Symantec Reports Spate of Attacks Via Recent Windows Flaw 56
Surprised Giraffe writes "Symantec is warning of a sharp jump in online attacks that appear to be targeting a recently patched bug in Microsoft's Windows operating system, an analysis that some other security companies disputed. Symantec raised its Threat Con security alert level from one to two because of the attacks, with two denoting 'increased alertness.' The attacks spotted by Symantec target a flaw in the Windows Server Service that Microsoft says could be exploited to create a self-copying worm attack."
first (Score:1, Funny)
Re: (Score:1)
I think that is the first time I've seen an "FP!" post get modded up.
Re: (Score:2)
Re: (Score:1, Troll)
Having worked at Symantec, I can tell you that it's nothing like that. There isn't even yelling or clamoring, it's just business as usual. There aren't even any blinking lights!
Oh, and John Thompson (the current CEO) isn't involved in the decision, nor is he in the same country as the people who are.
From TFA... (Score:5, Interesting)
Arbor Networks disputed Symantec's interpretation, saying, "we're not seeing this rise, not on TCP port 445 and not on TCP port 139. Looking over the last month we don't see this rise in MS08-067 attacks that would raise any alarms for us," in a Friday blog posting.
Both McAfee and Microsoft echoed those sentiments.
Seems like a shameless plug for Symantec to "look better" than their competitors. Crying wolf here won't get them the additional sales they think they will get.
Re: (Score:2, Informative)
Re:From TFA... (Score:4, Interesting)
The data from SANS Internet Storm Center [sans.org] shows significant recent increases in traffic on port 445. From this graph [sans.org] of traffic since January, we see an decline in traffic until September with the exception of a very large bump in late spring (some early testing of the exploit?).
Suddenly there was a big surge in port 445 traffic around September 1st. (The correlation between this event and the start of the school year is intriguing.) This surge looks suspiciously orchestrated to me. We also see a substantial, but short-lived decline in target traffic after Microsoft released its November 1st patch kit.
What's much more disturbing is the trend in sources which has spiked to incredibly high levels in the past week. This could represent a concerted attack on unpatched machines by those already infected. It also shows how many machines could really be infected but slumbering until needed.
Re: (Score:1)
Boring Slashvertisement (Score:2)
So you post a story about how Symantec are more on the ball then their competition and follow it up with comments about how their sensing capability is much more advanced than their competition without referencing any sources. This has to be the lamest astroturf I've ever seen.
Re: (Score:1)
Statistics has taught me one thing: Having a larger sample set gives you better results.
My source for numbers in my comment: http://www.symantec.com/about/profile/technology.jsp [symantec.com]
"The Symantec Global Intelligence Network encompasses worldwide security intelligence
*GASP* Threat Con Level at TWO! (Score:5, Informative)
What's the maximum? Maybe eleven, or perhaps over 9000?
Re: (Score:2, Informative)
One. The maximum is one.
Re: (Score:1)
What are they teaching in schools these days? Everybody knows that the maximum Threat Con Level is equal to the theoretical maximum warp drive speed which is to say it is 10. Duh.
Re: (Score:3, Funny)
Re:*GASP* Threat Con Level at TWO! (Score:4, Informative)
Missing analysis: (Score:3, Interesting)
Have any of these corps, in their pissing contest, ever think that maybe the problems could be compund (e.g. exploit one flaw after using another to deliver the exploit)?
Cripes - I'd be more worried about someone using a 0-day or undisclosed flaw to deliver that nasty little Vista Kernel exploit that MSFT has said it won't have patched for at least six months...
Re: (Score:1, Informative)
You mean the nasty little Vista Kernel exploit that requires that you be an administrator to exploit?
If I'm already an administrator, there are a lot more ways to gain root access than exploiting a kernel hole. Especially since I'm already running as root.
If an exploit requires that you run as root to exploit it, it's a reliability bug, not a security bug.
Yes, it's bad that someone running as root can crash a box. But there are LOTS of ways that someone running as root can cause a machine to crash.
Re: (Score:2)
How many folks have UAC turned off already, and have admin privs at the same time?
Re:Missing analysis: (Score:4, Interesting)
Now you've gone and done it. If Symantec et al were to try to cover such exploitable possibilities, they'd have to have sales and marketing information that explains them. Sounds reasonable until you think about it. Their business model is built on selling crap^H^H^H^Hsoftware to people who don't want to think and explaining it to them would only expose them to ridicule when people start asking why they need to pay for something that has better free alternatives? If it was not bundled in the system when purchased Symantec would be out of business by now.
There are hundreds of ways to compromise a computer system and then it's peers. Antivirus software can only hope to attempt to protect a machine from the most probable threats, not all threats, not even all types of threats.
