So someone sent me a death threat

This morning I got to see what someone had left for me on aim.

The things he wrote convince me that he doesn’t know me and just sent it out to a random person or he thought I was someone else.

I found it more amusing than scary, but reported his name to AIM and my hacker friends anyway.

But as I was talking to some friends about it, I realized that most people don’t know what to do if they recieve a message like this. Don’t ever respond to the person. They can hack into your computer that way and trying to talk to them only makes it worse. Just warn repeatedly, block and report to AIM.

It looks like he is replying to somebody…
He starts with “i would”… I would what?!
Oh well, good you are not worried.
Funny story, slight highjack, when I first came to the States at school, one day I had a message on my phone, saying “you’re classless, bitch!”. Speaking not too well english at that time, I thought for the longest time somebody was trying to tell me I didn’t have class the day after, class as in courses… ! ! I am glad I took it that way so I never worried about it.
Let us know if you get to the end of this…

I agree with Carine , it looks like the message was meant for someone else.

Speaking as someone who has received numerous death threats (2) I can say that police action, if at all possible, is the proper thing to do.

In my opinion, if someone you don’t know is angry enough to threaten your life-even if they don’t actually plan to do it-they should be taught the lesson that their words effect other people. Just to be clear, I’m not talking about people who are joking.

You know, I’ve heard that people can hack into your computer via AIM, but it really sounds like nothing more than an internet rumor to me. I’ve never seen it as an official warning from AOL or anything. You say you have some hacker friends, though. Would one of them be willing to hack me in order to show me it can be done?

There was a period of time last year (early 2002) when AIM had some serious susceptibility to remote users using their connection to your computer to force file downloads or triggering of remote code, but both those problems have been fixed since mid summer 2002. The only real problem with AIM right now is that anyone who knows how can send a specific string of characters to you and it will cause your AIM to crash.

ICQ had it worse in 2001 though… but those problems are also long fixed.

:slight_smile:

I just realized that they were refering to my profile. It says nothing but “take my quiz on quizyourfriends.com”. I took it off just now, it was dumb anyway. :stuck_out_tongue:

And depending on what they can get the other person to do (like convincing the other person to direct connect) then they could destroy the system. Once you get the IP address, you can do all sorts of strange things to people. A firewall can prevent most hackers.

Actually just getting an IP won’t do much, a good hacker would never hurt someones computer, and crackers the people who would hurt your computer probably doesn’t have the skill to hack your computer and if they did they wouldn’t waste it hacking into a computer, they would probably go for like servers. But then there are script-kiddies, all they need to do is send you a file, you accept and soon your in trouble, best protection against this is a firewall and being careful not to accept files from people you don’t know.

Xel: You’re wrong on several counts. First of all, you can do all sorts of things once you have an IP, assuming it’s the correct one (not a spoof) and you know what you’re doing. Secondly, ‘cracker’ isn’t equivalent to script kiddie. There -is- such a thing as a malignant hacker.

In more detail:

I’m definitely not l337 h4x0r, but I did work as a systems administrator, and part of my admin training was under the wing of someone who was, well, l337.

Basically, someone of my level really wouldn’t be able to do much on AIM (IRC is another matter), -unless- I could convince the person to open a direct connection with me (ie, message them and ask if they want to trade movies or warez or something). Once they do that, I can run a tracer (MS-DOS comes with one built-in, as I recall, for ping checking purposes; it’s called “tracert”) and get their IP address, which is essentially where they are on the internet.

That only works if they’re not spoofing, but anyway… that’s more technicalties. :stuck_out_tongue:

Once I’ve got their IP, I can basically send them packets without their being able to stop it (unless they’re behind something like a firewall, in which case it would take someone MUCH l337er than I to get through). Packets are little snippets of information/commands; with the proper packets sent in the proper sequence, I can do all sorts of nasty things, including any or all of the following; taking control of his computer (in other words, my input peripherals - keyboard, mouse, whatever - control what happens on his screen), shutting his computer down, downloading his files, deleting his files, messaging as him on AIM, kicking him off the internet every time he logs on, etc. I’m not good enough to code any of this stuff on my own, but I think most people who’ve studied hacking long enough would be able to do this stuff without much problem; the admin I trained under certainly did.

The fortunate part about all this is that most people who the media calls ‘hackers’ are just ignorant little kids who download ‘scripts’ (prepackaged hacking, so to speak) and don’t understand the material themselves, so they can’t tweak it or do anything too nasty unless they’re given the proper scripts.

Even worse, someone (again, I don’t know how to do this myself, but I’ve seen it done) they could just copy your registry files, decode them, get your keys (program reg keys, like for Windows and games and stuff) and use them themselves. If you’ve got passwords saved on Internet Explorer and such, they can grab those too.

That’s basically the gist of it, I guess. A lot of those internet viruses you hear about work the same way; once you’ve opened the files, they run themselves and do the stuff I mentioned above (about registry files) and then ‘report’ the results back to whoever programmed the virus. They’re basically just automated little packets of hacking.

If you’re worried about this stuff, there’s all sorts of protection programs you can get; Norton Antivirus will stop email viruses (at least the ones it knows of, and Norton is really good about updating), but as far as I know won’t stop system hacking. Stuff like ZoneAlarm will tell you if someone’s attacking you, and I think BlackIce will warn you of attacks and block them on it’s own.
I did learn a few of the basic things, but I’m far too poor at math and coding puts me to sleep, so I didn’t really get anywhere. Also, I hate using Linux. -_-;;;

That’s about all I can think of… if anyone else has any questions I’ll try to answer them, but keep in mind I don’t even remotely consider myself a hacker or anything :stuck_out_tongue:

Yea I see what you mean, but the Hackers I was taking about are more of what you would call White Hat, and any malignant hackers I just consider crackers. And of course those 2 are totally different from scrip kiddies which I totally despise. I’m an ignorant child myself, and Ive tested these “scripts” on my consenting friends and my own computers. The ease of it amazes me, but whats more amazing is how these little kids have totally changed the hacking culture. Im no where near l337 myself, I have a few friends who I consider good but I wouldn’t consider l337 either.

Also a firewall can stop a lot of hackers, but if someone really wants to, they could easily stop the firewall from loading or if they are on a network they can easily just port right through the firewall. Of course if you have something valuble enough to have someone as skilled as that to hack you then the thing shouldn’t be connected at all.