NIPC, Microsoft, Security Vendors Attempt To Avoid Code Red Disaster - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

NIPC, Microsoft, Security Vendors Attempt To Avoid Code Red Disaster

The director of the National Infrastructure Protection Center issues a warning on the Code Red worm.

Ronald Dick, director of the National Infrastructure Protection Center, didn't mince words Monday when discussing the fast-spreading Code Red worm: "The mass traffic associated with this worm's propagation could degrade the functioning of the Internet."

Dick says research shows Code Red has the capability to infect half a million servers in a single day. The Code Red worm surfaced July 12, and within days it had infected more than 350,000 servers. It attempted, and failed, to launch a distributed denial-of-service attack against the White House Web site. The original worm exploits a vulnerability in Microsoft's Internet Information Services software, which ships with Windows NT and 2000. Microsoft desktop operating systems are not susceptible. It's estimated that Microsoft has shipped more than 6 million copies of IIS.

Security experts warn that variants of the Code Red worm could start appearing, and they may spread more effectively than the versions that struck last week. Code Red is set to start propagating once again at 8 p.m. Eastern time Tuesday.

"I feel like a broken record; [NIPC] must feel like a broken record," says Pete Lindstrom, security analyst with Hurwitz Group. "Hopefully, people will be listening. We will see if it makes a dent." Lindstrom sees a cycle of vulnerabilities being found, patches being published, and people failing to use those patches. "It'll happen tomorrow, and in another month and a month after that. Sometimes people will patch their systems, sometimes they won't. We will see what happens tomorrow night."

While the overall health of the Internet depends on how many companies properly patch their servers, protection for servers running IIS is fairly straightforward. The patch is available at Microsoft TechNet.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Slideshows
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
Commentary
The Growing Security Priority for DevOps and Cloud Migration
Joao-Pierre S. Ruth, Senior Writer,  9/3/2020
Commentary
Dark Side of AI: How to Make Artificial Intelligence Trustworthy
Guest Commentary, Guest Commentary,  9/15/2020
Register for InformationWeek Newsletters
Video
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll