[iwar] [fc:Broadband-Firm-Unplugs-Code-Red-Victims]

From: Fred Cohen (fc@all.net)
Date: 2001-09-07 09:40:17


Return-Path: <sentto-279987-1717-999881367-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Fri, 07 Sep 2001 09:52:38 -0700 (PDT)
Received: (qmail 28983 invoked by uid 510); 7 Sep 2001 16:49:37 -0000
Received: from n12.groups.yahoo.com (216.115.96.62) by 204.181.12.215 with SMTP; 7 Sep 2001 16:49:37 -0000
X-eGroups-Return: sentto-279987-1717-999881367-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by n12.onelist.org with NNFMP; 07 Sep 2001 16:49:26 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_1); 7 Sep 2001 16:49:27 -0000
Received: (qmail 57882 invoked from network); 7 Sep 2001 16:40:44 -0000
Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 7 Sep 2001 16:40:44 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 7 Sep 2001 16:40:34 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id JAA08617 for iwar@onelist.com; Fri, 7 Sep 2001 09:40:17 -0700
Message-Id: <200109071640.JAA08617@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 7 Sep 2001 09:40:17 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Broadband-Firm-Unplugs-Code-Red-Victims]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Broadband Firm Unplugs Code Red Victims

By Tim McDonald, www.NewsFactor.com, 9/6/2001
<a href="http://dailynews.yahoo.com/h/nf/20010906/tc/13373_1.html">http://dailynews.yahoo.com/h/nf/20010906/tc/13373_1.html>

One company is taking a novel -- if not necessarily compassionate --
approach to the effects of the Code Red computer virus. It is suspending
those of its customers it suspects of being victims.

Cable broadband company Blueyonder said in a statement that it is
enforcing the equivalent of an online quarantine because the infection
of some of its customers' computers &quot;has at times resulted in poor
performance for our users,&quot; and represents a &quot;significant risk of
failure of service.&quot;

The company, which is the high-speed Internet arm of UK-based Telewest,
said it will seek out and locate those customers who have been infected
by scanning its cache log files.

'Hammering' Caches

&quot;Customers found to be infected with the Code Red virus will be
suspended immediately and have their accounts suspended until they have
patched their machines accordingly, &quot; the notice said.

Since the notice was posted Wednesday, 51 companies have been diagnosed
with the virus, and their computer systems have been &quot;hammering
Telewest's caches,&quot; according to the company.

Those users have been informed by e-mail of their suspensions, with
instructions on how to get their computers fixed and reconnected.

Company executives could not be reached for comment.

Broadband Hopes High

Telewest posted a loss for the second quarter, largely as the result of
a broadband price war in the United Kingdom, but hopes to double its
high-speed Internet subscribers this year.

The company gained 13,000 subscribers in the second quarter and now has
38,000 total subscribers, according to company figures.

Last month, Telewest officials said the company would begin offering its
customers Microsoft Outlook services on its network.

Started in China?

Code Red is categorized as a &quot;worm,&quot; which means that it invades the
servers that pass data across the Internet and overwhelms their memory
capacity, causing them to go down just before the worm is passed to
another computer.

The FBI (news - web sites)'s National Infrastructure Protection Center
(NIPC) issued a bulletin last month saying that &quot;the Internet threat
posed by Code Red when it changes from a scanning mode to an active
distributed denial of service mode ... is significantly reduced.&quot;

A congressional report last week said the virus probably originated at a
university in China.

Global Costs

Industry experts say the global cost of the Code Red virus has surpassed
US$2 billion and could pass $8 billion by the time it runs its course,
including costs to patch systems and lost worker productivity.

Globally, virus costs in 2000 and 1999 reached $17.1 billion and $12.1
billion, respectively, according to independent research firm Computer
Economics. Love Bug was the costliest virus, with its ravages pegged at
$8.7 billion, followed by Melissa at $1.2 billion and the Explorer bug
at $1 billion.

The cost of overall virus attacks on IT systems globally has reached an
estimated $10.7 billion this year, according to the firm. SirCam cost
about $1 billion and affected more than 2 million computers.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide: "Securing Your Web Site for Business." Get it Now!
http://us.click.yahoo.com/n7RbFC/zhwCAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:41 PDT