Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Internet Attack's Disruptions More Serious Than Many Thought Possible
AP via TBO ^ | Jan 27, 2003 | Ted Bridis

Posted on 01/27/2003 4:53:05 PM PST by John W

WASHINGTON (AP) - The weekend attack on the Internet crippled some sensitive corporate and government systems, including banking operations and 911 centers, far more seriously than many experts believed possible. The nation's largest residential mortgage firm, Countrywide Financial Corp., told customers who called Monday it was still suffering from the attack. Its Web site, where customers usually can make payments and check their loans, was closed with a note about "emergency maintenance."

Police and fire dispatchers outside Seattle resorted to paper and pencil for hours Saturday after the virus-like attack disrupted operations for the 911 center that serves two suburban police departments and at least 14 fire departments.

American Express Co. confirmed that customers couldn't reach its Web site to check credit statements and account balances during parts of the weekend. Perhaps most surprising, the attack prevented many customers of Bank of America Corp., one of the largest U.S. banks, and some large Canadian banks from withdrawing money from automatic teller machines Saturday.

President Bush's No. 2 cyber-security adviser, Howard Schmidt, acknowledged Monday that what he called "collateral damage" stunned even experts who have warned about uncertain effects on the nation's most important electronic systems from mass-scale Internet disruptions.

"One would not have expected a request for bandwidth would have affected the ATM network," Schmidt said. "This is one of the things we've been talking about for a long time, getting a handle on interdependencies and cascading effects."

The White House and Canadian defense officials confirmed they were investigating how the attack, which started about 12:30 a.m. EST Saturday, could have affected ATM banking and other important networks that should remain immune from traditional Internet outages.

Schmidt said early reports suggested private ATM networks overlapped with parts of the public Internet. Such design decisions were criticized as "totally brain-dead" by Alex Yuriev of AOY LLC, a Philadelphia-based consulting firm for banks and telecommunications companies.

Officials were most concerned about risks that citizens might lose confidence in financial networks.

"Their bread and butter is the public being able to get access to their accounts when and where they want them," said Ron Dick of Computer Sciences Corp., former head of the FBI's National Infrastructure Protection Center. "Even during nominal disruptions, the key is having a plan so you can provide assurances to your customers."

The virus-like attack, alternately dubbed "slammer" or "sapphire," sought out vulnerable computers to infect using a known flaw in popular database software from Microsoft Corp. called "SQL Server 2000." The attacking software scanned for victim computers so randomly and so aggressively that it saturated many of the Internet largest data pipelines, slowing e-mail and Web surfing globally.

"One thing people have always feared was that the mesh among certain critical infrastructure sectors would be affected, and there was some of that," said Eddie Schwartz, a vice president at Predictive Systems Inc., which runs Internet warning centers for the banking and energy industries.

Congestion from the Internet attack eased over the weekend and was almost completely normal by Monday. That left investigators poring over the blueprints for the Internet worm for clues about its origin and the identity of its author.

Complicating the investigation was how quickly the attack spread across the globe, making it nearly impossible for researchers to find the electronic equivalent of "patient zero," the earliest infected computers.

"Basically within one minute, the game was over," said Johannes Ullrich of Boston, who runs the D-Shield network of computer monitors. He watched the attack spread with alarming speed worldwide. Asia, especially Korea, was among the areas hardest-hit.

Experts said blueprints of the attack software were similar to a program published on the Web months ago by David Litchfield of NGS Software Inc., a respected British security expert who discovered the flaw in Microsoft's database software last year.

The attack software also was similar to computer code published weeks ago on a Chinese hacking Web site by a virus author known as "Lion," who publicly credited Litchfield for the idea.

Litchfield said he deliberately published his blueprints for computer administrators to understand how hackers might use the program to attack their systems.

"Anybody capable of writing such a worm would have found out this information without my sample code," Litchfield said. "Just because someone publishes a proof-of-concept code doesn't necessarily help the people we should be worried about."

Still, Litchfield's disclosure was likely to reignite a simmering dispute among security researchers and technology companies about how much information to disclose when they discover serious vulnerabilities in popular software.

