Symantec issues bogus warning of full-scale Internet meltdown
False alarm result of 'product testing,' says company an hour later
Computerworld - Symantec Corp.'s early-warning system gave its enterprise customers a brief scare late Friday when it erroneously sent an alert that said an Internet-crippling attack was in progress.
The message, which went out to users of Symantec's DeepSight advanced alert system around 8:40 p.m. Eastern time, had a subject head that simply read: "DeepSight Increased ThreatCon from 1 to 4 Alert."
ThreatCon uses a 1-4 scoring system, with 1 being the least alarming threat level and 4 the most dire, to indicate Symantec's take on the current state of Internet security. According to the company's own definition, Level 4 is regarded as a "Full alert" and is reserved for those times when "extreme global network incident activity is in progress." The definition goes on to say that "implementation of measures in this Threat Condition for more than a short period probably will create hardship and affect the normal operations of network infrastructure."
Symantec has never set ThreatCon to Level 4. In fact, even a Level 3 is rare. One of the last times the Cupertino, Calif.-based security company issued a Level 3 alert was in May 2004, when the Sasser worm was on the rampage.
In the body of the e-mailed alert, however, careful readers found the words "Summary: threatcon test threatkhanh otrs" buried among several links.
The alert was a false alarm, Symantec said just over an hour later in a follow-up message at 9:45 p.m. Eastern time. "The DeepSight Threat Management System is NOT at ThreatCon 4. At 18:40 MST on September 21, 2007 an erroneous ThreatCon 4 update was issued through DeepSight TMS due to product testing. This ThreatCon 4 update should be disregarded."
A similar message posted on the DeepSight Threat Management System Web-based console ended with: "The ThreatCon has been returned to the correct level, ThreatCon 1."
Read more about Security in Computerworld's Security Topic Center.
- The Critical Incident Response Maturity Journey As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key.
- Advanced Attacks Demand New Defenses Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It's scary stuff, and ignorance is definitely not bliss....
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!