantum Link, and i was playing around with my commodore 64. . but i didn’t start to really use it til the mid-90’s. . i used AOL 1.6 for DOS/GeoWorks for the longest time, and actively resisted going over to the Windows version until they started disabling features one by one. .they eventually sunsetted it altogether in June of 1999. So. .something like 7 or 8 years now.
How much time do you think you spend online each day? it varies. . .depending on where i am and what i’m doing. sometimes, if i’m interested in something, i’ll spend days online nonstop. . sometimes i’ll spend days without touching a computer. on a really average day, anywhere between 4 and 12 hours ;x
What programming languages are you familiar with? i don’t really program. the only languages i’ve worked with are x86 assembler and OPL for the EPOC16 palmtop OS.
What do you spend most of your time online doing? breaking and exploring -=)
Who are your good friends online? They know who they are.

Adrian Lamo and FBI Cyber Squad computer scientist Russell Handorf

Adrian Lamo and FBI Cyber Squad computer scientist Russell Handorf

10/18/12 Update: 2006 posting at forum - where Russell Handorf still contributes using his "grey hat hacker" handle "satanklawz" - suggests he has been working for FBI three years earlier than his resume claims; Adrian Lamo admits being "friends" with Handorf but still won't answer any real questions; Chet Uber offers to have Lamo "interview" me - Neal Rauhauser, who claims he has nothing to.....

‘Kryogeniks’ hacker sentenced for Comcast hacking


No PII involved in this one, but since many may remember the case, I thought I’d post the follow-up. James Robert Black, Jr., a.k.a. “Defiant,” was sentenced yesterday in U.S. District Court in Tacoma to four months in prison, four months of electronic home monitoring, 150 hours of community service, three years of supervised release and $128,557 in restitution for conspiring to damage a protected.....

Kids Only Channel Policies [Doc]


The following is a summary of AOL’s “Kids Only Channel Policies.” The AAC is obligated to follow these policies at all times. (from “Document Version 2.32”). All items are direct quotes, commentary is in brackets. The original document is 16 pages long. Grammar and spelling are as found in the original document. This document was prepared bu AAC Coord based on policies in effect in July, 1998.

Introduction

AOL developed The the Kids Only Channel Policies (“Policies”) to ensure a uniform consistent set of standards and practices throughout all programming and advertising areas (Rainman or web-based) targeted to kids children 12 and under on America Online, and particularly including through the Kids Only channel. AOL reserves the right to modify these Policies as necessary. Additionally, AOL expects all Partners to abide by the Children’s Advertising Review Board Unit (“CARU”) guidelines for Interactive Electronic Media (see also http://www.bbb.org/advertising/caruguid.html)

Policy PrincipleObjectivesGoals
~Provide a safe, age appropriate environment for kids in a manner appealing to both kids and parents, addressing primary industry and consumer concerns:
~Providing age appropriate content
~Protecting youth privacy, including protection from online predators
~Creating an age-appropriate marketing environment.
~Create a viable programming and business model for youth-targeted areas and partners on AOL.
~Provide a safe, age appropriate environment for kids in a manner appealing to both kids and parents;
~Create a viable programming and business model for youth targeted channels and partners on AOL.

Teen Pleads Guilty to Hacking Paris Hilton’s Phone


A Massachusetts teenager has pleaded guilty to hacking into the cell-phone account of hotel heiress and Hollywood celebrity Paris Hilton, a high-profile stunt by the youngest member of the same hacking group federal investigators say was responsible for a series of electronic break-ins at data giant LexisNexis.

The 17-year-old boy was sentenced to 11 months’ detention at a juvenile facility for a string of crimes that include the online posting of revealing photos and celebrity contact numbers from Hilton’s phone. As an adult, he will then undergo two years of supervised release in which he will be barred from possessing or using any computer, cell phone or other electronic equipment capable of accessing the Internet.

The U.S. Attorney’s Office for Massachusetts and the state district court declined to identify the teen, noting that federal juvenile proceedings and the identity of juvenile defendants are under seal. But a law enforcement official close to the case confirmed that the crimes admitted to by the teen included the hacking of Hilton’s account.

The teen also pleaded guilty to making bomb threats at two high schools and for breaking into a telephone company’s computer system to set up free wireless-phone accounts for friends. He also participated in an attack on data-collection firm LexisNexis Group that exposed personal records of more than 300,000 consumers. Prosecutors said victims of the teen’s actions have suffered about $1 million in damages.

In a series of telephone and online communications between March and June with a washingtonpost.com reporter, the teen acknowledged responsibility for all of the crimes for which he was sentenced.

Washingtonpost.com is not revealing his name because he communicated with the reporter on the condition that he not be identified either directly or through his online alias.

Investigators began focusing on the teen in March 2004 when he sent an expletive-laced e-mail to a high school in Florida threatening to blow it up, according to a statement from prosecutors. The school was closed for two days while a bomb squad, a canine team, the fire department and other emergency officials examined the building.

In August 2004, the teen broke into the internal computer systems of “a major internet service provider” by tricking an employee into opening a virus-infected file he sent as an e-mail attachment. The virus — known as a “Trojan horse” program — allowed the juvenile to use the employee’s computer remotely to access other computers on the ISP’s internal network and gain access to portions of the company’s operational information, prosecutors said.

The teen told washingtonpost.com earlier this year that around that time he broke into the network of Dulles, Va.-based America Online. AOL did not return calls seeking comment.

In January, the teen hacked into the telephone records system of T-Mobile International. He used a security flaw in the company’s Web site that allowed him to reset the password of anyone using a Sidekick, a pricey phone-organizer-camera device that stores videos, photos and other data on T-Mobile’s central computer servers. A month later, the teen would use that flaw to gain access to Hilton’s Sidekick files, according to corroborating information and screen shots he shared with washingtonpost.com.

Later that month, according to prosecutors, an associate of the teen “set up accounts for the juvenile at a company which stores identity information concerning millions of individuals.”

Again, prosecutors declined to name the company targeted in that attack. But according to screen shots provided by the teen — supported by other information from the teen that was verified by a senior federal law enforcement official investigating the case who spoke on condition on anonymity — the company was LexisNexis, which reported in March that hackers had gained access to the personal records of more than 310,000 Americans.

Hackers Run Wild and Free on AOL


Using a combination of trade tricks and clever programming, hackers have thoroughly compromised security at America Online, potentially exposing the personal information of AOL's 35 million users. The most recent exploit, launched last week, gave a hacker full access to Merlin, AOL's latest customer database application. As a security measure, Merlin runs only on AOL's internal network, but savvy hackers have found a way to.....

surface v4 [Read Me]


[surface version 4][created by shifty][shifty@shifty.gq.nu][http://shifty.gq.nu] Hey thanks for d/ling my program,appreciate it, check my website for further information about upcoming productions and such here are a list on commands you might want to print it out.email me if you would like to see one of your commands. Command(.x) - What It Does [.autox]- Automaticly ignores people that swear, lag, scroll, ... [.autoxoff]- Turns the Command.....

AOL Server tcl Compiler Exploit


Date Fall 1998Founded AlanSubmitted By O0OSource AOL-Files.com/FDO-Files.com Archive AOL’s network is made up of hundreds of Unix boxes which all run the same server software written by AOL called “AOL Server”. Alan found an exploit in AOL Server which allowed anyone to access the tcl compiler for the Unix Box. Using this tcl compiler exploit Alan was able to root dozens of AOL Unix boxes running AOL Server. Using.....

AOL phisher faces up to 101 years in prison


AOL phisher faces up to 101 years in prison By Joris Evers A California man faces up to 101 years in federal prison after a jury found him guilty of sending out e-mail scams as well as related crimes.Jeffrey Brett Goodin, 45, of Azusa, was convicted Friday on multiple counts by a jury in the U.S. District Court for Central District of California in Los.....