"I personally would rather people not publish exploit code," said Steve Lipner, a top security official at Microsoft Corp.

Litchfield responded that his warnings about the threat - plus his detailed example - might have frightened many professionals into installing software repairs. Microsoft said the number of users downloading its repairing patch reached 6,800 per hour Monday.


TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Front Page News; Government; News/Current Events
KEYWORDS: microsoftexploits
Navigation: use the links below to view more comments.
first 1-2021-4041-48 next last
Agree with Alex Yuriev.Not any kind of computer or internet expert,but,when I heard ATMs were affected,my first thought was-Why???
1 posted on 01/27/2003 4:53:05 PM PST by John W
[ Post Reply | Private Reply | View Replies]

To: John W
Haven't terrorists been seeking to escalate their war against America through mucking with cyberspace?
2 posted on 01/27/2003 4:54:39 PM PST by My2Cents ("...The bombing begins in 5 minutes.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W
will the free version of Zone Alarm stop this?
3 posted on 01/27/2003 4:57:08 PM PST by Principled
[ Post Reply | Private Reply | To 1 | View Replies]

To: Principled
BUMP
4 posted on 01/27/2003 4:59:15 PM PST by Publius6961
[ Post Reply | Private Reply | To 3 | View Replies]

To: My2Cents
Kinda reminds me of the anthrax attacks....just enough damage to let us know it CAN be done.
5 posted on 01/27/2003 5:02:52 PM PST by MamaLucci
[ Post Reply | Private Reply | To 2 | View Replies]

To: John W
The U.S. banks, like Bank of America, should file a lawsuit against Microsoft for criminal negligence. ATM's do not use Microsoft software at all. The only reason the ATM's wouldn't operate correctly is because the networks were saturated with port 1434 scans.
6 posted on 01/27/2003 5:04:20 PM PST by gcraig
[ Post Reply | Private Reply | To 1 | View Replies]

To: gcraig
What about what the expert said about brain-dead design?
7 posted on 01/27/2003 5:06:10 PM PST by John W
[ Post Reply | Private Reply | To 6 | View Replies]

To: Principled
Attacking servers, not home PC's. You should be OK.
8 posted on 01/27/2003 5:06:37 PM PST by listenhillary (Axis of Weasels need to be neutered)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Principled
will the free version of Zone Alarm stop this?

Bwahahaha - thanks for the laugh.

9 posted on 01/27/2003 5:09:26 PM PST by TomServo
[ Post Reply | Private Reply | To 3 | View Replies]

To: gcraig
Zone Alarm would be useless. This was directed at SQL servers.
And although I'm not a big MS fan, the truth is that the patch for this was available last May. The real fault lies with the lazy sysadmins that didn't install the free patch.
10 posted on 01/27/2003 5:10:22 PM PST by ALS
[ Post Reply | Private Reply | To 6 | View Replies]

To: John W
I agree. It does not make any of us feel all warm and fuzzy to find that a huge bank is so vulnerable to something like this. We all hear a lot of talk about the dangers of cyber-attacks but is stills seems like business and industry is having a hard time getting together to make fighting it a real priority. Surely we can do much better to protect ourselves.
11 posted on 01/27/2003 5:10:59 PM PST by Route66 (America's Mainstreet)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Principled
will the free version of Zone Alarm stop this?

caveat: i don't run zone alarm, as my os is not windows on the firewall.

i took a look at the zone alarm webpage, and it appears that it will stop this particular problem for your machine. you shouldn't be at risk because of this worm, regardless. (unless you are a very atypical user)

once you start running zone alarm, you will most likely see a great many accesses of your machine that you weren't aware of. most of these are benign, so don't panic.

12 posted on 01/27/2003 5:15:46 PM PST by danelectro
[ Post Reply | Private Reply | To 3 | View Replies]

To: gcraig
The U.S. banks, like Bank of America, should file a lawsuit against Microsoft for criminal negligence. ATM's do not use Microsoft software at all. The only reason the ATM's wouldn't operate correctly is because the networks were saturated with port 1434 scans.

