Symantec issues bogus warning of full-scale Internet meltdown
False alarm result of 'product testing,' says company an hour later
Computerworld - Symantec Corp.'s early-warning system gave its enterprise customers a brief scare late Friday when it erroneously sent an alert that said an Internet-crippling attack was in progress.
The message, which went out to users of Symantec's DeepSight advanced alert system around 8:40 p.m. Eastern time, had a subject head that simply read: "DeepSight Increased ThreatCon from 1 to 4 Alert."
ThreatCon uses a 1-4 scoring system, with 1 being the least alarming threat level and 4 the most dire, to indicate Symantec's take on the current state of Internet security. According to the company's own definition, Level 4 is regarded as a "Full alert" and is reserved for those times when "extreme global network incident activity is in progress." The definition goes on to say that "implementation of measures in this Threat Condition for more than a short period probably will create hardship and affect the normal operations of network infrastructure."
Symantec has never set ThreatCon to Level 4. In fact, even a Level 3 is rare. One of the last times the Cupertino, Calif.-based security company issued a Level 3 alert was in May 2004, when the Sasser worm was on the rampage.
In the body of the e-mailed alert, however, careful readers found the words "Summary: threatcon test threatkhanh otrs" buried among several links.
The alert was a false alarm, Symantec said just over an hour later in a follow-up message at 9:45 p.m. Eastern time. "The DeepSight Threat Management System is NOT at ThreatCon 4. At 18:40 MST on September 21, 2007 an erroneous ThreatCon 4 update was issued through DeepSight TMS due to product testing. This ThreatCon 4 update should be disregarded."
A similar message posted on the DeepSight Threat Management System Web-based console ended with: "The ThreatCon has been returned to the correct level, ThreatCon 1."
Read more about Security in Computerworld's Security Topic Center.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!