Dit is onderwerp Slammer-worm wellicht oorspronkelijk uit NL in forum Veiligheid bij Goedzo?! NiMS Forum.


Om dit onderwerp te bezoeken gebruik deze URL:
http://forum.goedzo.com/cgi-bin/ubb/ultimatebb.cgi/ubb/get_topic/f/32/t/000010.html

Gereageerd door LilWiz op :
 
Volgens antivirusbedrijf Kaspersky Labs is de Slammer-worm, die de afgelopen dagen behoorlijk wat problemen op internet heeft veroorzaakt, wellicht afkomstig uit ons eigen kleine kikkerlandje. Dit schrijft WebWereld. Eerder dacht het bedrijf nog dat de uitbraak was begonnen in de Verenigde Staten, maar uit nader onderzoek bleek dat de eerste versies van het virus op 20 januari reeds op Nederlandse servers circuleerden. Dit zou mogelijk kunnen leiden tot een nieuwe Nederlandse virus-rechtszaak, zoals de zaak in 2001 tegen de maker van het Kournikova-virus.

De Zuid-Koreaanse politie beweert echter dat een Chinese hackersgroep mogelijk de dader is van de virus-uitbraak, schrijft Reuters. Zuid-Korea was één van de zwaarst getroffen landen, toen zaterdag de worm uitbrak en het internetverkeer gedeeltelijk platlegde. Volgens de autoriteiten hebben de betreffende Chinezen eerder al melding gemaakt van een bug in Microsoft SQL Server. De worm van zaterdag maakt misbruik van een lek wat daar sterk op lijkt.

Er is echter één ding waar alle partijen het over eens zijn: de effecten van de worm duren nog altijd voort. Wereldwijd zouden meer dan 150.000 systemen zijn besmet. Sommige serverbeheerders hebben hun servers nog altijd niet gepatcht, stelt Network Associates. Daarnaast draaien sommige mkb-bedrijven de SQL-server zonder het te weten. Network Associates vreest verder dat andere virusmakers geïnspireerd worden door de worm: SQL-Slammer installeert zich niet in het 'file allocated memory' maar in een gedeelte van het geheugen dat door virusscanners niet gescand wordt.

Bron: T.Net
 
Gereageerd door NiMS op :
 
De persoon die het heeft gedaan wordt bedankt. Ik hoop dat mijn keelpijn minder wordt in plaats van meer. (Gister namelijk de hele dag in een airco server hok gezeten).
 
Gereageerd door LilWiz op :
 
Dr was volgens mij ook een patch voor uitgebracht door M$ om dit te verhelpen, maar ik weet het niet zeker he...heb geen last van dit virus nl. [Big Grin]
 
Gereageerd door NiMS op :
 
Extra nieuws: Microsoft vergeet eigen servers te patchen

Microsoft's policy of relying on software patches to fix major security flaws was questioned Monday after a series of internal e-mails revealed that the software giant's own network wasn't immune from a worm that struck the Internet last weekend.

The messages seen by CNET News.com portray a company struggling with a massive infection by the SQL Slammer worm, which inundated many corporate networks Saturday with steady streams of data that downed Internet connections and clogged bandwidth.

"All apps and services are potentially affected and performance is sporadic at best," Mike Carlson, director of data center operations for Microsoft's Information Technology Group, stated in an e-mail sent at 8:04 a.m. PST Saturday to other members of Microsoft's operations groups. "The network is essentially flooded with traffic, making it difficult to gather details concerning the impact."

The messages put Microsoft in an awkward position: The company relies on customers to patch security flaws but the events of last weekend show that even it is vulnerable. In this case, Microsoft urged customers to fix a vulnerability in the SQL Server 2000 software, but it apparently hadn't taken its own advice. Moreover, despite its 1-year-old security push, the software giant still had critical servers vulnerable to Internet attacks.

"This shows that the notion of patching doesn't work," said Bruce Schneier, chief technology officer for network protection firm Counterpane Internet Security. "Publicly, they are saying it's not our fault, because you should have patched. But Microsoft's own actions show that you can't reasonably expect people to be able to keep up with patches."

For years, system administrators have complained about their inability to keep up with the steady stream of patches that have poured out of Microsoft and other software companies. In October, the software giant even raised the bar for what's considered a "critical" vulnerability, so that administrators wouldn't have to deal with so many patches that seemingly required immediate attention.

“Seems like every time I install a system patch, something else goes wrong with my system,” said Frank Beier, president of Web design firm Dynamic Webs. The designer said many system administrators won’t patch for many months, because they don’t trust Microsoft to fix the problem without breaking some other function of the software.

“In most cases, I'm better off just playing Russian roulette with the hackers until our servers are broken into,” he said.

In the case of SQL Slammer, it seemed that Microsoft had done it right. The company had informed customers six months earlier about a flaw and included patches in both a roll-up patch--a software update that includes all the latest patches--and in the company's latest service pack for Microsoft SQL Server 2000.

But even within Microsoft, something went wrong.

"At approximately, 10:00 p.m. (PST, Friday), traffic on the corporate network jumped dramatically, eventually bringing all services to a crawl," stated Carlson's memo. "The root cause appears at this time to be a virus attacking SQL."

On Saturday, the Microsoft's Windows XP Activation service was down, not because the servers were vulnerable, but because the company's internal network was inundated with junk data, Rick Devenuti, the chief information officer for the software giant, said in an interview Monday.

"We are not sure how the virus got into our network," he said.

That the company has SQL servers on the desktop is not surprising, he added. Many of its developers run the database on their PCs, and other test machines have vulnerable databases installed to replicate customer networks. Devenuti didn't know how the worm got into the system to affect those servers, however.

"It just takes one machine to get going," he said. "At any given point in time, it is hard to be 100 percent patched with any machine. We are working hard to make patch management easier. But 100 percent is a high bar and in this case we are not there."
 


Copyright 2004 Ni-Frith Media Systems

Powered by Infopop Corporation
UBB.classic™ 6.7.0
Vertaald door NiMS