NIPC, Microsoft, Security Vendors Attempt To Avoid Code Red Disaster - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

NIPC, Microsoft, Security Vendors Attempt To Avoid Code Red Disaster

The director of the National Infrastructure Protection Center issues a warning on the Code Red worm.

Ronald Dick, director of the National Infrastructure Protection Center, didn't mince words Monday when discussing the fast-spreading Code Red worm: "The mass traffic associated with this worm's propagation could degrade the functioning of the Internet."

Dick says research shows Code Red has the capability to infect half a million servers in a single day. The Code Red worm surfaced July 12, and within days it had infected more than 350,000 servers. It attempted, and failed, to launch a distributed denial-of-service attack against the White House Web site. The original worm exploits a vulnerability in Microsoft's Internet Information Services software, which ships with Windows NT and 2000. Microsoft desktop operating systems are not susceptible. It's estimated that Microsoft has shipped more than 6 million copies of IIS.

Security experts warn that variants of the Code Red worm could start appearing, and they may spread more effectively than the versions that struck last week. Code Red is set to start propagating once again at 8 p.m. Eastern time Tuesday.

"I feel like a broken record; [NIPC] must feel like a broken record," says Pete Lindstrom, security analyst with Hurwitz Group. "Hopefully, people will be listening. We will see if it makes a dent." Lindstrom sees a cycle of vulnerabilities being found, patches being published, and people failing to use those patches. "It'll happen tomorrow, and in another month and a month after that. Sometimes people will patch their systems, sometimes they won't. We will see what happens tomorrow night."

While the overall health of the Internet depends on how many companies properly patch their servers, protection for servers running IIS is fairly straightforward. The patch is available at Microsoft TechNet.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Slideshows
10 Top Cloud Computing Startups
Cynthia Harvey, Freelance Journalist, InformationWeek,  8/3/2020
Commentary
How Enterprises Can Adopt Video Game Cloud Strategy
Joao-Pierre S. Ruth, Senior Writer,  7/28/2020
Commentary
Conversational AI Comes of Age
Guest Commentary, Guest Commentary,  8/7/2020
Register for InformationWeek Newsletters
Video
Current Issue
Special Report: Why Performance Testing is Crucial Today
This special report will help enterprises determine what they should expect from performance testing solutions and how to put them to work most efficiently. Get it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll