WARNING! Chinese hack atttack in progress

greenspun.com : LUSENET : Current News : One Thread

At least according to Timebomb. Backups recommended.

-- Anonymous, July 19, 2001

Answers

Bump.

-- Anonymous, July 19, 2001

If it's true, it will immediately bring out the snipers from our own "organizations" who merely need a good reason (a callout) to pot shot an enemy. And when all is said and done I think the count will be 10 to 1 against the Chinese, or whoever else tries to play that nasty game.

-- Anonymous, July 19, 2001

The worm is called "Code Red". We are getting hit at work by it right now. It affects Windows 2000 systems. But the primary DOS type attacks that are being seen are from the worm itself. It generates IP addresses and tries to get into the system whether or not it is a Windows 2000 system.

Nasty stuff. If you have Windows 2000, be sure to get all the available updates, as there has been one out for this for about a month. Don't ya just love all the holes in Microsoft products? If you run antivirus software at home, it may be a good time to update the files for it.

Sheeple

-- Anonymous, July 19, 2001


CODE RED TO CRASH NET Thousands of infected servers will launch an attack on whitehouse.gov. http://www.techtv.com/callforhelp/projects/story/0,23008,3338042,00.ht ml

CODE RED WORM Nearly 12,000 servers see 'Code Red,' thanks to a flaw in Microsoft's server software. http://www.techtv.com/callforhelp/projects/story/0,23008,3337977,00.ht ml

-- Anonymous, July 19, 2001


White House dodges Web worm By Robert Lemos Special to CNET News.com July 19, 2001, 6:55 p.m. PT

Administrators for the Web site of President George W. Bush dodged an Internet worm's denial-of-service attack by moving the site to an alternate Internet address, security experts said Thursday.

As previously reported, servers infected by the so-called Code Red worm--estimated to be in excess of 100,000 computers--were scheduled to flood a specific Internet address representing the White House Web site with a deluge of data starting at 5 p.m. PDT.

However, administrators for Whitehouse.gov apparently moved the site to an alternate address. In addition, a flaw in the worm's design caused the tactic to fool the program into sending a much-reduced amount of data.

White House spokesman Jimmy Orr said the White House took precautions, but would not confirm whether Internet addresses were switched.

"We have taken preventative measures aimed at minimizing the impact of any computer virus," he said Thursday night.

Marc Maiffret, chief hacking officer for eEye Digital Security, said Whitehouse.gov administrators "blackholed" the original address--meaning that any data sent to the address would disappear into the Internet. eEye originally found the flaw that the worm exploits.

Computer worms are programs that have the ability to spread across Internet and execute instructions. In this case, the worm sought out vulnerable Web servers using Microsoft software. As for the instructions, the Code Red worm was written to flood the Whitehouse.gov site with a massive amount of data, overwhelming it to the point where it could not be accessed.

Before Thursday, anyone who tried to view Whitehouse.gov in a browser would be directed to a specific numeric address. After the address change, however, people who typed Whitehouse.gov into their browsers were automatically redirected to a new numeric address.

The worm, on the other hand, was programmed to attack a specific numeric address, which pointed to the White House Web site before Thursday's switch.

Maiffret, who warned earlier Thursday that the White House site was the target of the worm, also noted that the flood of data flowing across the Internet during the attack could degrade the overall performance of the Net.

However, the data flood never occurred because the worm checked for a valid connection before sending data--what could be considered a design flaw on the part of the author. Because the site's address was switched, the worm never established a connection and therefore did not begin sending data.

"You might have overload on the local networks where the worm was trying to get out, but the actual Web site looks okay," Maiffret said.

Others besides Maiffret warned of the potential for worm problems Thursday as well.

The Computer Emergency Response Team (CERT) Coordination Center issued an advisory predicting that the worm could cause performance problems on the Net.

"In addition to Web site defacement, infected systems may experience performance degradation as a result of the scanning activity of this worm," CERT stated in its advisory. "Non-compromised systems and networks that are being scanned by other hosts infected by the 'Code Red' worm may experience severe denial of service."

After slowing down earlier in the week, the Code Red worm spread wildly on Thursday, possibly due to someone modifying the code.

In addition to making the code spread faster, the person who changed the code may have made another important modification.

The original creator of Code Red apparently created the worm to stop spreading at midnight Friday morning coordinated universal time (UTC), or 5 p.m. PDT Thursday, and to attack the Whitehouse.gov site with a distributed denial-of-service attack. At that time the worm would stop spreading.

Yet Thursday evening, some early reports indicated that some infected machines continued to spread the worm.

Even Microsoft, which recently issued a patch to prevent the worm from infecting servers using its software, failed to protect all its servers. On Thursday, the company acknowledged that a "small number of servers" were infected by Code Red.

"We have investigations going on to look at other reports," said Scott Culp, security program manager for Microsoft's security response center.

Culp stressed that although their may be a lull in probes from the worm, customers still need to patch the servers.

"Our recommendation now is the same as our recommendation a month ago," he said. "If you haven't patched your software, do so now."

Until July 20, the worm is programmed to spread to new servers, according to eEye's analysis. From July 20 to July 28, the worm will attack the now-outdated address for the White House Web site.

If system administrators don't patch their systems Aug. 1, they could be re-infected with the worm, starting the whole process over again.

-- Anonymous, July 19, 2001



Moderation questions? read the FAQ