Update: State Department visa system disrupted by virus
The agency is still investigating the incident
Computerworld - WASHINGTON -- A computer virus yesterday disabled a portion of the State Department's domestic enterprise network, forcing the agency to halt overseas screenings of visa applicants for criminal histories and links to terrorism, a department official confirmed today.
The virus, identified as the Welchia virus, forced the State Department to quarantine the network used by its Consular Lookout and Support System, known as CLASS, which contains nearly 15 million records on known or suspected terrorists and other criminals. As a result, the system was unavailable between noon and 9 p.m. EDT yesterday, said Mary Swann, a State Department spokeswoman.
However, Swann denied earlier reports that indicated the virus had infected the CLASS system and was the cause of the shutdown.
"At no time was the department's classified network infected," nor did it infect the visa screening system, she said. Although e-mail communications were slowed because of the virus, Swann said the interruption of service in the CLASS name-checking system was due solely to security precautions taken by the department.
No visas were issued until applicants could be checked against the system, she said.
The CLASS name-checking system is designed to make it difficult for visa applicants to hide relevant information on criminal histories or terrorist links from State Department consular officers. Complex algorithms are used to provide uniform and consistent translations of names in non-Roman alphabets. The system displays a wide range of potential name matches that a consular officer must review prior to issuing a visa. Other documentation is necessary as well, including a passport, job letters and other data the consular officers cross-check.
The outbreak affected only Windows systems on the State Department's unclassified network in its Washington\ facility, according to Swann. That network hosts the agency's unclassified e-mail system as well as other unclassified network resources.
Swann defended the State Department's IT security system, saying that the agency has a "very elaborate system" of firewall, intrusion-detection system and antivirus technologies that were all up to date at the time of the outbreak.
The agency couldn't provide statistics on how many Windows systems were infected or how the worm was introduced to the Department of State's network, she said.
Swann also couldn't comment on why State Department systems were vulnerable to the Welchia worm.
Infections on the agency's internal network suggest that Windows systems hadn't been patched with either one of two critical Microsoft software updates that plugged the security holes exploited by Blaster and Welchia, but Swann couldn't confirm the existence of unpatched systems on the network.
First identified on Aug. 18, Welchia spreads by exploiting the same Windows security hole as the W32.Blaster worm.
It doesn't rely on e-mail messages to spread. The worm exploits machines by sending an improperly formatted remote procedure call message to vulnerable systems, causing a buffer overflow on the machines that allows the worm code to spread.
After infecting vulnerable Windows 2000 or Window XP machines, the new worm searches for and removes the Blaster worm file, Msblast.exe, and attempts to download and install a Windows software patch from Microsoft that closes the security hole used by the worm, according to antivirus companies.
Although the number of new Welchia infections is down since August, copies of it are still circulating on the Internet. Today, antivirus company Symantec Corp. still had Welchia rated a Category 4 threat on a scale of one to five, indicating a "severe" threat that is "difficult to contain."
As of 12:30 p.m. today, Swann said the majority of the State Department's desktops were back up and running properly. Officials expect to have the entire domestic network fully functioning by the end of the day.
Paul Roberts of the IDG News Service contributed to this report.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Infographic: Converged Infrastructure Benefits This Infographic quantifies the savings organizations are realizing from increased deployment speed, higher availability, and lower annual costs.
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Malware and Vulnerabilities White Papers | Webcasts