Subject: News from Japan
From: "Sokar" <mfoushee1@nc.rr.com>
Date: 09/06/2005, 02:58
Newsgroups: alt.conspiracy.area51

Cover Story: Waiting to strike
06/09/2005

By YOSHINORI HIRAKO, The Asahi Shimbun


      Take a closer look at your computer. Seems fine, right? But inside 
that high-tech gadgetry that people rely on for work, shopping and keeping 
in touch, there could be a war just waiting to happen.

      We have entered the age of the ``bot,'' the newest strain in the vast 
number of noxious computer viruses.

      Bots, as in robots, start out as spies and with the push of a few 
buttons, mutate into virtual armies, destroying anything that stands in 
their cyber way.

      ``Bots have the potential to bring a nation's whole computer network 
to a grinding halt,'' warns Ko Ikai of the National Police Agency's Cyber 
Force Center. ``They can certainly damage a target company's computer 
network.''

      Bots slip undetected into victim PCs, wreaking havoc along the way and 
engaging in spy activities by downloading private data.

      They continue to nest quietly until receiving orders to mobilize 
through their ``general,'' or remote user. Then they attack; opening up the 
victim computer to remote access and propagating before spreading en masse 
to the next battleground.

      While conventional viruses and worms are bad enough, they are 
comparatively tame, say experts.

      Because regular viruses are usually designed to stir commotion and 
draw publicity, they can be spotted fairly easily.

      Bots, however, are hermetic. Therefore, they are capable of affecting 
thousands of networks in a single strike.

      Yuji Hoshizawa is an engineer at Tokyo-based SecureBrain Corp., which 
provides security for businesses against digital threats.

      ``It's quite easy to gain access and almost complete control of a 
personal computer using the bot virus,'' Hoshizawa says. ``And then there's 
the added worry that your computer could be taken over and used as a conduit 
for an attack on a third party.''

      Bots, he adds, can make your PC turn all sorts of tricks, like 
forwarding information specified by the remote attacker or sending off 
infected e-mail in droves.

      But bots' true ammunition lies in the fear they create.

      The NPA says it is aware of ``bot control rights'' being traded among 
overseas' criminal organizations.

      According to the NPA, operators of a gambling Web site in Britain said 
they were threatened in March 2004 with an imminent ``all-out bot attack'' 
unless they coughed up the equivalent of about 4 million yen. The incident 
was the first reported bot-related crime.

      Although no cases of ``bot blackmail'' have yet occurred in Japan, 
authorities are on constant alert.

      The Information-Technology Promotion Agency, Japan cited bots in a 
March report as the No. 1 threat to computers. The new cyber threat also 
prompted the NPA in January to release an analysis report on the bot virus.

      Meanwhile, bots are also featuring large in computer virus damage 
reports released by anti-virus software companies.

      But with so many variants, it is becoming increasingly difficult to 
devise ways of defeating the menace.

      According to Trend Micro Inc., an anti-virus software company, there 
are already more than 9,000 bot variations, including subspecies, lurking 
behind the ``on'' button.

      Those that ordinary computer users should be on the lookout for, say 
Trend Micro officials, are the Agobot, the Sdbot, the Rbot and their 
variations.

      The most effective way to prevent infection, they add, is to keep 
updating anti-virus software programs and stick to the basic rule of not 
opening e-mail messages that look even vaguely suspicious.

      And yet, there are even bigger concerns.

      One of the many bot viruses is outstripping all the rest. It has 
already developed more than 1,000 variants and subspecies-and it is still 
breeding.

      Hiroki Iwai at LAC Corp., a computer security planning company based 
in Tokyo, explains that once the source code-or the blueprint-is revealed on 
the Internet, creating a DIY bot to attack a specific corporation no longer 
requires high-tech savvy.

      In mid-April, a Tokyo-based manufacturer that operates networks of 
several thousand computers discovered it had only narrowly escaped falling 
victim to such an attack. By chance, communication data that was usually not 
in use was found to have been tampered with. A resident bot, although not a 
highly sophisticated one, was apparently trying to get in touch with the 
outside to ``call home.''

      Since then, the company has been taking additional precautions.

      The company official in charge of Internet management fears the 
company could be targeted again.

      ``It was the fourth time we have had to quarantine network computers 
that were exposed to a new bot strain. Maybe we are on a secret hit list,'' 
he said.

      Experts agree on one thing: There is little you can do once a decision 
has been made to target your computer.

      The LAC's Iwai explains: ``Since the virus is not scattered about over 
a wide range, that makes it difficult to develop a specific anti-virus 
vaccine. What you have to do is to really make the effort (to crack bot 
infiltration) by screening the network and tracking fishy transmission data 
step by step.''

      Currently, the NPA's Cyber Force Center is keeping watch on about 20 
bot families with the sole aim of preventing cases of blackmail.

      The center purposely allows the virus to infect a system, and then 
keeps vigil on any incoming commands. The NPA's Ikai said: ``Though it is 
said that anti-virus safety measures have come a long way, in reality, the 
danger is right out there. I would say, the situation is as precarious as 
ever.''(IHT/Asahi: June 9,2005)