Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Internet Attack's Disruptions More Serious Than Many Thought Possible
AP via TBO ^ | Jan 27, 2003 | Ted Bridis

Posted on 01/27/2003 4:53:05 PM PST by John W

WASHINGTON (AP) - The weekend attack on the Internet crippled some sensitive corporate and government systems, including banking operations and 911 centers, far more seriously than many experts believed possible. The nation's largest residential mortgage firm, Countrywide Financial Corp., told customers who called Monday it was still suffering from the attack. Its Web site, where customers usually can make payments and check their loans, was closed with a note about "emergency maintenance."

Police and fire dispatchers outside Seattle resorted to paper and pencil for hours Saturday after the virus-like attack disrupted operations for the 911 center that serves two suburban police departments and at least 14 fire departments.

American Express Co. confirmed that customers couldn't reach its Web site to check credit statements and account balances during parts of the weekend. Perhaps most surprising, the attack prevented many customers of Bank of America Corp., one of the largest U.S. banks, and some large Canadian banks from withdrawing money from automatic teller machines Saturday.

President Bush's No. 2 cyber-security adviser, Howard Schmidt, acknowledged Monday that what he called "collateral damage" stunned even experts who have warned about uncertain effects on the nation's most important electronic systems from mass-scale Internet disruptions.

"One would not have expected a request for bandwidth would have affected the ATM network," Schmidt said. "This is one of the things we've been talking about for a long time, getting a handle on interdependencies and cascading effects."

The White House and Canadian defense officials confirmed they were investigating how the attack, which started about 12:30 a.m. EST Saturday, could have affected ATM banking and other important networks that should remain immune from traditional Internet outages.

Schmidt said early reports suggested private ATM networks overlapped with parts of the public Internet. Such design decisions were criticized as "totally brain-dead" by Alex Yuriev of AOY LLC, a Philadelphia-based consulting firm for banks and telecommunications companies.

Officials were most concerned about risks that citizens might lose confidence in financial networks.

"Their bread and butter is the public being able to get access to their accounts when and where they want them," said Ron Dick of Computer Sciences Corp., former head of the FBI's National Infrastructure Protection Center. "Even during nominal disruptions, the key is having a plan so you can provide assurances to your customers."

The virus-like attack, alternately dubbed "slammer" or "sapphire," sought out vulnerable computers to infect using a known flaw in popular database software from Microsoft Corp. called "SQL Server 2000." The attacking software scanned for victim computers so randomly and so aggressively that it saturated many of the Internet largest data pipelines, slowing e-mail and Web surfing globally.

"One thing people have always feared was that the mesh among certain critical infrastructure sectors would be affected, and there was some of that," said Eddie Schwartz, a vice president at Predictive Systems Inc., which runs Internet warning centers for the banking and energy industries.

Congestion from the Internet attack eased over the weekend and was almost completely normal by Monday. That left investigators poring over the blueprints for the Internet worm for clues about its origin and the identity of its author.

Complicating the investigation was how quickly the attack spread across the globe, making it nearly impossible for researchers to find the electronic equivalent of "patient zero," the earliest infected computers.

"Basically within one minute, the game was over," said Johannes Ullrich of Boston, who runs the D-Shield network of computer monitors. He watched the attack spread with alarming speed worldwide. Asia, especially Korea, was among the areas hardest-hit.

Experts said blueprints of the attack software were similar to a program published on the Web months ago by David Litchfield of NGS Software Inc., a respected British security expert who discovered the flaw in Microsoft's database software last year.

The attack software also was similar to computer code published weeks ago on a Chinese hacking Web site by a virus author known as "Lion," who publicly credited Litchfield for the idea.

Litchfield said he deliberately published his blueprints for computer administrators to understand how hackers might use the program to attack their systems.

"Anybody capable of writing such a worm would have found out this information without my sample code," Litchfield said. "Just because someone publishes a proof-of-concept code doesn't necessarily help the people we should be worried about."

Still, Litchfield's disclosure was likely to reignite a simmering dispute among security researchers and technology companies about how much information to disclose when they discover serious vulnerabilities in popular software.

"I personally would rather people not publish exploit code," said Steve Lipner, a top security official at Microsoft Corp.