The US banks shouldn't have their ATM system connected to the internet. Until the last 10 years, banking systems, utility systems, and many other mission-critical computer systems were physically unattached and thus electronically 'safe' (more or less - we, as a utility, had our own isolated microwave and hard-wired communications system for all transmission operations). And, they all used propriatory software to operate their systems. Connectedness is overrated.

13 posted on 01/27/2003 5:18:20 PM PST by meyer
[ Post Reply | Private Reply | To 6 | View Replies]

To: John W
How do you want to be hacked today?
14 posted on 01/27/2003 5:18:35 PM PST by Redcloak (Tag, you're it!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ALS
And although I'm not a big MS fan, the truth is that the patch for this was available last May. The real fault lies with the lazy sysadmins that didn't install the free patch.

i don't understand why these servers were able to be accessed from the internet. i saw earlier today other apps (.net programming environment and one other) also installed the vunerable sql component. i'm wondering if there were more than those two, because it doesn't seem possible the worm should be able to get at so many backoffice machines.

15 posted on 01/27/2003 5:19:27 PM PST by danelectro
[ Post Reply | Private Reply | To 10 | View Replies]

To: Principled
The worm exploits a vulnerability in MS SQL 2000 and MS MSDE 2000. Unless you're running these, your machine won't be compromised or exploited. However, your web viewing enjoyment might be slowed a little because the worm has caused an enormous amount of traffic to explode across the worldwide Internet.
16 posted on 01/27/2003 5:20:07 PM PST by xrp
[ Post Reply | Private Reply | To 3 | View Replies]

To: ALS
The real fault lies with the lazy sysadmins that didn't install the free patch.

Yup. That's what I heard too.

17 posted on 01/27/2003 5:28:51 PM PST by Musket
[ Post Reply | Private Reply | To 10 | View Replies]

To: danelectro
Go to the link below and click on the Skitter graphic.
http://www.caida.org/

here's another place that was lit up red Friday night:
http://www.internetpulse.net

and another good site that showed worldwide deadness Friday night:
http://www.internettrafficreport.com/main.htm
18 posted on 01/27/2003 5:39:34 PM PST by ALS
[ Post Reply | Private Reply | To 15 | View Replies]

To: ALS
The spike shows the global packet loss Friday night/Saturday morning.


19 posted on 01/27/2003 5:40:59 PM PST by ALS
[ Post Reply | Private Reply | To 18 | View Replies]

To: ALS
This is the current snapshot of Asia which is still reeling.
(taken at 7:45pm CDT 1/27/03)



Asia
Avg. Response Time: 475
Avg. Packet Loss: 20 %
Total Routers: 18
Network up: 72 %


View Graphs or Click a Router below for more detail.

Router
Location
Current Index
Response Time (ms)
Packet Loss (%)
bj-a.bj.cnuninet.net
China (BeiJing)
73
262
0
f0-0.tmhbr02.hkt.net
China (Hong Kong)
78
218
0
hkt004.hkt.net
China (Hong Kong)
72
274
0
szx-r-1.jsinfo.net
China (Nanjing)
49
435
12
gold.sopac.org.fj
Fiji
0
0
100
core-mgl.cbn.net.id
Indonesia
56
434
0
core7200-gdlb.gerbang.net.id
Indonesia (Jakarta)
74
254
0
gtw-1.sby.rad.net.id
Indonesia (Jawa Timur)
23
757
4
mbb2-lb0.knet.co.il
Israel
0
0
100
tlv-l1.netvision.net.il
Israel
0
0
100
hfa-l1.netvision.net.il
Israel
0
0
100
gsr-ote1.kddnet.ad.jp
Japan
83
163
0
fe1-0.bkj15.jaring.my
Malaysia (Cyberjaya)
72
271
0
tsk-157-117.tm.net.my
Malaysia (Kuala Lumpur)
73
264
0
csl-lotemau.samcom.com.ws
Samoa
17
810
8
gateway.ix.singtel.com
Singapore
73
262
0
tp-col-r2.router.hinet.net
Taiwan
79
203
0
tp-s2-c12r1.router.hinet.net
Taiwan
0
0
100

20 posted on 01/27/2003 5:46:24 PM PST by ALS
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-48 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson