*EPF112 07/30/01
Text: Alert Issued for Computer Worm Virus
(Virus has potential to cause widespread Internet slowdowns) (880)

A coalition of government and private organizations concerned with Internet security is issuing a warning about the spread of a computer virus that has the potential to slow down the entire Internet system.

The virus "Code Red Worm" is likely to strike unprotected systems at 8:00 p.m. Eastern Daylight Time (2400 GMT) July 31, according to an alert issued jointly by the National Infrastructure Protection Center (NIPC), Microsoft Corporation, the Information Technology Association of America (ITAA), the Computer Emergency Response Team (CERT), the Federal Computer Internet Response Center and others.

The warning is being issued based on what Internet security specialists were able to deduce about its behavior when it first appeared earlier in July, when it attacked computer users with the Windows NT or Windows 2000 system and the IIS Web server software.

"On July 19, the Code Red Worm infected more than 250,000 systems in just nine hours," according to the NIPC alert. "The worm scans the Internet, identifies vulnerable systems, and infects these systems by installing itself. Each newly installed worm joins all the others causing the rate of scanning to grow rapidly."

As this scanning expands, the Internet becomes congested and "performance degradation can affect all users," according to Shawn Hernan of the CERT technical staff.

The alert advises computer users with the vulnerable software to install a protective program -- a "patch" -- that Microsoft is making available in view of this outbreak. The patch for the Windows NT version 4.0 can be downloaded at: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30833

In order to protect the Windows 2000 Professional, Server and Advanced Server, users should download the patch at: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30800

In its earlier appearance, the Code Red Worm hacked the World Wide Web homepages of some users, but there was no other widespread destruction of data, Hernan said in an interview.

The investigation into the source of Code Red Worm is still underway, but Hernan said analysts have been able to translate its code to ascertain that it is programmed to begin its scan on the first of the month, continuing through the 20th of the month. On the 20th, Hernan said, Code Red is programmed to attack the White House Web site.

Further information about Internet security is available at http://www.nipc.gov and at http://www.cert.org/

(begin text)

National Infrastructure Protection Center

Press Room

ALERT

"Code Red Worm" July 29, 2001

A Very Real and Present Threat to the Internet: July 31 Deadline For Action

Summary: The Code Red Worm and mutations of the worm pose a continued and serious threat to Internet users. Immediate action is required to combat this threat. Users who have deployed software that is vulnerable to the worm (Microsoft IIS Versions 4.0 and 5.0) must install, if they have not done so already, a vital security patch.

How Big Is The Problem? On July 19, the Code Red worm infected more than 250,000 systems in just 9 hours. The worm scans the Internet, identifies vulnerable systems, and infects these systems by installing itself. Each newly installed worm joins all the others causing the rate of scanning to grow rapidly. This uncontrolled growth in scanning directly decreases the speed of the Internet and can cause sporadic but widespread outages among all types of systems. Code Red is likely to start spreading again on July 31st, 2001 8:00 PM EDT and has mutated so that it may be even more dangerous. This spread has the potential to disrupt business and personal use of the Internet for applications such as electronic commerce, email and entertainment.

Who Must Act? Every organization or person who has Windows NT or Windows 2000 systems AND the IIS web server software may be vulnerable. IIS is installed automatically for many applications. If you are not certain, follow the instructions attached to determine whether you are running IIS 4.0 or 5.0. If you are using Windows 95, Windows 98, or Windows Me, there is no action that you need to take in response to this alert.

What To Do If You Are Vulnerable?

a. To rid your machine of the current worm, reboot your computer. b. To protect your system from re-infection: Install Microsoft's patch for the Code Red vulnerability problem:

-- Windows NT version 4.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30833

-- Windows 2000 Professional, Server and Advanced Server: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30800

Step-by-step instructions for these actions are posted at www.digitalisland.net/codered

Microsoft's description of the patch and its installation, and the vulnerability it addresses is posted at: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS01-033.asp

Because of the importance of this threat, this alert is being made jointly by: Microsoft Corporation National Infrastructure Protection Center (NIPC) Federal Computer Incident Response Center (FedCIRC) Information Technology Association of America (ITAA) CERT Coordination Center (CERT/CC) SANS Institute Internet Security Systems (ISS) Internet Security Alliance (ISA)

Recipients of this alert are encouraged to report computer intrusions to their local FBI office (http://www.fbi.gov/contact/fo/fo.htm) or the NIPC, and to other appropriate authorities. Incidents may be reported online at http://www.nipc.gov/incident/cirr.htm. The NIPC Watch and Warning Unit can be reached at (202) 323-3204/3205/3206 or [email protected].

(end text)

(Distributed by the Office of International Information Programs, U.S. Department of State. Web site: http://usinfo.state.gov)
NNNN


Return to Washington File Main Page
Return to the Washington File Log