{
    "success": true,
    "data": {
        "id": 1321465,
        "msgid": "exhausting-ordeal-when-worms-attack-1447893297",
        "date": "2003-09-01 00:00:00",
        "title": "Exhausting ordeal when worms attack!",
        "author": null,
        "source": "JP",
        "tags": null,
        "topic": null,
        "summary": "Exhausting ordeal when worms attack! Vishnu K. Mahmud, Contributor, Jakarta vmahmud@yahoo.com The past few weeks have been exhausting for IT departments in Indonesia. After the recent enactment of the Indonesian Intellectual Property law, which caused many corporations to scramble to ensure compliancy, an Internet worm attacked computers worldwide. The \"MSBlast\" worm, which reached its peak on Aug. 15, caused many PCs and servers to be rendered practically useless.",
        "content": "<p>Exhausting ordeal when worms attack!<\/p>\n<p>Vishnu K. Mahmud, Contributor, Jakarta<br>\nvmahmud@yahoo.com<\/p>\n<p>The past few weeks have been exhausting for IT departments in<br>\nIndonesia. After the recent enactment of the Indonesian<br>\nIntellectual Property law, which caused many corporations to<br>\nscramble to ensure compliancy, an Internet worm attacked<br>\ncomputers worldwide.<\/p>\n<p>The &quot;MSBlast&quot; worm, which reached its peak on Aug. 15, caused<br>\nmany PCs and servers to be rendered practically useless.<br>\nTargeting Microsoft Windows operating systems, the worm had<br>\nmanaged to exile computer users from their documents, programs,<br>\nnetworks and the Internet. Those using the Linux operating system<br>\nor Apple&apos;s Unix-based Mac OS X were not affected.<\/p>\n<p>MSBlast was followed by another worm (dubbed Welchia, which<br>\nironically was created to target computers infected with<br>\nMSBlast), a virus (Sobig.F, which sends out spam that clogs up e-<br>\nmail systems) and an announcement of yet another vulnerability in<br>\nMicrosoft&apos;s Internet Explorer web browser application.<\/p>\n<p>All in all, nearly a million computers worldwide were<br>\ninfected, including those at an American nuclear power plant, the<br>\nAir Canada national check-in counters, the U.S. Navy intranet<br>\nsystems and the Maryland Department of Motor Vehicles, to name<br>\nbut a few, not to mention countless small and medium business<br>\nenterprises.<\/p>\n<p>Microsoft, to its credit, had issued a software patch to<br>\nprotect against the MSBlast-type of threat in July but many users<br>\neither did not know or chose not to install it. During the height<br>\nof the worm infection, users couldn&apos;t even access the Internet,<br>\nlet alone download the patch. In one case, a Jakarta-based IT<br>\nconsultant had to ask a friend to download the software for him,<br>\non a Red Hat Linux machine!<\/p>\n<p>Many companies had to take their network offline in order to<br>\nclean and patch the systems. Business came to a near standstill<br>\nas documents and e-mails could not be created or sent. It seems<br>\nthat computers are no longer communications tools to be used for<br>\nbusiness but are actually the lifeblood of the company. It seems<br>\nthat we have gotten so used to using these tools that we have<br>\nforgotten how to do things the &quot;old-fashioned&quot; way, such as using<br>\nmanual typewriters and faxes, which are admittedly slower but<br>\nstill effective.<\/p>\n<p>What worries IT analysts the most is not that the world has<br>\nsurvived these latest computer attacks, but what virus coders<br>\ncould do in the future. The fact that MSBlast can infect a<br>\ncomputer without users double-clicking an e-mail attachment,<br>\nwhich is usually how viruses or worms attack, opens a new era of<br>\nvirtual assaults.<\/p>\n<p>How can we avoid this in the future? The basics still apply:<br>\nback up your data, patch your computers early and often, and<br>\nsecure your computers with antivirus software with the latest<br>\nviral signatures. Considering the effectiveness of MSBlast in<br>\nentering computers via the Internet without any user interaction,<br>\na firewall is highly recommended, especially for those with<br>\ncomputers constantly connected to the Internet.<\/p>\n<p>Download.com (www.download.com) has an abundance of firewall<br>\nprograms (some free, some for a small charge) that can be<br>\ninstalled on your personal computer. Some of the more popular<br>\nprograms are Norton Personal Firewall, BlackIce Defender,<br>\nZoneAlarm and Sygate&apos;s Personal Firewall. Corporations should<br>\nconsider high-grade firewall solutions from Cisco or Computer<br>\nAssociates.<\/p>\n<p>Microsoft Windows has a built-in Windows Update feature that<br>\ninforms users of the latest security patches. Activate it to let<br>\nyou know what patch is available and for what purpose. You can<br>\nthen decide whether you want to install it or not.<\/p>\n<p>Businesses should also consider diversifying their operating<br>\nsystems. As shown in these latest attacks, having a homogeny of<br>\ncomputer systems could cause problems if they all go down. It may<br>\nbe a good idea to use different systems (such as a Linux box or a<br>\nMac OS X computer) in certain departments, which could be used in<br>\ncase of emergency.<\/p>\n<p>One story floating around the Internet showcased how a man,<br>\nwho fought the IT department tooth and nail for an Apple<br>\nPowerbook laptop, helped his company grab two important contracts<br>\nwhen all the other computers were offline. A working computer and<br>\na phone line was all it took.<\/p>\n<p>But perhaps the most important weapon against this new form of<br>\ncyberterrorism is information. IT Managers and even regular<br>\ncomputer users should keep up with the latest news in the IT<br>\nworld. CNN&apos;s IT section (www.cnn.com\/tech) and CNet<br>\n(www.news.com) are great places to start.<\/p>\n<p>People who drive cars or use heavy machinery are trained and<br>\nlicensed. Although computer users do not need to be registered,<br>\nif you consider the amount of damage a PC can cause to the<br>\nInternet these days, you would want at least to keep ahead of the<br>\ngame.<\/p>",
        "url": "https:\/\/jawawa.id\/newsitem\/exhausting-ordeal-when-worms-attack-1447893297",
        "image": ""
    },
    "sponsor": "Okusi Associates",
    "sponsor_url": "https:\/\/okusiassociates.com"
}