Wannacry Ransomware

Total Page:16

File Type:pdf, Size:1020Kb

Wannacry Ransomware KNOW THE UNKNOWN® Success Story: WannaCry Ransomware WHITE PAPER Challenge Stopping a Worm & Saving Millions Worms like WannaCry and Petya operate as essentially Even the most recent of these attacks like WannaCry and zero-day attacks: they can lie dormant on our networks Petya still echo the basic principles of past-worms, and as and then rapidly spread between devices upon waking up. such, they are both preventable and stoppable. During The consequences of being hit by one is dramatic: precious the Code Red, Nimda, and ILOVEYOU attacks of the early- data is either ransom-locked or wiped and thus often 2000s, businesses that had invested in a NIKSUN-like irrecoverable. This means millions in lost data, restoration solution were able to run a rapid report to get a list of fees, public relations, and stock-holder confidence. all infected devices and cut them off from their network. Instead of thousands of machines being affected, they When FedEx was hit by Petya, for example, their subsidiary were able to resolve the incident with minor losses of TNT Express experienced “widespread service delays” and hundreds or less. This process takes a mere few minutes were unable to “fully restore all of the affected systems and thus could have saved Reckitt Benckiser from their and recover all of the critical business data that was hour-long attack. encrypted by the virus.”1 Shares in the company dropped 3.4% in the wake of the attack.2 Total, 100% visibility is simply the only way to stop these worms from becoming too damaging. It not only makes Consumer goods giant Reckitt Benckiser downgraded the worm trackable and stoppable as it spreads, it can their full-year revenue growth target by 1% due to even allow you to discover it while it is sitting dormant. the same attack. The company’s CEO said around 500 By having a holistic view of your network, you can find out systems, 2,000 servers, and 15,000 laptops were affected exactly where a worm is and where it is spreading to so by the virus, which took a mere 45 minutes to 1 hour to that it can be removed from your network. propagate. Company shares dropped 3% following this announcement.3 There is no other way to get this information. Just as the CDC needs to know who has a virus and where they are A similar attack on ECMC, a hospital based in Buffalo, NY, located so that it can quarantine them to stop its spread, took down 6,000 computers and forced staff to rely on administrators need a full view of your network to find and paper charts and face-to-face messaging. According to resolve malware incidents. Similarly, this 100% visibility is their own admission, remediation costs totaled nearly $10 needed to conduct a thorough investigation ex-post to million.4 understand who let malware onto your network, when and where it happened, and how it took place to better Losses to companies have hit hundreds of millions protect your assets in the future. of dollars. Networks infected by such worms cause widespread service and business disruption, staff While many businesses are not proactive in protecting inefficiencies when calendaring systems go offline, and themselves from such threats, those that are save large-scale data loss when work, emails, and notes are themselves from massive losses. Cyber attacks are a real, wiped out. Such costs will only continue to mount as new known problem with widespread consequences. Taking cyber threats and vulnerabilities are always found. Not the steps necessary to detect and resolve incidents is long after the WannaCry and Petya attacks, for example, absolutely critical to ensuring your company stays afloat. Microsoft announced a newly discovered exploit in all SMB protocols which threatens nearly every enterprise Why Do Cyber Threats Persist Despite across the world. 5 Significant Investment to Counteract The most difficult challenge with these worms is finding Them? them and halting their spread before such massive damage is done. They leave very little trace of their entry The fundamental reason that many cyber attacks still get before they wake-up, making spotting the WannaCry through is because all traditional security sensors still attack before it takes place incredibly problematic. And rely upon known vectors. While many solutions claim to when the attack begins, their spread is extremely fast and supply us with “all the data,” it is important to inquire can take down huge portions of a network within a single whether it is really “all of it” or just “all of that which they day. are aggregating.” 2 Success Story: WannaCry Ransomware any incident that has taken place, we can also watch video For example, log aggregation solutions may suggest “we feeds in real-time and stop security breaches as they occur. have all the data” and, indeed, they can supply us with In fact, we can also set up image processing software that every log that has been made. However, let us think can look for patterns and behaviors and send out alerts, about how the logs are generated in the first place. In the lock doors to trap the intruder, and more. example of a computer, the logs that are generated are a result of someone determining what is important to log in So the obvious answer to our problem of stopping and the first place. It is fundamentally restricted by some input investigating cyber threats, including even zero day attacks, that dictates what to log and what not to log. is to create something like a security camera that watches over every transaction. This is exactly what NIKSUN has The same problematic input is required in event data been doing and perfecting over two decades. NIKSUN collection. Someone, or some configuration, has integrates full (or partial if required for privacy, etc.) packet determined the conditions under which an event is capture with complete analytics at the packet, session, generated. SIEM tools then collect all these events and and all the way to the application layer. With NIKSUN, zero present them to the user for analysis. So yes, they do day attacks cannot be hidden from surveillance because have “all the data,” only if the definition of the data is “all it has already captured all actual activity of the malware. events.” The malware has no way to circumvent being captured if Similarly with flow data, it is determined what flows to it is deposited via the network or if it conducts any activity log and how much metadata to include in the flow record. on the network. Inevitably, when we implement a solution where we Metadata, flow-data, malware, and APT analysis, as well believe we have “all the data,” we need to fundamentally as anti-virus programs and system patches, are proven understand if it is “all” or some subset category of the now to be insufficient to combat such attacks. While such greater “all.” tools are useful in their own right (and all of these types of analysis are also included in NIKSUN’s solution suite), they It should now be clear how zero day attacks succeed. cannot provide answers to unknown threats that operate We may think we have “all the data” but we actually are in the “dark” part of your network – the part that we only given “all the logs or events” that we are collecting. aren’t collecting logs and events about. Analysis can only Hackers, or to be precise crackers, know that this is what be done with pre-known knowledge, so zero-day attacks we are doing. They design their attacks to go around and worms which hide under the typical radar are not the visibility that we have into logs and events. In other easily detected and resolved. Anti-virus programs also rely words, they find a way around these known methods by on having the signature of an attack prior to it occurring, operating in the “dark” parts of our networks. while system patches are only a retroactive fix and cannot find malware that was deposited while doors were open. So how can we succeed here? In order to understand what solutions might actually work, we can turn to the Given that NIKSUN has the ability to record a vast amount physical world to gain some insights. In this realm, for of information, the question becomes if we can find the example, buildings have access logs. Collecting all access information that we are looking for quickly. If we were logs may lead us to conclude that we have “all the data,” to take continuous, 24/7 footage of a vault, for example, but in reality, it is not sufficient to prove who did what, it would be useless without being able to easily search when, where, and how. While access logs may help us through it to find notable events. This fundamental look for a correlation between when someone entered difficulty is exactly what NIKSUN has solved and why it is and what occurred, such a task often requires a supremely the pioneer and industry leader in this space. NIKSUN’s time consuming investigation and yet can never be 100% singular mission is to record all data at the highest rates definite if there are multiple personnel that may match without dropping a single packet and at the same time our search criteria. also index all the data in real-time to allow for extremely fast searching. If a robbery takes place, how can we know that, without a doubt, it was a particular individual who is responsible? But can anyone, not just heavily specialized cybersecurity How can we prove what they did, when, where, and how experts, use such a tool? Over the course of its existence, they did it? The answer to this is to place security cameras NIKSUN has made this possible as well.