Litchfield responded that his warnings about the threat - plus his detailed example - might have frightened many professionals into installing software repairs. Microsoft said the number of users downloading its repairing patch reached 6,800 per hour Monday.


TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Front Page News; Government; News/Current Events
KEYWORDS: microsoftexploits
Navigation: use the links below to view more comments.
first previous 1-2021-4041-48 next last
To: John W
The 911 system runs on the Internet? Dumb gone to seed.
21 posted on 01/27/2003 5:50:59 PM PST by gitmo ("The course of this conflict is not known, yet its outcome is certain." GWB)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Principled
You need an anti-virus, the firewall protects you from other types of attacks.
22 posted on 01/27/2003 5:55:55 PM PST by FrogMom
[ Post Reply | Private Reply | To 3 | View Replies]

To: gitmo
I imagine an expert techie can tell us why these things were done,my guess is it was another "way cool" thing we could do thanks to the house o' cards clinton roaring nineties,so we did it.Repercussions be damned.
23 posted on 01/27/2003 5:57:28 PM PST by John W
[ Post Reply | Private Reply | To 21 | View Replies]

To: John W
I hope a virus doesn't shut down the Iraq invasion. The Blue Screen of Death in the middle of a tank battle would be the opposite of helpful.
24 posted on 01/27/2003 6:01:35 PM PST by gitmo ("The course of this conflict is not known, yet its outcome is certain." GWB)
[ Post Reply | Private Reply | To 23 | View Replies]

To: My2Cents
I read somewhere recently that the Chicom Army hackers are working hard to undermine US computers through the net. Is that feasible and how come our security is not better now against hackers?
25 posted on 01/27/2003 6:19:55 PM PST by Paulus Invictus
[ Post Reply | Private Reply | To 2 | View Replies]

To: All
bookmarking
26 posted on 01/27/2003 6:21:05 PM PST by MarMema
[ Post Reply | Private Reply | To 25 | View Replies]

To: gitmo
The Blue Screen of Death...
wont' be happening in our tanks, as the military is on it's own proprietary systems... many of which are 'nixers I think... all of various flavors.
27 posted on 01/27/2003 6:42:40 PM PST by Robert_Paulson2 (clintonsgotusbytheballs?)
[ Post Reply | Private Reply | To 24 | View Replies]

To: danelectro
i don't understand why these servers were able to be accessed from the internet. i saw earlier today other apps (.net programming environment and one other) also installed the vunerable sql component. i'm wondering if there were more than those two, because it doesn't seem possible the worm should be able to get at so many backoffice machines.

There are at least two ways that this could have gotten through firewalls:

  1. Port 1434 was left open in a firewall. It might have been intentional (for remote applications that access the SQL server directly) or unintentional (and stupid).

  2. Because the SQL server was installed on user's computers as part of certain programming environments, someone could easily get their laptop compromised while at home on a cablemodem, DSL or dialup line, then connect it to the corporate network inside the firewall. Once it is inside the firewall, it can propagate unchecked.

28 posted on 01/27/2003 7:28:35 PM PST by justlurking
[ Post Reply | Private Reply | To 15 | View Replies]

To: justlurking
There are at least two ways that this could have gotten through firewalls:

i'm really curious now, about the factors that caused this to be such a serious event. i can accept that some places had port 1434 open due to negligence/incompentence. i can accept that some developer's workstations were also vunerable. i'd like to see how many infected machines were needed to saturate n amount of bandwidth, etc. it's not like nimba, where the iis webserver was installed on many many machines and users weren't aware. only programmers and businesses have ms sql server on their machines.

i'm sure some interesting studies are going to come out of this.

29 posted on 01/27/2003 7:47:30 PM PST by danelectro
[ Post Reply | Private Reply | To 28 | View Replies]

To: danelectro
A lot more damage was done than will be reported. I am working now because of this thing. There was severe disruption to most major companies.

Microsoft's own internal netrowk was unusable for a time on Sat.
30 posted on 01/27/2003 8:23:52 PM PST by jbstrick (Behold the Power of CHEESE!)
[ Post Reply | Private Reply | To 29 | View Replies]

To: jbstrick
Microsoft's own internal netrowk was unusable for a time on Sat.

do you think this was caused by employees with laptops from home, who were vunerable, and then connected to company resources? or did the attack make it through the ms firewall?

i can't get my mind around a major company allowing those sort of port requests through the firewall.

