Evidently, Its pretty serious...Well, Duh!

Squiggy

ThunderDick
Internet Attack Rattling Assumptions
WASHINGTON (AP) - Disruptions from the weekend attack on the Internet are shaking popular perceptions that vital national services, including banking operations and 911 centers, are largely immune to such attacks.

Damage in some of these areas was worse than many experts had believed possible.

The nation's largest residential mortgage firm, Countrywide Financial Corp., told customers who called Monday that its systems were still suffering. Its Web site, where customers can make payments and check their loans, was closed most of the day.

Countrywide predicted it would be early Tuesday before all its computers were fully repaired and its systems validated for security, spokesman Rick Simon said.

Police and fire dispatchers outside Seattle resorted to paper and pencil for hours after the virus-like attack on the weekend disrupted operations for the 911 center that serves two suburban police departments and at least 14 fire departments.

American Express Co. confirmed that customers couldn't reach its Web site to check credit statements and account balances during parts of the weekend. The attack prevented many customers of Bank of America Corp., one of the largest U.S. banks, and some large Canadian banks from withdrawing money from automatic teller machines Saturday.

President Bush's No. 2 cyber-security adviser, Howard Schmidt, acknowledged that what he called ``collateral damage'' stunned even the experts who have warned about uncertain effects on the nation's most important electronic systems from mass-scale Internet disruptions.

``This is one of the things we've been talking about for a long time, getting a handle on interdependencies and cascading effects,'' he said.

Miles McNamee, a top official with the technology industry's Internet early warning center, said the attack was ``comparable to the worst of previous denial of service attacks.''

The White House and Canadian defense officials confirmed they were investigating how the attack, which started about 12:30 a.m. EST Saturday, could have affected ATM banking and other important networks that should remain immune from traditional Internet outages.

The attack, alternately dubbed ``Slammer'' or ``Sapphire,'' sought vulnerable computers to infect using a known flaw in popular database software from Microsoft Corp. called ``SQL Server 2000.''

Microsoft said it has sold 1 million copies of the software, but the flawed code was also included in some popular consumer products from Microsoft, including the latest version of its Office XP collection of business programs.

The attacking software scanned for victim computers so randomly and aggressively that it saturated many of the Internet largest data pipelines, slowing e-mail and Web surfing globally.

Congestion from the Internet attack is almost completely cleared. That has left investigators poring over the blueprints for the Internet worm for clues about its origin and the identity of its author.

Complicating the investigation was how quickly the attack spread across the globe, making it nearly impossible for researchers to find the electronic equivalent of ``patient zero,'' the earliest-infected computers.

``Basically within one minute, the game was over,'' said Johannes Ullrich of Boston, who runs the D-Shield network of computer monitors.

Experts said blueprints of the attack software were similar to a program published on the Web months ago by David Litchfield of NGS Software Inc., a respected British security expert who last year discovered the flaw in Microsoft's database software that made the attack possible. NGS Software sells a program to improve security for such databases.

The attack software also was similar to computer code published weeks ago on a Chinese hacking Web site by a virus author known as ``Lion,'' who publicly credited Litchfield for the idea.

Litchfield said he deliberately published his blueprints for computer administrators to understand how hackers might use the program to attack their systems.

``Anybody capable of writing such a worm would have found out this information without my sample code,'' Litchfield said.

Still, Litchfield's disclosure was likely to re-ignite a dispute about how much information to disclose serious vulnerabilities are found in popular software. (PROFILE (CO:American Express Co; TS:AXP; IG:FIS;) (CO:Microsoft Corp; TS:MSFT; IG:SOF;) )

Copyright 2003 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
 
I had problems for 3 days. I thought it was my modem. Comcast swore they weren't affected, so it had to me the modem...right? It's been back to normal since last night.:grumpy: Stupid Comcast.
 
Same here. This is the first time in the two years i've used my school network that it has ever been down due to a dos attack.
 
I had slow periods :eek6: (don't even think about it) a few times. I've heard we can expect more for about a week....I just found it humorous that they thought themselves immune. Especially since the code to it had been published.
 
Squiggy said:
``Basically within one minute, the game was over,'' said Johannes Ullrich of Boston, who runs the D-Shield network of computer monitors.
Now, that's the scary part.
:eek:
 
When the attack started, I was here, thnking fury was playing with the plumbing again. Everywhere else I went was fine. Noticed more lag on Sunday morning then it got back to normal. I read somewhere that it was a practice run but the pentagon was evidently not affected. hmmmm.
 
I just hope the people looking after my money aren't such a big bunch of wallies... not much chance of that!:(
 
Is it just me, or does it seem like the more "security updates"
Microsoft puts out, the worse this stuff gets>:confuse3: :shrug:
 
Gonz said:
thnking fury was playing with the plumbing again
:lol:

The whole internet has been slow for me ever since this attack started. I can't even download the site backups at more than 16kb/s, where I used to get them at full speed, 400kb/s.
 
I truely think Billy G does have his own squad of hackers
just trying to prove that Linux systems aren't that secure.:(

No really
I do really.:confuse3: :retard:
 
The worst part is that the fix for that bug has been availible since last summer. Pure fucking lasiness on the IT's part.
 
catocom said:
I truely think Billy G does have his own squad of hackers
just trying to prove that Linux systems aren't that secure.
if he does then he should fire them, this worm only affected ms-sql.
Litchfield's disclosure was likely to re-ignite a dispute about how much information to disclose serious vulnerabilities are found in popular software
it's the right and responsibility of concerned/affected parties to know about such vulnerabilities in a timely manner. notice what happens when a vulnerability is published to the oss community, fixes are released and life goes on, except for those who are too busy eating fritos to patch their boxes. the general incompetence of ms and many ms-knowlegeable people is alarming to me. although i realize it's just more room for advancement for me:headbang:
 
Back
Top