Recommended publications
  • Undergraduate Report
    UNDERGRADUATE REPORT Attack Evolution: Identifying Attack Evolution Characteristics to Predict Future Attacks by MaryTheresa Monahan-Pendergast Advisor: UG 2006-6 IINSTITUTE FOR SYSTEMSR RESEARCH ISR develops, applies and teaches advanced methodologies of design and analysis to solve complex, hierarchical, heterogeneous and dynamic problems of engineering technology and systems for industry and government. ISR is a permanent institute of the University of Maryland, within the Glenn L. Martin Institute of Technol- ogy/A. James Clark School of Engineering. It is a National Science Foundation Engineering Research Center. Web site http://www.isr.umd.edu Attack Evolution 1 Attack Evolution: Identifying Attack Evolution Characteristics To Predict Future Attacks MaryTheresa Monahan-Pendergast Dr. Michel Cukier Dr. Linda C. Schmidt Dr. Paige Smith Institute of Systems Research University of Maryland Attack Evolution 2 ABSTRACT Several approaches can be considered to predict the evolution of computer security attacks, such as statistical approaches and “Red Teams.” This research proposes a third and completely novel approach for predicting the evolution of an attack threat. Our goal is to move from the destructive nature and malicious intent associated with an attack to the root of what an attack creation is: having successfully solved a complex problem. By approaching attacks from the perspective of the creator, we will chart the way in which attacks are developed over time and attempt to extract evolutionary patterns. These patterns will eventually
    [Show full text]
  • Nimda Worm Shows You Can't Always Patch Fast Enough
    Research Publication Date: 19 September 2001 ID Number: FT-14-5524 Nimda Worm Shows You Can't Always Patch Fast Enough John Pescatore Nimda bundles several known exploits against Internet Information Server and other Microsoft software. Enterprises with Web applications should start to investigate less- vulnerable Web server products. © 2001 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice. NEWS ANALYSIS Event On 18 September 2001, a new mass-mailing computer worm began infecting computers worldwide, damaging local files as well as remote network files. The w32.Nimda.A @ mm worm can spread through e-mail, file sharing and Web site downloads. For more information, visit: http://www.microsoft.com/technet/security/topics/Nimda.asp or http://www.sarc.com/avcenter/venc/data/[email protected]. Analysis As a "rollup worm," Nimda bundles several known exploits against Microsoft's Internet Information Server (IIS), Internet Explorer (IE) browser, and operating systems such as Windows 2000 and Windows XP, which have IIS and IE embedded in their code. To protect against Nimda, Microsoft recommends installing numerous patches and service packs on virtually every PC and server running IE, IIS Web servers or the Outlook Express e-mail client.
    [Show full text]
  • Code Red Worm Propagation Modeling and Analysis ∗
    Code Red Worm Propagation Modeling and Analysis ∗ Cliff Changchun Zou Weibo Gong Don Towsley Dept. Electrical & Dept. Electrical & Dept. Computer Science Computer Engineering Computer Engineering Univ. Massachusetts Univ. Massachusetts Univ. Massachusetts Amherst, MA Amherst, MA Amherst, MA [email protected] [email protected] [email protected] ABSTRACT the Internet has become a powerful mechanism for propa- The Code Red worm incident of July 2001 has stimulated gating malicious software programs. Worms, defined as au- activities to model and analyze Internet worm propagation. tonomous programs that spread through computer networks In this paper we provide a careful analysis of Code Red prop- by searching, attacking, and infecting remote computers au- agation by accounting for two factors: one is the dynamic tomatically, have been developed for more than 10 years countermeasures taken by ISPs and users; the other is the since the first Morris worm [30]. Today, our computing in- slowed down worm infection rate because Code Red rampant frastructure is more vulnerable than ever before [28]. The propagation caused congestion and troubles to some routers. Code Red worm and Nimda worm incidents of 2001 have Based on the classical epidemic Kermack-Mckendrick model, shown us how vulnerable our networks are and how fast we derive a general Internet worm model called the two- a virulent worm can spread; furthermore, Weaver presented factor worm model. Simulations and numerical solutions some design principles for worms such that they could spread of the two-factor worm model match the observed data of even faster [34]. In order to defend against future worms, we Code Red worm better than previous models do.
