Security Incidents mailing list archives
Wide-scale Code Red Damage Assessment and Report
From: "Jon O ." <jono () microshaft org>
Date: Sun, 22 Jul 2001 14:50:53 -0700
During the infection phase of Code Red (on the 19th) we wrote a small tool
for research purposes.
This tool read in logs of machines sending the default.ida attack and connected
back to them on port 80, made a GET request and dumped the resulting data.
This tool was run continuously from 3 unique machines in different locations
around the internet, but all in the West Coast US. These "Reponse machines"
connected to over 40K machines over the course of the next 24 hours.
The goal is to research and gain statistics on what types of companies were
launching these attack on our servers.
Around 10:00 am PST we saw a sharp decrease in the succees of our connections to
the attacking machines on port 80. Obiviously, this was probably the result
of administrators finding these machines compromised and attacking a phantom
www1.whitehouse.gov. Our port 80 connections to these machines steadily
decreased over the next 12 hours.
After dumping the index.html (or similar) pages from the attacking machines,
we began to analyize the data. We decided the only real good information
contained in this data was the time aspect mentioned above and the type of
website being served.
The time is of interest because it shows how quickly the infection was responded
to by engineers and administrators. Although, this data is far from scientific
and admins could have patched their machines and had them back up when the
Response machines connected.
The other item of interest was the sites being served on these machines. We
are attempting to break the sites down into categories as follows:
E-Commerce Site
General Website
Health Care providers
Government Agencies
Online Banking Institutions
We will publish this information to this list when complete. However, to protect
privacy of these sites, companies, etc. we are not planning on releasing names.
Also, there are some sites which appear to contain gateways to sensitive data.
We encourage the Responsible Parties of these machines to fix them in the
interest of protecting Patient, Government and private data. We also encourage
you to look through your logs in order to be more informed about these companies
who were attacking and their apparent disregard for simple security fixes such
as a patch. This disregard resulted in a massive about of DoS traffic to be
transferred all over the internet. We can only hope to be so lucky next time.
Attachment:
_bin
Description:
Current thread:
- My list of default.ida connection attempts Sean Kelly (Jul 22)
- <Possible follow-ups>
- Re: My list of default.ida connection attempts Vern Paxson (Jul 22)
- Wide-scale Code Red Damage Assessment and Report Jon O . (Jul 22)
- Re: My list of default.ida connection attempts Vern Paxson (Jul 22)
