Skip to main content


The Code Red worm attacking faster says SecurityFocus

posted onAugust 1, 2001
by hitbsecnews

Alfred Huger, writing for SecurityFocus says "Well, for future referance, crow is for the most part terrible breakfast food. It seems that the end is actually nigh and all my sarcasm has come back to haunt me. Well, perhaps not.

People as you know, are seeing Code Red attacks on the increase although it has yet to become a problem. If you look at the attack rates the attacks seems alot faster than last time. We started seeing Code Red on the 11th last time and it took several days though before it started picking up steam en masse. Today however the rise seems alot more effective. Still no snapping powerlines, major ISP's going down or general digital chaos but we can always hold out hope for that later....

Something to note here, upsurges in port 80 probes and actually
identifying a Code Red attack are two differant things entirely. If
you are basing your attack stats off of firewall logs or simple access list packet drops your stats might well be out to lunch. Keep in mind a firewall is only telling it dropped a packet, not what was in the packet. A lot of the people mailing me last night and this morning were sending firewall logs, not IDS logs.

Firewalls are great, I have on myself but you see the problem is that they were not designed to be very inquisitive, hece IDS's. So before you assume Code Red is massing at your border router for an all out Iwo Jima no holds barred assualt - check your logs. Meaning your IDS logs or web logs. Conjecture in times like this causes panic. Panic is bad, unless of course you profit off of people panicking, which some of us in the industry do.

Three people also mailed me asking about SANS's Incidents.org and their front page showing (as of now) something like 8000+ hosts infected. So far as I know Incidents.org (which is a good site) is pulling it's data from Dshield.org (which is a really good site as well). Now Dshield so far as I understand it gathers it's stats from a number of devices but it does not do attack correlation.

Meaning it does not actually make sense of the logs outside of telling what was denied on what ports. So it could be saying that 8000+ people have seen traffic dropped on port 80, or perhaps their staff are going through the logs by hand (I pity them if this is the case).

Perhaps someone from one of those organizations can post and shed some light on this for us.

Now lastly, the list is going to be reserved to Code Red traffic
today so if your posting other things (and many of you are) I will approve them tommorow after some judicious moderation.

SecurityFocus.

Source

Tags

Networking

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th