    [Show full text]
  • Ethical Hacking
    Official Certified Ethical Hacker Review Guide Steven DeFino Intense School, Senior Security Instructor and Consultant Contributing Authors Barry Kaufman, Director of Intense School Nick Valenteen, Intense School, Senior Security Instructor Larry Greenblatt, Intense School, Senior Security Instructor Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Official Certified Ethical Hacker © 2010 Course Technology, Cengage Learning Review Guide ALL RIGHTS RESERVED. No part of this work covered by the copyright herein Steven DeFino may be reproduced, transmitted, stored or used in any form or by any means Barry Kaufman graphic, electronic, or mechanical, including but not limited to photocopying, Nick Valenteen recording, scanning, digitizing, taping, Web distribution, information networks, Larry Greenblatt or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior Vice President, Career and written permission of the publisher. Professional Editorial: Dave Garza Executive Editor: Stephen Helba For product information and technology assistance, contact us at Managing Editor: Marah Bellegarde Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, Senior Product Manager: submit all requests online at www.cengage.com/permissions Michelle Ruelos Cannistraci Further permissions questions can be e-mailed to Editorial Assistant: Meghan Orvis [email protected]
    [Show full text]
  • THE CONFICKER MYSTERY Mikko Hypponen Chief Research Officer F-Secure Corporation Network Worms Were Supposed to Be Dead. Turns O
    THE CONFICKER MYSTERY Mikko Hypponen Chief Research Officer F-Secure Corporation Network worms were supposed to be dead. Turns out they aren't. In 2009 we saw the largest outbreak in years: The Conficker aka Downadup worm, infecting Windows workstations and servers around the world. This worm infected several million computers worldwide - most of them in corporate networks. Overnight, it became as large an infection as the historical outbreaks of worms such as the Loveletter, Melissa, Blaster or Sasser. Conficker is clever. In fact, it uses several new techniques that have never been seen before. One of these techniques is using Windows ACLs to make disinfection hard or impossible. Another is infecting USB drives with a technique that works *even* if you have USB Autorun disabled. Yet another is using Windows domain rights to create a remote jobs to infect machines over corporate networks. Possibly to most clever part is the communication structure Conficker uses. It has an algorithm to create a unique list of 250 random domain names every day. By precalcuting one of these domain names and registering it, the gang behind Conficker could take over any or all of the millions of computers they had infected. Case Conficker The sustained growth of malicious software (malware) during the last few years has been driven by crime. Theft – whether it is of personal information or of computing resources – is obviously more successful when it is silent and therefore the majority of today's computer threats are designed to be stealthy. Network worms are relatively "noisy" in comparison to other threats, and they consume considerable amounts of bandwidth and other networking resources.
    [Show full text]
  • Virus Bulletin, January 2003
    ISSN 0956-9979 13666614 JANUARY 2003 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Helen Martin CONTENTS Technical Consultant: Matt Ham Technical Editor: Jakub Kaminski COMMENT If Not Now, Then When? 2 Consulting Editors: VIRUS PREVALENCE TABLE 3 Nick FitzGerald, Independent consultant, NZ Ian Whalley, IBM Research, USA NEWS Richard Ford, Independent consultant, USA 1. Lessons to be Learned 3 Edward Wilding, Data Genetics, UK 2. A Happy New Year 3 LETTERS 4 IN THIS ISSUE: VIRUS ANALYSIS IM a Hot Rod(ok) 5 • Conventional wisdom: Nick FitzGerald reports on recent efforts to extend and formalise the CARO Virus Naming FEATURES Convention. See p.7. 1. A Virus by Any Other Name • It’s the quiet ones you have to watch. Although consid- – Virus Naming Updated 7 ered a ‘minor’ curiosity when it made its initial appearance, 2. Are You Being [Opa]Serv[ed]? 10 W32/Opaserv is fast becoming a major headache. Martin 3. Infected or Affected, Overton looks at the spread of what some consider to be the Mobile Users Are Being Plagued 14 ‘quiet twin’ of Klez. See p.10. INSIGHT • Upwardly mobile? Analyst IDC forecasts the number of Hooked on a Feeling 16 wireless SMS messages soaring from 1.4 billion messages in 2002 to a whopping 42 billion in 2006. However, users PRODUCT REVIEW of SMS devices are increasingly being victimized by both Ahnlab V3Net for Windows Server SE 18 spam and email worms. Mary Landesman investigates the dark side of SMS text messaging that could derail the gravy END NOTES AND NEWS 24 train.
    [Show full text]
  • Cyber Security and Leadership Solutions
    Cyber Security and Leadership Solutions James Risler Manager – Security Content Development MBA, CISSP #456200, CCIE# 15412 [email protected] © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 • The “Why” • Trends • Threat Landscape • Examples of Cyber Attacks • Business Challenge • People Problem • Recommendations • Conclusion & Q&A © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 The “Why” Anthem Home Depot JP Morgan Adobe Target Univ. of MD Neiman Marcus TJ Maxx Sony Zappos LinkedIn Citigroup Florida Courts http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Attacks per vertical segment • Over 15% of attacks are targeted at financial institutions • Attacks include : DDoS Spyware Ransomware Mobile devices SPAM Web Exploits • Source : IDC ™ © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 • 2008 – 100 Million Credit and debit card numbers stolen by spyware from Heartland Payment Systems • 2014 – 76 Million household accounts and 7 million SMB accounts compromised at JP Morgan Chase • 2015 - DDoS attack launched on OP-Pohjola and Danske Bank • ... And more : European Central Bank extortion attempt Multi-bank attack by Eurograbber © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Threat Landscape is Evolving… Reputation Enterpris Antivirus IDS/IPS Intelligence (Global) e (Host- (Network and and Response Based) Perimeter) Analytics Sandboxing (Cloud) Spyware Increased APT’S Attack and Cyberwar Worms Rootkits Surface 2000 2005 2010 Tomorrow © 2010 Cisco and/or its affiliates. All rights reserved.
