As the Worm Turns: Lessons from Blaster

Published: 20 August 2003 y., Wednesday
Microsoft deserves some blame for the rapidly spreading Web virus -- but so do network administrators, ISPs, small businesses, and individual PC users. Compared to the images of sweaty Gothamites trudging across the Brooklyn Bridge in 95-degree heat during the massive power blackout, the MS Blaster worm now seems like a walk in the park. Still, the latest worm to clog corporate networks and kludge the Net wreaked plenty of havoc in its own right. Internet security companies estimated losses from both downtime and wasted manhours in the hundreds of millions of dollars for U.S. companies. And Blaster-infected machines significantly impacted the Internet. The stream of bogus requests generated by the worm slowed DNS (domain name system) servers that act as the phone directories of the Internet. Compromised computers jammed up networks ranging from BMW in Germany to the Maryland Motor Vehicles Dept. . Like the Slammer and CodeRed worms before it, Blaster targeted computers running Microsoft Windows 2000 and Windows XP operating systems. The worm carries a small program designed to exploit a chink in Redmond's digital armor and insert a file deep into the operating system in the Windows registry system. The registry is a database where the most basic rules that govern how a Windows machine behaves are stored and categorized. Once Blaster inhabits the registry, it causes computers to restart without warning and to spew out thousands of connection requests per minute, in search of other machines to infect. The sheer volume of traffic caused enough digital noise to bog down networks.
Šaltinis: businessweek.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Apple fans abuzz over new iMac

With Apple Computer's next iMac expected to be unveiled as soon as next week, Mac fan sites are buzzing with speculation over the design more »

Veritas opens China shop

Like many of the major IT players, Veritas has stepped up its presence in China courtesy of a separate corporate entity in the country and a new development center more »

China Cracks Down on Internet Porn

China will improve its long-term mechanism to combat Internet pornography, according to a senior official of the Ministry of Information Industry here Thursday more »

search.lt news

search.lt presents newest links more »

Microsoft lets companies block SP2 upgrade

Although Microsoft recommends that consumers turn on Automatic Update to get the latest version of Windows, the company is offering to let companies temporarily block such upgrades more »

Linux 'no threat' to Windows on the desktop

Benefits not enough to warrant a major shift in platform strategy, finds report more »

HP Makes Services Buy, Embraces DAT

HP is acquiring IT services provider Synstar for $297 million in cash to shore up its overseas presence as it battles IBM's Global Services division more »

Wi-Fi phones make a splash

Cell phone makers plan to release so-called Wi-Fi phones ahead of schedule more »

Street Access to the Cyberhighway

TCC Teleplex chief Dennis Novick says pay phones with high-speed Net connections in New York City are only the start of its plans more »

Gates Touts 'Modeling' Era For Software

New software modeling systems are breaking out of academia and making their way into Microsoft's product pipeline, the company's chairman said Thursday more »