Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Microsoft

Nimda To Strike Again 523

Seabass55 writes: "Researchers say Nimda is set to propagate again after rechecking Nimda's code. God help all the MS boxes ... again." Looks like the owners of unpatched IIS machines have until 9 p.m. GMT (1 a.m. ET) to get ready. I'd like to see a nice double stockade for the writers of Sircam and Nimda, and maybe some fireants. Update: 09/27 22:45 GMT by T : Temporal confusion -- that's 5:00 GMT, sorry :) Update: 09/28 00:14 GMT by T : Carnage4Life contributes this link to a command-line tool from Microsoft to list patches already installed or still needed, if you think your Windows machine may be vulnerable.
This discussion has been archived. No new comments can be posted.

Nimda To Strike Again

Comments Filter:
  • by 4of12 ( 97621 ) on Thursday September 27, 2001 @06:54PM (#2361203) Homepage Journal

    The usual punishment of:

    • a hosed server first thing in the morning, before coffee,
    • a stack o mail from other irate sysadmins that are getting hit on by the infected zombie to which your name is attached,
    • some urgent voicemails and pages from users and from your management asking what the !&%$ is happening.
    The usual...ho humm.

    Otherwise, Friday morning would have been relatively pleasant.

  • by ellem ( 147712 ) <ellem52@gmail.cDEGASom minus painter> on Thursday September 27, 2001 @07:02PM (#2361260) Homepage Journal
    I administer Notes, NT, Win9x and a Linux box, plus firewalls yadda, yadda.

    I work in a Corporate Travel Agency in NYC, they just decimated my entire staff and I have me and one other guy who has been relegated to inputting ticket refunds.

    I DON'T HAVE TIME FOR THIS! My lone IIS server has been patched since the first day. Lotus Notes doesn't care about these dumb ass viruses (virii) and my Norton's are all up to date.

    My USERS got this crap from infected web pages!

    We're losing a machine a day in the field b/c these bozos can't figure out how to click on a button called VIRUS_FIX on the corporate intranet.

    I am ready to frigging quit and become an English Teacher fuck the money! If the whole MS world can be brought to its knees everytime some kid in Sweden has the day off then we're all fucked.

    CIOs who continue to use Outlook/IIS deserve whatever happens to them. (We HAD to use IIS for a 3rd party software app.) Micorsoft SHOULD ABSOLUTELY BE PAYING IT'S CUSTOMERS BACK FOR THIS! HOW DARE THEY GET READY TO RELEASE YET ANOTHER VIRUS RUNTIME OS.

    It is seriously time for the MCSE farms to be shut down and for corporate America to move to another OS. Fuck the users; guess what they don't know all that much about the OS they are on switching them now will have no lasting impact.
  • by Minstrel78 ( 28344 ) on Thursday September 27, 2001 @07:03PM (#2361266)
    The reason that these widespread viruses aren't as destructive as one might imagine they could be is analogous to how viral outbreaks happen in nature, IMHO.

    Most successfull viruses don't kill their hosts right away, or ever, as by doing so they destroy their own method of propogation. Even if they did no harm for some amount of time, you'd find that the number of vulnerable systems would be down very quickly once that timer hit on a large scale, whereas with non-destructive viruses, you're almost garunteed to have repeat outbreak becuase of lingering infections out there that never get cleaned up, or are left for long periods of time.

    In general, the more destructive a virus is, the shorter it's overall lifespan, and the lesser the overall damage.
  • by Anonymous Coward on Thursday September 27, 2001 @07:13PM (#2361314)
    Now THAT was an Insightful comment. Too bad corporate America will keep twisting the rubber band around their arm every time M$ releases another version of their virusware.
  • by Anonymous Coward on Thursday September 27, 2001 @07:18PM (#2361342)
    A couple of useful links for your poor, overworked and probably clueless Windows admins:

    Knowledge of these would have saved your company time and money, assuming patches were applied within a month of being released and/or recommended practices were followed.