    [Show full text]
  • Introduction to Computer and Communications Security
    Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern, and Anita Kesavan (ISBN 1590597842; http://www.foundationsofsecurity.com). Except as otherwise noted, the content of this presentation is licensed under the Creative Commons 3.0 License. Agenda Worms spreading across Internet through vulnerabilities in software History of Worms Morris Worm Code Red Nimda Blaster & SQL Slammer Rootkits, Botnets, Spyware, and more Malware What Is a Worm? Virus: program that copies itself into other programs Could be transferred through infected disks Rate dependent on human use Worm: a virus that uses the network to copy itself onto other computers Worms propagate faster than viruses Large # of computers to infect Connecting is fast (milliseconds) An Abridged History of Worms Examples of how worms affect operation of entire Internet First Worm: Morris Worm (1988) Code Red (2001) Nimda (2001) Blaster (2003) SQL Slammer (2003) Morris Worm: What It Did Damage: 6000 computers in just few hours Extensive network traffic by worm propagating What: just copied itself; didn’t touch data Exploited and used: buffer overflow in fingerd (UNIX) sendmail debug mode (execute arbitrary commands such as copying worm to another machine) dictionary of 432 frequently used passwords to login and remotely execute commands via rexec, rsh The Morris Worm: What We Learned Diversity is good: Homogenity of OSes on network -> attacker can exploit vulnerabilities common to most machines Large
    [Show full text]
  • History  Epidemiological Modeling
    Outline Internet Worms Paxson, Savage, Voelker, Weaver Morning session (understanding) The 10,000 foot issues Overview and taxonomy Worm history Epidemiological modeling Afternoon session (defenses) Overview Detection Signature-based Behavioral Mitigation 1 A Brief History Of Significant Worms Internet Worms Paxson, Savage, Voelker, Weaver The Shockwave Rider & When HARLIE Was One Shock & Hupp: Workhorse Worms The Christmas Tree worm Morris Worm Ramen, 1i0n, Adore ExploreZip & OpenShares Worms Klez32 Code Red Aside: Internet Telescopes Nimda Slammer Blaster/Welchia/Sasser Witty 2 The Shockwave Rider: Worms in Science Fiction Internet Worms Paxson, Savage, Voelker, Weaver 1975 Science Fiction dystopia written by John Brunner Regarded as pre-cyberpunk A primary feature: tapeworms Mobile, autonomous programs which serve the releaser’s intent Global distributed computing infrastructure is bogged down by competing, malicious worms Often used to cloak financial/other information Name was used by Shock & Hupp to describe their programs Self-propagating malicious program (the VIRUS program) described by David Gerrold in When HARLIE was One in 1972 The VIRUS program would be called a worm today: actively searching for and infecting new victims Also extortion virology: the VACCINE program cost money 3 Shoch & Hupp: The Worm Programs [SH82] Internet Worms Paxson, Savage, Voelker, Weaver Can you use worms to do Model was mobile but not anything good? replicating Issues (still relevant): Experiments at Xerox
    [Show full text]
  • Cyber Threats
    CYBERTHREATS - MYTHS OR REALITY? by Zahri Yunos and Ahmad Nasir Mohd Zin National ICT Security and Emergency Response Centre (NISER) (This article was published in The Star InTech on 9 October 2003) INTRODUCTION The dominance and extensive growth of Information and Communication Technology (ICT) makes cyberattacks an increasingly attractive and effective weapon to use against countries. It is attractive to many because it is cheap in relation to the cost of developing, maintaining and using advanced military capabilities. It may cost a little to suborn an insider, create false information, manipulate information or launch malicious logic-based weapons against an information system connected to the globally shared telecommunications infrastructure. CASES OF CYBERTHREATS Some people believe that cyberthreats are just a concept others argue that cyberattacks are serious enough to be considered a threat to national security. Some even go to the extent of believing that an Electronic Pearl Harbour is in the making. Even though the public may not know how serious the aftermath may be, the stories of successful cyberattacks should raise some alarms. Many cases were reported outside Malaysia as a result of cracker activities. For example in 1996, a computer hacker who used the on-line name of “u4ea” had reportedly gained access to the root directories and destroyed the file structures of machines at George Mason University, the University of Arkansas, at a site in the Netherlands, and possibly some U.S. government sites. It is estimated that “u4ea” may have covertly entered more than 100 separate systems. In another example, 13 root servers that make-up the Internet’s Domain Name Systems were attacked on October 2002.
