As the Worm Turns: Lessons from Blaster

Published: 20 August 2003 y., Wednesday
Microsoft deserves some blame for the rapidly spreading Web virus -- but so do network administrators, ISPs, small businesses, and individual PC users. Compared to the images of sweaty Gothamites trudging across the Brooklyn Bridge in 95-degree heat during the massive power blackout, the MS Blaster worm now seems like a walk in the park. Still, the latest worm to clog corporate networks and kludge the Net wreaked plenty of havoc in its own right. Internet security companies estimated losses from both downtime and wasted manhours in the hundreds of millions of dollars for U.S. companies. And Blaster-infected machines significantly impacted the Internet. The stream of bogus requests generated by the worm slowed DNS (domain name system) servers that act as the phone directories of the Internet. Compromised computers jammed up networks ranging from BMW in Germany to the Maryland Motor Vehicles Dept. . Like the Slammer and CodeRed worms before it, Blaster targeted computers running Microsoft Windows 2000 and Windows XP operating systems. The worm carries a small program designed to exploit a chink in Redmond's digital armor and insert a file deep into the operating system in the Windows registry system. The registry is a database where the most basic rules that govern how a Windows machine behaves are stored and categorized. Once Blaster inhabits the registry, it causes computers to restart without warning and to spew out thousands of connection requests per minute, in search of other machines to infect. The sheer volume of traffic caused enough digital noise to bog down networks.
Šaltinis: businessweek.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Lawmakers Call for Cybersecurity Enhancements

As the 108th Congress scrambles in its final days to address homeland security issues, U.S. Reps. Mac Thornberry and Zoe Lofgren are focusing on the state of U.S. cybersecurity more »

New Worms Sniff For Passwords

Security firms are warning of a new series of Sdbot worms that install a "sniffer" component to steal passwords from unsuspecting users more »

Sender ID in Limbo

Microsoft's undeclared patent claims on Sender ID technology is holding up adoption of the e-mail authentication specification more »

search.lt news

search.lt presents newest links more »

Microsoft Wins 'Tabbed Browsing' Patent

Microsoft has been granted a patent from the U.S. Patent and Trademark Office on a process known as tabbing through a Web page in order to find links more »

search.lt news

search.lt presents newest links more »

UzJilSberBank Introduces Plastic Cards at AGMK

UzJilSberBank (Uzbek housing construction bank) completed a project of introduction of plastic cards at Almalyk Mining and Smelting Combine more »

Copyright Law and Data Extraction

Recent decisions suggest that U.S. courts are more likely to protect an online database if the work involved was tilted towards the compilation of data itself as opposed to the technology used to gather it more »

Florida Says E-Vote Primary A-OK

Touch-screen machines brought in to replace the punch-card ballots at the center of the 2000 presidential fiasco appeared to work smoothly in primary voting Tuesday more »

Hackers continue to experiment with 64-bit viruses

Shruggle virus could be 'a taste of things to come', warn experts more »