31 posted on 01/27/2003 8:30:39 PM PST by danelectro
[ Post Reply | Private Reply | To 30 | View Replies]

To: danelectro
Not sure how it happened.

All it takes it one computer. It was scary how fast this thing spread.

32 posted on 01/27/2003 8:36:55 PM PST by jbstrick (Behold the Power of CHEESE!)
[ Post Reply | Private Reply | To 31 | View Replies]

To: John W
What luck keeps air traffic control systems and the Navy's shipboard's from being so affected? Portions of both use MS software, and SQL-Server, not all updated to current patch release, I'd guess.

Thankfully non-MS systems account for the must-work parts, still ...

33 posted on 01/27/2003 8:38:59 PM PST by bvw
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W
... "collateral damage" stunned even experts who have warned about uncertain effects on the nation's most important electronic systems from mass-scale Internet disruptions...wife validated her renewed Visa card by phone Saturday afternoon, went to use it for the first time today in Walmart, and was told card was rejected, not yet validated - we're guessing it was somehow related to this "worm" - embarrassing and inconvenient, not earthshaking, but does get you thinking about how vulnerable we are in all sorts of ways should one of these things ever really get going......
34 posted on 01/27/2003 9:07:42 PM PST by Intolerant in NJ
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W
Welcome to the 21st century.
35 posted on 01/27/2003 9:09:41 PM PST by Valin (Place Your Ad Here!)
[ Post Reply | Private Reply | To 1 | View Replies]

I think this attack was the best thing that could have happened right now. Helped to wake up some of the bone-head idiots who are the weak links right now. They've got less than a month to get their weaknesses patched and deploy some better defenses. All bets are off once the real war begins. No excuses for a bank to allow this to happen, incredibly pathetic.

In fact, it wouldn't surprise me in the least if the US gov't launched this as both a test to expose vulnerabilities and as a wake up call. Maybe, maybe not, but if they were not behind it, they should have been.
36 posted on 01/27/2003 9:14:29 PM PST by Diddle E. Squat
[ Post Reply | Private Reply | To 34 | View Replies]

To: John W
"Why?"

Banks are now using Virtual Private Network (VPN) technology to connect their ATMs. A VPN is an encrypted tunnel that rides over a public network......in this case the Internet.

According to Microsoft and Cisco, Internet technology (TCP/IP) will soon supplant traditional telephone and television networks.

After Code Red, Nimda, Slammer and other, various and recent attacks on the internet and corp networks, I've convinced myself I have to get some of what they're smokin'.

Look for innovation, IBM & NORTEL (ENTrust) to start solving this problem at the expense of the new giants.

Look for many Corp IT Architects and Business leaders begin to fade from favor.

It's a great time for new blood to rise.

37 posted on 01/27/2003 9:18:40 PM PST by Mariner
[ Post Reply | Private Reply | To 1 | View Replies]

To: gitmo
"Dumb gone to seed."

LOL! Good way to put it.

38 posted on 01/27/2003 9:35:01 PM PST by sweetliberty (Go Al, go!)
[ Post Reply | Private Reply | To 21 | View Replies]

To: justlurking
You're right.

Most of the infection got into corporate networks via VPN users......even MS Developers with .Net installed on their PC......and running a split tunnel to the internet.

Once in, it spread like wildfire through the ECommerce infrastructure developed on MSSQL and allowing UDP1434.

Corporate America got a wake-up call like no other before this weekend (LET ME TESTIFY!) and the whole MS and "internet thingy" is under a cloud.

IT pros are fed up with this sh!t.

Two years of hell I tell ya.........the endless patch and upgrade.

39 posted on 01/27/2003 9:57:10 PM PST by Mariner
[ Post Reply | Private Reply | To 28 | View Replies]

To: Mariner
SQL server vulnerability and the port scanning have been going on for months. All that's new is this particular strain of worm.

May is a long time ago as patches go, but you don't install a MS patch or update just because MS says so, in a large enterprise there can be unintended consequences.

I just wouldn't use SQL Server, there's plenty other options out there that aren't worm magnets.
40 posted on 01/27/2003 10:26:55 PM PST by D-fendr
[ Post Reply | Private Reply | To 39 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-48 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson