Skip the navigation

Internet quiet as Sobig attack deadline passes

DDOS attacks still a possibility, security experts warn

By Paul Roberts
August 22, 2003 12:00 PM ET

IDG News Service - The Internet was quiet as the clock ticked past the scheduled start time for a massive, coordinated action by Microsoft Windows machines infected with the Sobig.F virus.
Beginning today, antivirus companies warned of possible danger posed by an unknown program that Sobig machines were programmed to download and run beginning at 3 p.m. Eastern time.
Using atomic clocks associated with universities and governments around the world to coordinate their actions, the Sobig machines were scheduled to search a list of 20 Sobig.F servers that were individually hacked by the virus author and supplied with instructions to download and run a special file.
Security experts warned about the possibility of distributed denial-of-service attacks, as thousands of Sobig-infected machines were all pointed to a single Web site.
Virus authors could also instruct the infected machines to download a Trojan horse program, giving the author a back door into the infected system for future use, experts said.
The CERT Coordination Centers in the U.S. and Europe as well as the FBI were informed of the threat and worked to notify the Internet service providers that hosted the machines named by Sobig so that they could be taken off-line, according to Mikko Hypponen, director of antivirus research at F-Secure Corp. in Helsinki.
That effort appears to have been successful.
"It's pretty quiet," said Johannes Ullrich, chief technology officer at the SANS Institute Inc.'s Internet Storm Center shortly after the mass action was scheduled to begin.
Ullrich did not notice any change in Internet traffic around the time Sobig was scheduled to download its instructions.
There were conflicting reports today about whether all or just some of the Sobig servers were taken off-line.
Network Associates Inc. (NAI) said that none of the 20 servers was online, according to Jimmy Kuo, a research fellow at NAI.
Internet Security Systems Inc. reported that one of the 20 was still online at 3:00 p.m. Eastern time but no new instructions had been placed on the machine by the virus writer, according to Dan Ingevaldson, engineering manager at ISS.
The last Sobig server stopped responding shortly after 3:00 p.m., he said.
With few or none of the 20 servers accessible, Sobig machines were unable to download any instructions, experts agreed.
In addition, Internet backbone providers may have been asked to drop any traffic destined for those addresses, similar to steps taken to prevent a scheduled denial-of-service attack against the White House that was programmed into the Code Red worm, Kuo said.
Such a move is standard procedure when Internet abuse and crime is tied to a specific machine or machines, according to Ingevaldson.
In any case, once authorities began shutting down the IP addresses of machines used by the worm, it is doubtful that the author would have risked uploading new instructions to one of those machines, Kuo said.
"My guess is the author saw how big and fast Sobig propagated and didn't want to go any further," Ingevaldson said.
Regardless of the outcome of the Sobig attack Friday, future hackers may well learn from the successes of the worm and incorporate that knowledge into future viruses, he said.







Reprinted with permission from IDG.net. Story copyright 2014 International Data Group. All rights reserved.
Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!