TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! ----------------------------------------------------------------------------
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 INTERNET RISK UPDATE for 07-09-2002 ISS X-Force Internet Threat Intelligence Center www.iss.net - Click on the AlertCon logo for more information. ******************************************** ALERTCON 1 Projected: AlertCon 1 ******************************************** ALERTCON 1 - We are at AlertCon 1, the usual chaotic, unregulated state of the Internet. VULNERABILITIES: We are seeing a marked increase in the number of Port 21 (FTP) scans. Please see below regarding the Apache and OpenSSH vulnerabilities. VIRUSES/WORMS: W32/Liac@MM - This email worm is written in Visual Basic and uses Microsoft Outlook to mail itself to all recipients in the Outlook contacts list. Upon execution, the following fake error message is displayed: Error54: Media Player not installed correctly ******************************************** RECOMMENDATIONS ******************************************** OpenSSH: ISS X-Force recommends that system administrators disable unused OpenSSH authentication mechanisms. For further information on this solution and affected products, please review the advisory. http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=2058 4 Apache: The X-Force has released an advisory with patching instructions for the default setting of the Apache HTTP Server. This advisory requires immediate action on behalf of all system users with Apache HTTP Server. See Apache for additional details. http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=2052 4 http://httpd.apache.org/info/security_bulletin_20020617.txt For a list of current vulnerabilities, please see: https://gtoc.iss.net/vulnerabilities.php For the Worm/Virus of the day, please refer to: http://vil.nai.com/vil/content/v_99554.htm Information regarding other viruses and worms please see: https://gtoc.iss.net/viruses.php ******************************************** FACTOID: Port Scanning is one of the most popular reconnaissance techniques attackers use to discover services they can break into. All machines connected to a LAN or connected to Internet run many services that listen at well-known and not so well known ports. By port scanning the attacker finds which ports are available (i.e., being listened to by a service). Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed further for weakness. ******************************************** ATTACK SIGNATURE RANKING - global IDS, midnight - midnight, previous Day, % of total ******************************************** Protocol Violation 32.66% Unauthorized Access Attempt 24.08% Pre-Attack Probe 17.07% Suspicious Activity 15.48% Denial Of Service 10.58% Back Door 00.14% ******************************************** TOP ATTACK DESTINATION PORTS - global IDS, midnight - midnight, previous day, % of top ports (ports found at) http://www.neohapsis.com/neolabs/neo-ports/neo-ports.html ******************************************** 80 (http) 59.73% 21 (ftp) 12.33% 25 (smtp) 07.08% 23 (telnet) 06.20% 161 (SNMP) 05.16% 69 (tftp) 02.97% 111 (sunrpc) 02.78% 515 (printer) 01.65% 22 (ssh) 01.06% 162 (SNMPTrap) 01.03% ******************************************** BACKGROUND, COPYRIGHT NOTICE, and DISCLAIMER ******************************************** Background. We provide this information in the spirit of PDD 63 to help security professionals wage the war against Internet threats more effectively. Information in this update derived primarily from global, real time, 24 x 7 IDS feeds, ISS X-Force R&D Team research, and professional liaison. Other sources as noted. AlertCon 1 - Internet risk baseline reflecting the malicious, determined, global, 24/7 attacks experienced by all networks connected to the Internet. In simple terms, AlertCon 1 indicates that a newly configured computer will be compromised within 24 hours of first being connected to the Internet. AlertCon 2 means increased vigilance is necessary. The potential exists for increased risk because of new vulnerabilities or credible threats to the confidentiality, integrity, and/or availability of computer networks. Some degree of vulnerability assessment and potential corrective action is recommended. AlertCon 3 reflects focused attacks. Internet attacks have been noted against specific vulnerabilities or inherent information system weaknesses. Immediate defensive action is required. AlertCon 4 means an actual or potentially catastrophic security situation has arisen within a network or group of networks whose survival depends on immediate and focused defensive action. This condition may be imminent or ongoing. All summaries cover 24 hours the previous workday, GMT. Monday summaries may cover some weekend activity. Copyright 2002 Internet Security Systems, Inc. Permission is granted for the redistribution of the Internet Risk electronically. It is not to be sold or edited in any way without express consent of ISS. Refer comments or questions to: mailto:[EMAIL PROTECTED] or mailto:[EMAIL PROTECTED] Disclaimer: This information is subject to change without notice. Use of this information constitutes acceptance for use in an 'as is' condition. There are no warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. No other use authorized. FOIA Exemption 4. Patrick Gray Manager, X-Force Internet Threat Intelligence Center Internet | Security | Systems The Power To Protect www.iss.net -----BEGIN PGP SIGNATURE----- Version: PGP 7.1.1 iQA/AwUBPSrovpG41ROSQPncEQLXTACg92HEpZRgKB68fcH/ZsBSvCzby3IAoJMm qkq61ao5bgQe1iLyHknzQtT/ =LBKE -----END PGP SIGNATURE-----
