Symantec sees spike in dangerous Microsoft attacks
It raised its Threat Con security alert level from 1 to 2
IDG News Service - Symantec Corp. is warning of a sharp jump in online attacks that appear to be targeting a recently patched bug in Microsoft Corp.'s Windows operating system, an analysis that some other security companies disputed on Friday.
Symantec raised its Threat Con security alert level from 1 to 2 because of the attacks, with 2 denoting "increased alertness." But other vendors, including Arbor Networks Inc. and McAfee Inc., said they were seeing no such activity.
The attacks spotted by Symantec target a flaw in the Windows Server Service that Microsoft says could be exploited to create a self-copying worm attack. Late last month, Microsoft took the unusual step of rushing out an emergency patch for the bug after it saw a small number of online attacks that took advantage of it.
Since then, security experts and Microsoft have said that the attacks have not been widespread, but that may now be changing, according to Symantec.
The security vendor said it had seen a "dramatic rise" in attacks targeting TCP Port 445. A TCP port is a number assigned to packets of data sent over the Internet to help computers know what program should be processing the information. Web browsers, for example, typically use Port 80. Port 445 is one of two ports used to connect with the Windows Server Service.
This activity "appears to be related to the exploitation" of the Windows Server bug, Symantec said in a note on its Web site.
Most firewalls block Port 445, as well as the other port used by Server Service, Port 139, but Symantec said Windows users should still make sure they've applied the MS08-067 patch for the bug.
Attacks on the bug had previously focused on Chinese versions of Windows, but the latest attacks target English versions, Symantec said.
Arbor Networks disputed Symantec's interpretation. "We’re not seeing this rise, not on TCP Port 445 and not on TCP Port 139. Looking over the last month, we don’t see this rise in MS08-067 attacks that would raise any alarms for us," the company said in a Friday blog posting.
Both McAfee and Microsoft echoed those sentiments.
"Microsoft continues to see limited, targeted attacks that attempt to exploit this vulnerability," Microsoft said in a statement.
On the other hand, the Research and Education Networking Information Sharing and Analysis Center, which monitors research and university networks, reported that it had seen a bump in Port 445 activity.
Security experts say that if criminals are targeting specific networks with their attacks, it could account for the discrepancy.
- Who does NSS Labs "Recommend" for NGFW? In 2012, NSS Labs found that most available NGFW solutions "fell short in performance and security effectiveness." In 2013 NSS Labs noted "marked...
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- 9 Essentials for a Complete Cloud-to-Cloud Backup Solution In 9 Essentials for a Complete Cloud-to-Cloud Backup Solution, we'll walk you through potential sources of data loss in the cloud and provide...
- Workload Change: The 70 Percent of Your Business DevOps Forgot Adding WLA early in the development process ensures that the benefits of DevOps accrue for all applications, including your batch services. This paper...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Protecting Critical SaaS Data Before It's Too Late In this webinar, you'll hear how to avoid SaaS data loss through best practices from a panel of experts. All Operating Systems White Papers | Webcasts