Skip the navigation

Symantec sees spike in dangerous Microsoft attacks

It raised its Threat Con security alert level from 1 to 2

By Robert McMillan
November 21, 2008 12:00 PM ET

IDG News Service - Symantec Corp. is warning of a sharp jump in online attacks that appear to be targeting a recently patched bug in Microsoft Corp.'s Windows operating system, an analysis that some other security companies disputed on Friday.

Symantec raised its Threat Con security alert level from 1 to 2 because of the attacks, with 2 denoting "increased alertness." But other vendors, including Arbor Networks Inc. and McAfee Inc., said they were seeing no such activity.

The attacks spotted by Symantec target a flaw in the Windows Server Service that Microsoft says could be exploited to create a self-copying worm attack. Late last month, Microsoft took the unusual step of rushing out an emergency patch for the bug after it saw a small number of online attacks that took advantage of it.

Since then, security experts and Microsoft have said that the attacks have not been widespread, but that may now be changing, according to Symantec.

The security vendor said it had seen a "dramatic rise" in attacks targeting TCP Port 445. A TCP port is a number assigned to packets of data sent over the Internet to help computers know what program should be processing the information. Web browsers, for example, typically use Port 80. Port 445 is one of two ports used to connect with the Windows Server Service.

This activity "appears to be related to the exploitation" of the Windows Server bug, Symantec said in a note on its Web site.

Most firewalls block Port 445, as well as the other port used by Server Service, Port 139, but Symantec said Windows users should still make sure they've applied the MS08-067 patch for the bug.

Attacks on the bug had previously focused on Chinese versions of Windows, but the latest attacks target English versions, Symantec said.

Arbor Networks disputed Symantec's interpretation. "We’re not seeing this rise, not on TCP Port 445 and not on TCP Port 139. Looking over the last month, we don’t see this rise in MS08-067 attacks that would raise any alarms for us," the company said in a Friday blog posting.

Both McAfee and Microsoft echoed those sentiments.

"Microsoft continues to see limited, targeted attacks that attempt to exploit this vulnerability," Microsoft said in a statement.

On the other hand, the Research and Education Networking Information Sharing and Analysis Center, which monitors research and university networks, reported that it had seen a bump in Port 445 activity.

Security experts say that if criminals are targeting specific networks with their attacks, it could account for the discrepancy.

Reprinted with permission from IDG.net. Story copyright 2014 International Data Group. All rights reserved.
Our Commenting Policies