Return-Path: <sentto-279987-1717-999881367-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Fri, 07 Sep 2001 09:52:38 -0700 (PDT) Received: (qmail 28983 invoked by uid 510); 7 Sep 2001 16:49:37 -0000 Received: from n12.groups.yahoo.com (216.115.96.62) by 204.181.12.215 with SMTP; 7 Sep 2001 16:49:37 -0000 X-eGroups-Return: sentto-279987-1717-999881367-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by n12.onelist.org with NNFMP; 07 Sep 2001 16:49:26 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_3_2_1); 7 Sep 2001 16:49:27 -0000 Received: (qmail 57882 invoked from network); 7 Sep 2001 16:40:44 -0000 Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 7 Sep 2001 16:40:44 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 7 Sep 2001 16:40:34 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id JAA08617 for iwar@onelist.com; Fri, 7 Sep 2001 09:40:17 -0700 Message-Id: <200109071640.JAA08617@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Fri, 7 Sep 2001 09:40:17 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Broadband-Firm-Unplugs-Code-Red-Victims] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Broadband Firm Unplugs Code Red Victims By Tim McDonald, www.NewsFactor.com, 9/6/2001 <a href="http://dailynews.yahoo.com/h/nf/20010906/tc/13373_1.html">http://dailynews.yahoo.com/h/nf/20010906/tc/13373_1.html> One company is taking a novel -- if not necessarily compassionate -- approach to the effects of the Code Red computer virus. It is suspending those of its customers it suspects of being victims. Cable broadband company Blueyonder said in a statement that it is enforcing the equivalent of an online quarantine because the infection of some of its customers' computers "has at times resulted in poor performance for our users," and represents a "significant risk of failure of service." The company, which is the high-speed Internet arm of UK-based Telewest, said it will seek out and locate those customers who have been infected by scanning its cache log files. 'Hammering' Caches "Customers found to be infected with the Code Red virus will be suspended immediately and have their accounts suspended until they have patched their machines accordingly, " the notice said. Since the notice was posted Wednesday, 51 companies have been diagnosed with the virus, and their computer systems have been "hammering Telewest's caches," according to the company. Those users have been informed by e-mail of their suspensions, with instructions on how to get their computers fixed and reconnected. Company executives could not be reached for comment. Broadband Hopes High Telewest posted a loss for the second quarter, largely as the result of a broadband price war in the United Kingdom, but hopes to double its high-speed Internet subscribers this year. The company gained 13,000 subscribers in the second quarter and now has 38,000 total subscribers, according to company figures. Last month, Telewest officials said the company would begin offering its customers Microsoft Outlook services on its network. Started in China? Code Red is categorized as a "worm," which means that it invades the servers that pass data across the Internet and overwhelms their memory capacity, causing them to go down just before the worm is passed to another computer. The FBI (news - web sites)'s National Infrastructure Protection Center (NIPC) issued a bulletin last month saying that "the Internet threat posed by Code Red when it changes from a scanning mode to an active distributed denial of service mode ... is significantly reduced." A congressional report last week said the virus probably originated at a university in China. Global Costs Industry experts say the global cost of the Code Red virus has surpassed US$2 billion and could pass $8 billion by the time it runs its course, including costs to patch systems and lost worker productivity. Globally, virus costs in 2000 and 1999 reached $17.1 billion and $12.1 billion, respectively, according to independent research firm Computer Economics. Love Bug was the costliest virus, with its ravages pegged at $8.7 billion, followed by Melissa at $1.2 billion and the Explorer bug at $1 billion. The cost of overall virus attacks on IT systems globally has reached an estimated $10.7 billion this year, according to the firm. SirCam cost about $1 billion and affected more than 2 million computers. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide: "Securing Your Web Site for Business." Get it Now! http://us.click.yahoo.com/n7RbFC/zhwCAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:41 PDT