    Tools, and procedures [microsoft.com]

    email notification (any decent admin would already be subscribed to this):
    mailinglist [microsoft.com]

    Get the admins to visit those links soon, or MS will pointlessly reorganise their site again.
  • by alienmole ( 15522 ) on Thursday September 27, 2001 @07:44PM (#2361463)
    Did you read the Gartner report carefully? It said "enterprises hit by both Code Red and Nimda" should investigate alternatives. This implies that enterprises not hit by both worms don't need to switch.

    If a company wasn't hit by both, presumably their security policies and procedures are either already up to scratch, or capable of being improved sufficiently. But if a company was hit by both, their procedures are probably beyond repair, and they'd be better off with a server that's more secure by default.

    So I think Gartner was absolutely correct. Not only that, but people who didn't pick up that subtlety from the Gartner report are also more likely to need to switch servers, so the report works either way! :P

  • by bad-badtz-maru ( 119524 ) on Thursday September 27, 2001 @07:47PM (#2361469) Homepage

    Our organization didn't do squat because we spent five minutes researching commonly accepted practices for securing IIS and NT boxes before we ever put our first box on the net. We do the same for every piece of hardware and software, exploits are not an MS-exclusive thing. The simple act of unmapping unused extensions in IIS has saved us countless hours (or days) of agony on many occasions. I suspect your organization may not contain the level of security-conciousness necessary to properly maintain systems connected to the internet since such security-awareness would have included remedial research into the securest method of presenting a piece of hardware or software to the internet. In other words, if your organization knew what they were doing, the issue you experienced would not have occurred. It's not an apache/IIS issue, it's a poor administration issue that will plague your organization, unless corrected, regardless of what OS and web server software they choose to deploy.

    Hope this helps,
    maru
    www.mp3.com/pixal
  • by Sagarian ( 519668 ) <smiller&alum,mit,edu> on Thursday September 27, 2001 @07:51PM (#2361485)
    After Gartner's recommendation, thousands of PHB's and even sane people will rush to switch from IIS to Apache / IBM HTTP Server / whatever.

    Has anyone written a product yet to translate Active Server Pages (ASP) code to PHP, JSP, or some other format? Most of the basic scripting language concepts should translate pretty nicely.

    Even if someone has built their IIS / ASP application 'correctly' (cough cough) isolating middle-tier logic to MTS or something similar, wouldn't Perl / Java / whatever wrappers to those COM / COM+ services also be straightforward to write?

    Or has someone done this already? Isn't there (or wasn't there) a Chilisoft implementation of ASP that you could run on Apache and Linux?
  • Re:9 PM? (Score:1, Insightful)

    by Anonymous Coward on Thursday September 27, 2001 @07:54PM (#2361494)
    What do you mean 9AM? Tomorrow is Friday. Windows NT is so easy to administer that you don't even have to bother showing up for work on Friday! Let the secretray fix it if something should happen to go wrong.
  • Re:Not Me (Score:2, Insightful)

    by Drake42 ( 4074 ) on Thursday September 27, 2001 @07:56PM (#2361499) Homepage
    I bet you have security guards, fences and cameras to protect your buildings from 14 year old kids.

    Why don't you have a secure firewall to protect your servers?

    We are living in the time that 100 years from now people will look back and think we must not yet have evolved properly. They will look back and think, "Why did they put up with that idiocy? Were they just stupid back then?" And parents will shrug and grandparents will say "It was like the frontier!" and kids will think "Wow. Those guys were stupid."

    Don't bitch about the lack of govenment protection when all you have to do is install appropriate security which costs NOTHING. I don't want my taxes paying to protect you from your own laziness.

    25K lost? Serves you right.
  • Serves You Right. (Score:3, Insightful)

    by Drake42 ( 4074 ) on Thursday September 27, 2001 @08:04PM (#2361536) Homepage
    (I already made this as a reply to comment, but I'm irked about this enough that I want to post it to the main thread in hopes that people read it)

    I bet you have security guards, fences and cameras to protect your buildings from 14 year old kids.

