Ransom demands come through to subdue negative publicity;
      Reputation damage accelerates through hoax 
      postings
    
   
  London, UK - 20 July 2004, 17:30 GMT - The dark side of the internet 
    is increasingly coming into focus as false information posted on "security" 
    portals is purveyed and mirrored without question by a range of inter-linked 
    trusted web sites. The original internet security portals, which have become 
    famous for carrying software vulnerability disclosures, are now being overwhelmed 
    by new listings. As a result, they are unable to cope with the flood of fresh 
    postings - genuine and hoax - on a daily basis. 
    
    In parallel, consistent negative publicity on other trusted web sites and 
    security portals has led to the owners of some of those sites to contact many 
    companies, including mi2g, with a view to buying them out in exchange 
    for their silence. Ransom demands made have ranged from $250,000 to $1 million 
    to decommission a negative publicity campaign mounted through a particular 
    set of trusted web sites or security portals.
    
    These adverse developments are likely to lead to further loss of user trust 
    and unclear demarcation between useful and useless security warnings as well 
    as vulnerability disclosures in the months ahead. 
    
    The mi2g Intelligence Unit has tracked a particular development over 
    the last few weeks, where a rogue account created by a malevolent party as 
    mi2g-research@hushmail.com has been consistently abused by utilising it as 
    the originator of a number of vulnerability postings including one clear hoax 
    titled: "Wendy's Drive-up Order System Information Disclosure." 
    
    
    Upon reading this hoax "vulnerability" posting, available through 
    a number of security portals, it is clear that there is no purpose to it other 
    than to smear reputation and cause damage. However, the organisations that 
    originally took the posting did not bother to check for accuracy and include 
    such well known names as:
    
    1. full-disclosure@lists.netsys.com 
    [Full-Disclosure]
    2. isn@c4i.org [InfoSecNews]
  The original message had the following lists in the 'cc' as well:
  1. bugtraq@securityfocus.com
    2. vulnwatch@vulnwatch.org
  The presence of these two lists in the "cc" increased and amplified 
    the credibility and visibilty of the hoax, although the moderators of bugtraq 
    and vulnwatch did not accept the posting. Within days, there were mirror copies 
    of the hoax vulnerability "Wendy's Drive-up Order System Information 
    Disclosure" on several "security" focussed portals that mentioned 
    mi2g incorrectly without checking the facts within the posting or confirming 
    accuracy through other means, such as:
    
    1. http://www.securityfocus.com 
    
    2. http://seclists.org
    3. http://lists.insecure.org
    4. http://archives.neohapsis.com
    5. http://lists.netsys.com
    6. http://www.e2ksecurity.com
    7. http://www.derkeiler.com
    8. http://www.gossamer-threads.com
    9. http://www.landfield.com
  The mi2g Intelligence Unit has written to these security portals and 
    to Hushmail. Only Hushmail.com has taken immediate action by disabling the 
    rogue email account, much to their credit. The other so called "security" 
    forums and trusted vulnerability posting accounts, portals and mirror web 
    sites have simply passed the buck by stating that they did not control the 
    content which they published, even when it was blatantly evident that the 
    posting they were purveying was an obvious obnoxious hoax. 
    
    "These developments mean that any person 
    or corporation can quite easily decide to launch a clandestine smear campaign 
    against any brand in the world by bombarding appropriate bulletin boards and 
    trusted forums with false information through free email accounts," said 
    DK Matai, Executive Chairman, mi2g. 
    "There is a high probability that more and more brands could fall victim 
    to such smear campaign postings. The reputation damage is being amplified 
    manifold by several automatic mirrors. In parallel, we are also seeing demand 
    for money from frequent reputation damage purveyors."
  [ENDS]
  Full details of the June 2004 report are available as of 1st July 2004 and 
    can be ordered from here. 
    (To view contents sample please click here).