As the Worm Turns: Lessons from Blaster

Published: 20 August 2003 y., Wednesday
Microsoft deserves some blame for the rapidly spreading Web virus -- but so do network administrators, ISPs, small businesses, and individual PC users. Compared to the images of sweaty Gothamites trudging across the Brooklyn Bridge in 95-degree heat during the massive power blackout, the MS Blaster worm now seems like a walk in the park. Still, the latest worm to clog corporate networks and kludge the Net wreaked plenty of havoc in its own right. Internet security companies estimated losses from both downtime and wasted manhours in the hundreds of millions of dollars for U.S. companies. And Blaster-infected machines significantly impacted the Internet. The stream of bogus requests generated by the worm slowed DNS (domain name system) servers that act as the phone directories of the Internet. Compromised computers jammed up networks ranging from BMW in Germany to the Maryland Motor Vehicles Dept. . Like the Slammer and CodeRed worms before it, Blaster targeted computers running Microsoft Windows 2000 and Windows XP operating systems. The worm carries a small program designed to exploit a chink in Redmond's digital armor and insert a file deep into the operating system in the Windows registry system. The registry is a database where the most basic rules that govern how a Windows machine behaves are stored and categorized. Once Blaster inhabits the registry, it causes computers to restart without warning and to spew out thousands of connection requests per minute, in search of other machines to infect. The sheer volume of traffic caused enough digital noise to bog down networks.
Šaltinis: businessweek.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Apple Starts Selling Unlocked iPhone 4 in the U.S

Confirming rumors that surfaced over the weekend, Apple has started selling the unlocked version of the iPhone 4 in Apple Retail stores. more »

Anonymous Begins Attacks on Spanish Police Websites

You didn’t expect Anonymous to take the recent Spanish police action against them lying down, did you? more »

Taiwan brings foldable touch-screens closer to reality

The era of foldable touch screens is rapidly approaching, with scientists in Taiwan leading the charge to develop computer and cell phone screens that can folded away or rolled up for storage. more »

The virtual finger language was created in Japan

During the exibition „Technology Open House 2011“ japanese creators of technologies presented the automatic system, which can translate words into the finger language. more »

China threatens Google over hacking claims

China has warned Google that its business could suffer if it continues to suggest that Chinese spies have been targeting the emails of United States' officials. more »

Zero carbon office-building a sign of things to come

South Korea is showing off what it says is the world's first totally eco-friendly business building, a structure that emits zero carbon and uses only renewable energy. more »

Facebook rejects NY man's claim of half-ownership

Facebook founder Mark Zuckerberg has said that an alleged contract and e-mails that a New York man claims entitle him to a 50% stake in the social networking site are "forgeries". more »

Toshiba prices its new tablet to undercut Apple's iPad2

The growing popularity of tablets has seen many new players enter the market. more »

Top 5 social networking hacks

Anthony Weiner, a Democratic congressman, has claimed his Twitter account was hacked after a photograph of a bulging pair of underpants was sent to a follower. Here are some of the most memorable social networking 'hacks'... more »

Google e-mail accounts attacked by Chinese hackers

Hace China have compromised personal e-mail accounts of hundreds of top US officials, military personnel and journalists, Google has said. more »