You can play in a sandbox, in a park, away from the highway... or ... your can move your sandbox to the median of an eight lane highway. Your choice. No matter what you choose you will still find a dog turd in it sooner or later. Point being that anytime an anti-virus company blathers on about new attacks, it's likely to be FUD or worse, it's marketing.
Re: (Score:2)
Niggle: You repeat yourself. A zero day exploit is an undisclosed exploit. Once it's disclosed, it becomes a first-day exploit. I know media has fallen in love with the term "zero day" and use it indiscriminately and most often wrong, but this is slashdot, where we are allowed to be pedantic about these things :-
Re: (Score:2)
Fo' shiggle.
Re: (Score:3, Informative)
RTFA. it provides more useful information than Symantec's alert page. if you just want Symantec's Threatcon alerts then install their anti-virus or use their "DeepSight Threat Management System."
the article's not just "some random .au page" (as if a random .com domain would be any better) the article reports on not just Symantec's announcements, but also McAfee and Microsoft's responses that contradict Symantec's assessment. it also gives a link to a REN-ISAC report that supports Symantec's claims. it's goo
According to a leaked internal Symantec memo (Score:5, Funny)
The 'levels' are :
1 - Normal alertness
2 - Increased alertness
3 - ???
4 - PROFIT !!!
All Garbage (Score:2, Interesting)
I just wish the virus/spyware crafters would fill their crap with some better advertisements. Throw some gaming spam my way and I won't see too many differences between Anti-virus 2009 and Madden 2009.
Re: (Score:1)
Plus, one will be more entertaining!
I fucking hate football...
Re: (Score:2)
Virus warnings go to 0xF
I think the threat level indicated is "Elevated", which would suggest FFFF00. Windows warnings, on the other hand, are invariably 0000FF.
Seriously, though, how is a threat level from anyone supposed to be interepreted in any meaningful fashion when the levels themselves need to be interpreted as well? I'd suggest everyone adopt three levels only:
No Worries, Mate.
Mostly Harmless.
Run For Your Life.
Easy to understand and easy to remember. And more importantly, no ambiguous ordering or
Slashdot Homepage (Score:1, Offtopic)
I can also report a spate of recent frustration via the recent Slashdot homepage changes. I can't find anything, links and blockquotes are impossible to read in some section colour schemes and there's no way to turn it off!!
Re: (Score:3, Interesting)
-m --state NEW DROP (Score:2, Informative)
Windows server services are fine inside your LAN, if you have a Linux, BSD or commercial Unix-based gateway. Otherwise, any online transaction is like running through a pickpocket convention with your money hanging out of your pockets.
Huh? (Score:1)
*Jack Nicholson voice*
Is there any other kind????
Start up (Score:3, Funny)
Sign me up... (Score:2)
... just run this executable to verify my identity and we are all set!
Re: (Score:1, Redundant)
Kernel Herpes (Score:1)
Re: (Score:2)
You want viruses? Visit mininova and start downloading some cracked commercial software. Pick anything. You'll get infected. This is how people I know get infected. Its not a windows exploit, its not a firewall setting, its not activex, its not a lack of warnings, its not ignorance, its not the fabled zero-day exploits, its not bad security engineering, its malware predators taking advantage of greedy people who dont want to pay for commercial software.
Cant afford it? There's probably an OSS or freeware cl
Re: (Score:1)
And i always though my system stayed clean because i put a condom over my mouse
Re: (Score:2)
Re: (Score:2)
>t, because I haven't actually seen a warez bug cross my desk in years.
Psst. Download the torrent for Quicktime Full Version at mininova. Install it. Welcome to trojan land.
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Alternatively, take that XP machine of yours and plug it directly into your DSL/Cable modem (not via a router). Go get a sandwich. Millions of random port-scanners will
Re: (Score:1)
Shark jump in online attacks? (Score:1)
ISC SANS (Score:2, Interesting)
Definitely showing up here: http://isc.sans.org/port.html?port=445
Save slashdot space.... (Score:4, Funny)
{someone} discovered a serious security flaw in Microsoft's {product} and {offered to sell a solution|berated Microsoft}. They say the flaw should be {ignored|taken seriously} and that if it wasn't that there was a strong possibility of {not much|major|catastrophic|universe collapsing} repercussions.
{Mac|Linux} users were reported to gloat and tell everyone they were idiots for not switching to {Mac|Linux}. BSD users were running around naked, covered in crayon scribbling, and jabbering "definitely time for BSD, definitely....or Wopner"
Microsoft responded today by {downplaying|ignoring|finally patching after months but breaking something else with the patch} the threat.