CERT warns of attacks, new holes in Windows

The CERT Coordination Center has received reports of widespread attacks using a recently disclosed security vulnerability and a previously unknown security hole in Microsoft's Windows operating system, the center said last Thursday in an advisory.

The known vulnerability is in a Windows interface that handles communications using the RPC (Remote Procedure Call) protocol. That problem affects most supported versions of the Windows operating system and could enable remote attackers to gain total control over vulnerable systems.

Microsoft disclosed the problem and provided a patch for vulnerable systems in a security bulletin July 16 after it was discovered and reported to the company by a Polish security group, Last Stage of Delirium.

Reports of Internet scans for vulnerable systems and isolated attacks using the Windows flaw surfaced after the publication on the Internet last week of code that could be used to exploit vulnerable systems, prompting warnings from security experts and the U.S. Department of Homeland Security about pending attacks.

CERT's advisory cites the existence of multiple exploits on the Internet and reports of "intruders actively scanning for and exploiting" the Microsoft vulnerability.

In the past two days, the computer security research and development organization has received reports of "thousands" of systems compromised using variations of the malicious code, known as DCOM RPC, after the flawed Windows DCOM (distributed component object model) interface, according to Jeff Havrilla, Internet security analyst at CERT in Pittsburgh.

CERT does not know how many machines have been hacked using the DCOM RPC exploit, but the ratio between the number of reports CERT typically receives to the number of machines compromised suggests that the number is large, Havrilla said.

In many cases, administrators may not even know their computers have been compromised, he said. That may be by design.

In contrast to previous exploits such as the Code Red and Slammer worms, both of which took advantage of widespread Microsoft security holes, malicious hackers are keeping a low profile with the DCOM RPC vulnerability, Havrilla said.

"It's not like Code Red where the machine that was taken over started to spawn hundreds of processes. These machines are much more stealthy and much more controlled," he said.

Malicious hackers are using DCOM RPC to place Trojan programs on compromised systems, giving them control of those systems for use in future attacks, he said.

"It's not a worm. It doesn't rise to that level. But it's a controlled, systematic exploitation of vulnerable systems," Havrilla said.

Also adding to volume of attacks is a previously unknown flaw, also in the Windows RPC component but not covered by the recent Microsoft patch, that makes Windows 2000 machines vulnerable to denial of service attacks, he said.

That flaw surfaced in recent days, along with code to exploit the vulnerability, and has also been used in attacks on vulnerable systems. Those attacks have caused confusion among Microsoft customers who applied the RPC patch to Windows 2000 systems, fueling speculation that the Redmond, Washington, company's patch did not work.

In its advisory, CERT recommends that customers apply both the Microsoft patch and block network traffic on Transmission Control Protocol (TCP) ports 135, 139 and 445, which are used by the RPC service.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Paul Roberts

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?