    Why don't you have a secure firewall to protect your servers?

    We are living in the time that 100 years from now people will look back and think we must not yet have evolved properly. They will look back and think, "Why did they put up with that idiocy? Were they just stupid back then?" And parents will shrug and grandparents will say "It was like the frontier!" and kids will think "Wow. Those guys were stupid."

    Don't bitch about the lack of govenment protection when all you have to do is install appropriate security which costs NOTHING. I don't want my taxes paying to protect you from your own laziness.

    25K lost? Serves you right.
  • Re:Fight back (Score:2, Insightful)

    by Sagarian ( 519668 ) <smiller&alum,mit,edu> on Thursday September 27, 2001 @08:04PM (#2361543)
    Given the way that these viruses work, and given that your script fires a message to everyone who attempts to Code Red exploit a server running your script, and that there's no central registry of which servers / email addresses have been notified by your script :

    Wouldn't this script, if widely employed, bring forth massive tidal waves of email as well?

    Imagine an admin's joy at finding that not only are 20 of his servers infected and/or destroyed, but he has an inbox full of thousands of messages that are now swamping his mailserver.

    Given that the communication of the email is not secure, could a malicious party not monitor traffic for copies of your script's message, and thus know exactly which servers can be exploited?

    Perhaps a better solution would be a secure central registry / database of known-infected systems, which exposed a secure known-infected system reporting mechanism (even a simple XML message protocol via https for example). Just thinking on the fly here...

    Anyway, the intention is noble...
  • Re:Not Me (Score:4, Insightful)

    by technos ( 73414 ) on Thursday September 27, 2001 @08:18PM (#2361595) Homepage Journal
    Despite the fact that I thought we were patched and secured, the Nimda worm hit our servers.

    Oops indeed! All of Nimda's exploits were old. You had what? Five months? At a total cost of $25,000?? Damn, I hope you have some money put away, because if you were one of my employees, you'd be working at half pay to reimburse the company for your negligence. That's on a good day. On a bad day, you'd be fired, and I'd call Legal to have them sue your ass once it cleared the doorstep on your way to the unemployment line.

    Rule 1: If you're an NT admin, you have to stay on top of *EVERY* patch. You don't patch, your company loses money because of your negligence. If you don't patch, you deserve to lose your job.

    Now, if you're one of those companies that has lost a lot of 'good men' to rule 1, perhaps you should not use Microsoft products? Perhaps they're not everything the Microsoft rep told you they would be...
  • by SuiteSisterMary ( 123932 ) <slebrunNO@SPAMgmail.com> on Thursday September 27, 2001 @08:23PM (#2361629) Journal
    I'll point out that a firewall won't protect from this, as these are legitimate http requests. Your gateway anti-virus solution and/or intrusion detection system, on the other hand, should catch these. But this sort of thing is NOT what a firewall is supposed to stop.
  • Re:Hmmm (Score:1, Insightful)

    by Anonymous Coward on Thursday September 27, 2001 @09:01PM (#2361752)
    I don't want to use IIS. I don't want anyone else on my lan using it either. Anyone know of a tool to scan for rogue IIS machines?
  • by Anonymous Coward on Thursday September 27, 2001 @09:58PM (#2361897)
    1) You're assuming that the only possible "purpose" of a computer worm is to survive, which is hardly the case. Another possible purpose of a computer worm might be to propegate to as many computers as possible, then destroy them all at a predetermined time.

    2) It would be an easy proposition to program a worm to spread initially, go dormant for 10 days, then propegate again 10 days later, then finally destroy its hosts.

    3) Consider the timing of this worm. It was released into the wild concurrently with the WTC attack, when the FBI was, ahem, busy with other matters.

