SCO website hacked twice with erroneous mention of Microsoft
    
   
  London, UK - 29 November 2004, 17:00 GMT - After last week's DDoS 
    attack on the SCO web site reported by the mi2g Intelligence Unit, 
    this week their internet presence has been compromised twice through subtle 
    vandalism. The attacks began over the long weekend in the US and were first 
    noticed by SCO on Sunday. In one instance, the usual SCO logo (www.sco.com) 
    was modified to contain the words: " We own all your code pay us all 
    your money." Followed by "hacked by realloc()." 
    
    The mirror can be accessed 
    via Zone-H.
    
    In another defacement, hackers inserted "SCO vs World" at the top 
    of one of the site's pages. The vandalised text went on to state that SCO 
    had discovered "parts of our code in almost all Microsoft(R) software. 
    We want to bring an action against Microsoft(R) and our legal department is 
    working on that." 
    
    The mirror can be accessed 
    via Zone-H.
    
    Unconfirmed rumours are suggesting that the site might have been defaced using 
    a bug in a PHP script, usually part of an Open Source web server architecture. 
    The defacement shows a message that appears to link back to the SCO versus 
    IBM court case, where SCO claimed certain rights over specific parts of the 
    Linux kernel.
    
    "The repeated digital attacks on SCO's internet 
    presence through malware, DDoS and manual hacking throughout 2004 are demonstrating 
    a widespread disgruntlement with the public stance of that corporation in 
    regard to proprietary software and intellectual property ownership when translated 
    to Open Source and strongly held laissez-faire views," 
    said DK Matai, Executive Chairman, 
    mi2g. "This cliff-hanger issue is 
    not by-the-by and is critical to the future of software development and deployment. 
    It is bitterly contested and the radicals don't wish to be ignored in this 
    debate and are willing to take the law into their hands over and over again." 
    
    
    [ENDS]
  
   
    mi2g is at the leading edge of building secure on-line banking, broking 
    and trading architectures. The principal applications of our technology are:
    
    1. D2-Banking; 
    2. Digital Risk Management; and 
    3. Bespoke Security Architecture.
    
    mi2g pioneers enterprise-wide security practices and technology to 
    save time and cut cost. We enhance comparative advantage within financial 
    services and government agencies. Our real time intelligence is deployed worldwide 
    for contingency capability, executive decision making and strategic threat 
    assessment.
    
    mi2g Research Methodology: The Frequently Asked Questions (FAQ) List 
    is available from here in pdf. Please 
    note terms and conditions of use listed on 
    www.mi2g.net
  
  Full details of the October 2004 report are available as of 1st November 
    2004 and can be ordered from here. 
    (To view contents sample please click here).