Internet quiet as Sobig attack deadline passes
DDOS attacks still a possibility, security experts warn
IDG News Service - The Internet was quiet as the clock ticked past the scheduled start time for a massive, coordinated action by Microsoft Windows machines infected with the Sobig.F virus.
Beginning today, antivirus companies warned of possible danger posed by an unknown program that Sobig machines were programmed to download and run beginning at 3 p.m. Eastern time.
Using atomic clocks associated with universities and governments around the world to coordinate their actions, the Sobig machines were scheduled to search a list of 20 Sobig.F servers that were individually hacked by the virus author and supplied with instructions to download and run a special file.
Security experts warned about the possibility of distributed denial-of-service attacks, as thousands of Sobig-infected machines were all pointed to a single Web site.
Virus authors could also instruct the infected machines to download a Trojan horse program, giving the author a back door into the infected system for future use, experts said.
The CERT Coordination Centers in the U.S. and Europe as well as the FBI were informed of the threat and worked to notify the Internet service providers that hosted the machines named by Sobig so that they could be taken off-line, according to Mikko Hypponen, director of antivirus research at F-Secure Corp. in Helsinki.
That effort appears to have been successful.
"It's pretty quiet," said Johannes Ullrich, chief technology officer at the SANS Institute Inc.'s Internet Storm Center shortly after the mass action was scheduled to begin.
Ullrich did not notice any change in Internet traffic around the time Sobig was scheduled to download its instructions.
There were conflicting reports today about whether all or just some of the Sobig servers were taken off-line.
Network Associates Inc. (NAI) said that none of the 20 servers was online, according to Jimmy Kuo, a research fellow at NAI.
Internet Security Systems Inc. reported that one of the 20 was still online at 3:00 p.m. Eastern time but no new instructions had been placed on the machine by the virus writer, according to Dan Ingevaldson, engineering manager at ISS.
The last Sobig server stopped responding shortly after 3:00 p.m., he said.
With few or none of the 20 servers accessible, Sobig machines were unable to download any instructions, experts agreed.
In addition, Internet backbone providers may have been asked to drop any traffic destined for those addresses, similar to steps taken to prevent a scheduled denial-of-service attack against the White House that was programmed into the Code Red worm, Kuo said.
Such a move is standard procedure when Internet abuse and crime is tied to a specific machine or machines, according to Ingevaldson.
In any case, once authorities began shutting down the IP addresses of machines used by the worm, it is doubtful that the author would have risked uploading new instructions to one of those machines, Kuo said.
"My guess is the author saw how big and fast Sobig propagated and didn't want to go any further," Ingevaldson said.
Regardless of the outcome of the Sobig attack Friday, future hackers may well learn from the successes of the worm and incorporate that knowledge into future viruses, he said.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!