    Q: If you wanted to maximize the damage to the information infrastructure, when would you plan to trigger the virus payload?
    A: At the end of the month, after payrolls had been computed. Golly. It's the last weekday of the month.

    Make no mistake, I have absolutely no evidence of such a plan or motive. I am saying that the fact that these worms are out there and work illustrates a potential to destroy massive numbers of computers all at once, and potentially inflict economic damage to businesses on a scale similar to the economic damage done to the airlines on 9/11. If such an attack were to happen, it would cause many, many companies to have to restore from backups all at once, and a certain percentage of computers would not be able to be restored, and a large amount of data would be lost. Businesses would be disrupted. Losses would be enormous. Jobs would be lost. It would be a severe economic blow.

    I stand by my claim. The IIS and Outlook security holes constitute an enormous threat to the national, and world economy.
  • Re:Again? (Score:3, Insightful)

    by reverius ( 471142 ) on Thursday September 27, 2001 @10:49PM (#2362032) Homepage Journal
    That's not possible... any significantly large company that was going to change something like that would need an obscene amount of time to switch to "something less vulnerable"...

    somewhere around a year and a half. :)
  • Re:Not Me (Score:2, Insightful)

    by berzerke ( 319205 ) on Friday September 28, 2001 @12:52AM (#2362414) Homepage

    All of Nimda's exploits were old. You had what? Five months?



    You forget several things.



    1. Microsoft does not test their patches. The patch probably will fix the problem, but they are also known for introducing new problems. Patching from Microsoft is rather risky in and of itself.
    2. Security at many firms is a low priority, at least until there is a crisis. At a place I used to work, I actually got repremanded (more than once) for "wasting time installing patches".
  • by Milalwi ( 134223 ) on Friday September 28, 2001 @03:42AM (#2362661)

    Unlike 'Code Red', Nimda does not spread by pushing the worm binary in the HTTP request. The worm uses HTTP to find a vulnerable IIS server, then causes the IIS server to make a TFTP request out to the attacking host to retrieve the ~64K binary.


    Most normal 'secure firewall' products aren't tuned to block outbound requests from the protected servers to internet hosts.


    I would hope that most firewall admins aren't allowing TFTP outbound!

    If you don't need the service, turn it off. Only allow what is required.

    Now if Nimda had used HTTP to retrive the Admin.dll file, many more folks would have been infected, as most firewalls do need to allow HTTP outbound.

    Milalwi
  • Re:Not Me (Score:5, Insightful)

    by Rogerborg ( 306625 ) on Friday September 28, 2001 @05:31AM (#2362813) Homepage
    • If you're an NT admin, you have to stay on top of *EVERY* patch. You don't patch, your company loses money because of your negligence. If you don't patch, you deserve to lose your job

    You apply SP6 to NT4 the day it comes out. Your company's Lotus Notes system falls on its arse. You lose your job.

    Admins have a hard enough job keeping a known, stable system running without applying day-0 patches every time Microsoft figure they're screwed up again. Applying patches immediately and automatically isn't a black and white issue, and all your sound and fury won't make it so.

  • by ethereal ( 13958 ) on Friday September 28, 2001 @09:49AM (#2363300) Journal

    So, if there are recommendations on how to set it up securely, why isn't that the default? Still sounds like a faulty product to me.

  • by NMerriam ( 15122 ) <NMerriam@artboy.org> on Friday September 28, 2001 @09:54AM (#2363311) Homepage
    Our organization didn't do squat because we spent five minutes researching commonly accepted practices for securing IIS and NT boxes before we ever put our first box on the net.

    Unfortunately Nimda spreads itself over shares, too -- so our server was well-maintained, but every shared directory on there was filled with the .dll and .eml files from Nimda that users had been infected on their desktops.

    All it took was a single person on our network who had disabled their antivirus to spread it all over ever network drive in the place.

"Given the choice between accomplishing something and just lying around, I'd rather lie around. No contest." -- Eric Clapton

Working...