We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
 
74,953 News Articles

FBI probes 'Here you have' worm's UK links

Evidence links the author to a UK mobile provider

The FBI has launched an investigation into the "Here you have" worm, which disrupted corporate email systems in the US two weeks ago.

Representatives from the FBI's Miami field office spoke with IDG News Service this week seeking information on the hacker behind the worm. A hacker using the name Iraq Resistance has exchanged a number of emails with IDG over the past two weeks discussing the incident.

"Here you have" was a big deal in North America, temporarily gumming up email systems in large organisations such as Disney, Proctor & Gamble and NASA. On the day it was unleashed it accounted for between 6 percent and 14 percent of all spam on the internet, according to Cisco Systems.

Iraq Resistance has never revealed his (or her) identity, but there are a few clues.

His YouTube profile lists his location as Spain, but SecureWorks researcher Joe Stewart has analysed the worm and believes Iraq Resistance is a Libyan hacker who has been trying to build support for a cyber-Jihad group called Tariq ibn Ziyad. The group's stated goal is to break into systems at U.S. Army agencies.

A look at the IP addresses in Iraq Resistance's email messages shows he was using the mobile network belonging to Hutchison 3G UK, better known as 3, as well as proxy IP addresses used by the Opera Mini browser.

That doesn't mean Iraq Resistance is in the UK, however. He may have hacked into a computer that was using 3's mobile network or simply purchased a SIM card used by the network while in the UK.

Indeed, he implied as much in an e-mail message Thursday. "I can appear from wherever I want, so its hard to know where am I," he wrote."You must know that hackers can use lots of proxies or hacked computers to send messages from and I don't need to say what I do."

After Iraq Resistance was told his IP address made him appear to be in the UK, he sent an email from another address, this one belonging to a service provider in the US, Placentia Reliable Web Services. That IP address has been associated with malicious scripts, according to the Honeypot project, indicating that it is probably being used by hacked computers.

Timestamps in Iraq Resistance's messages indicate he is in the UTC +3 time zone, which could mean he is based in Iraq, Saudi Arabia or East Africa. This is not the time zone used in Libya, however, where SecureWorks' Stewart thinks he may be based.

Stewart says that 3's network was also linked to a backdoor Trojan horse program used in the attack, but he doubts that Iraq Resistance is located in the UK, which has extradition treaties with the US. It could be the case, he said in an email, "but I think it would be risky for him."


IDG UK Sites

Samsung Gear 2 review: Classy Tizen smartwatch is too expensive

IDG UK Sites

Eight possible names for the next version of Mac OS X: What will Apple call the follow-up to Maveri?......

IDG UK Sites

Why our gadgets will kill us all: bleating notifications, too many chargers and the proliferation...

IDG UK Sites

Inside Twitter's new design and ad offerings