    [Show full text]
  • Folyamatos Fenyegetés a Kibertérben
    IX. Évfolyam 3. szám - 2014. szeptember Gyebrovszki Tamás [email protected] FOLYAMATOS FENYEGETÉS A KIBERTÉRBEN Absztrakt A cikk a kibertérben folyamatosan fennálló fejlett fenyegetésekkel (Advanced Persistent Threat továbbiakban APT) foglalkozik. A számítógépes káros kódok történetének ismertetését követően néhány ismert APT támadást sorolok fel, majd definiálom az APT fogalmát. Végezetül kitekintést adok az APT-k elleni fellépés lehetőségeiről. This article deals with Advanced Persistent Threat in Cyber Space. It summarizes the history of malicious softwares and some known as APT attack. The article gives a definition of APT. Finally it brings solutions on the field of countermeasure. Kulcsszavak: APT, kibertér, rosszindulatú kódok ~ APT, cyberspace, malware 137 BEVEZETÉS Neumann János (1903-1957) matematikus nevéhez kötődik a napjainkban használt számítógép architektúra alapötlete, a tárolt programú számítógépé. A német Konrad Zuse (1901-1995) által tervezett első számítógép, a Z1 [1], programozható volt ugyan, de a programot lyukszalagon tárolta és annak programfutás közbeni változtatására nem volt lehetőség. Az 1938-ban elkészült gépről sajnos csak néhány fénykép maradt fenn. A Neumann elv alapján épült első számítógép az EDVAC (Electronic Discrete Variable Automatic Calculator) volt [2]. 1. ábra. Neumann János http://njszt.hu/sites/default/files/imagecache/belyegkep/miujsag/john-neumann.jpg Ez a gép az adatokat és a programot is a közös memóriában tárolta. Ez ragyogó ötlet, azonban olyan problémát is okozott, amely a
    [Show full text]
  • Nimda Worm Analysis Analysts
    Nimda Worm Analysis Analysts: Andrew Mackie, Jensenne Roculan, Ryan Russell, and Mario Van Velzen Incident Analysis Report Version 2 September 21, 2001, 23:00 UTC 1660 S. Amphlett Boulevard Suite 128 San Mateo CA 94402 650 655 6300 650 655 2099 fax Quoting SecurityFocus Information and Data: Internal Documents and Presentations: Quoting individual sentences and paragraphs for use in your company's internal communications does not require permission from SecurityFocus. The use of large portions or the reproduction of any SecurityFocus document in its entirety does require prior written approval and may involve some financial consideration. External Publication: Any SecurityFocus information you may wish to use in advertising, press releases, or promotional materials requires prior written approval from the Vice President of Product Marketing of SecurityFocus. A draft of the proposed document should accompany any such request. SecurityFocus reserves the right to deny approval of external usage for any reason. Copyright © 2001 SecurityFocus. Reproduction is forbidden unless authorized. Executive Summary The purpose of this version is to adjust attack data, based on recent observations, and to refine or augment technical descriptions in version 1, released on September 19, 2001. On the morning of September 18, 2001, a large number of users reported a massive increase in Web- based attacks against their Web Servers. Users also reported receiving suspicious email messages that contained what appeared to be a wave (*.wav) file that coincided with the initial barrage of Web-based exploits attempted against the hosts. Initially, many users believed that a variant of Code Red was responsible for the Web scanning activity.
    [Show full text]