SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Guidance and Visibility
AAPL 277.34-0.5%10:39 AM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Kaliico who wrote (85474)3/19/2003 11:27:55 AM
From: Frederick Langford   of 208838
 
Hacker Struck Army Servers Via Unknown Software Flaw Tues
18 Mar 08:48

By Riva Richmond
Of DOW JONES NEWSWIRES

(This item was first published Monday night.)

NEW YORK (Dow Jones)--At least two U.S. Army Web servers were attacked last
Tuesday by a hacker or hacker group exploiting a previously unknown programming
flaw in Microsoft Corp.'s (MSFT) Windows 2000 software, according to
security-services company TruSecure Corp.

TruSecure discovered the attack Tuesday while conducting routine intelligence
gathering on the hacker community, said Russ Cooper, TruSecure's surgeon
general. The private Reston, Va., firm kept the information confidential until
Microsoft could provide customers with a fix for the flaw, which it did Monday.

"Everything indicates that only Army sites were attacked," Cooper said.

Though the attack appeared to be targeted, he had no evidence it was the work
of terrorists or a foreign government.

Iain Mulholland, security program manager at the Microsoft Security Response
Center said a customer, which he declined to name, informed Microsoft Wednesday
evening of an attack affecting IIS servers. The company has only received
"isolated" attack reports, and law enforcement has launched an investigation,
he said.

An Army spokesman couldn't immediately comment on the matter.

Microsoft posted a "critical" security alert on its Web site
(www.microsoft.com/security) Monday, as well as a patch for the flaw and advice
on several temporary workarounds for customers who cannot immediately apply the
patch.

Concern at Microsoft and Internet-security firms runs high because the attack
targeted what was an unknown flaw, a phenomenon security experts call a
"zero-day attack." Such attacks are rare and suggest a potentially short window
of time until an automated worm could be developed to quickly cripple millions
of machines.

"Zero-days are really, really bad," TruSecure's Cooper said. "It's very
likely an en masse exploitation is going to occur, in my opinion," and perhaps
in as little as seven to ten days. Worms that follow the revelation of a flaw
typically don't emerge for at least three to four weeks, he said.

The software flaw the hacker exploited was an unchecked buffer, or memory
area, in the Windows component of WebDAV, an extension to the HTTP protocol
that allows users in different locations to work together on the development of
Web content.

By using WebDAV to flood the memory area with an extra-long Web address, or
URL, the attacker was able to execute a program that gave him full control over
IIS 5.0 servers, including the ability to infiltrate other computers on its
network, plant backdoors and run any programs of his choice.

TruSecure's Cooper said the hacker that infiltrated the Army servers was
mapping the network "to see where else to go" when he was discovered. He was
also sending server data out through port TCP 3389, which carries a lot of
encrypted traffic, making it a good place to hide, Cooper said.

Internet Security Systems Inc. (ISSX) may have provided the army's
intrusion-detection software. Chris Rouland, director of its research arm,
X-Force, said a customer it wouldn't name was affected. Rouland said the
software detected the attack using protocol anomaly technology that took note
of unusually long Web addresses, which stretched to nearly 50,000 characters.

Rouland also said his company had no information suggesting the attack was an
event of cyberterror or cyberwar.

Companies who aren't immediately able to apply Microsoft's patch are urged by
Microsoft, TruSecure and Internet Security Systems to immediately disable
WebDAV if they don't need it. Customers can also download a tool from Microsoft
called URLScan that will reject URLs that are unusually long. Furthermore,
users can use Microsoft's IIS Lockdown tool to upgrade the security of their
Web servers.

-By Riva Richmond, Dow Jones Newswires; 201-938-5670;
riva.richmond@dowjones.com

(END) Dow Jones Newswires
03-18-03 0848ET
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext