Security Watch

The No-Spin Zone

The spin needs to stop here when companies lose millions of people's confidential information.

Physical
Bank of America "lost" computer backup tapes shipped offsite for storage in December 2004. The tapes contained financial information on more than 1 million U.S. federal employees, including numerous U.S. senators.

Notice how we keep hearing about identity information being lost, but we rarely hear how it was lost? The marketing spin machine kicks into high gear and says "Telling people the information was lost or stolen makes us look like a victim. Telling people how it was lost or stolen due to our incompetence or lack of due diligence will make them distrust us, so don't do that."

If you're like me, you're getting tired of waiting for the phone call or letter from your bank or finance company telling you all your personal information has been compromised. With few exceptions, there's nothing we can do but wait for the bell to toll for us.

This Bank of America information "loss" should serve to remind companies that store sensitive information offsite that the storage and transportation of that information should be treated as securely as the data would be if it were in house and in use. All too often this isn't the case. This extends to the disposal of old storage media. Remember, while the thieves may simply want the media to sell for its basic value, loss of sensitive information contained on such media can be far more costly.

Hacking
Watch out for the WU-ftpd (Washington University FTP daemon) DIR wildcard Denial of Service vulnerability. A vulnerability exists in wu-ftpd which allows anyone who can connect to the FTP server and issue a DIR command to cause the server's CPU to consume all of its resources and become unresponsive. Wu-ftpd is implemented in most Unix and Linux distributions.

The most remarkable thing about this vulnerability is that there are still people using FTP for file transfers, and particularly that people are still using wu-ftpd. Wu-ftpd is one of the most notorious programs around with respect to consistently being vulnerable to attack. This particular vulnerability is a variation on a similar vulnerability discovered in November 2001.

FTP was depreciated many years ago when HTTP became mature enough to be able to handle restarting a file transfer after it had been interrupted. All FTP use should have been transferred to HTTP at that time (around 1997), but FTP remains popular today primarily because the owners of FTP servers lack the skill to make the transition, and don't wish to disrupt the typically important role of their FTP environments.

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

Implementing HTTP transfers isn't extremely difficult, but it does require separating HTTP file transfer functionality from other, more typical, HTTP functionality. For example, allowing HTTP file transfers to a Web site that also presents pages to Web browser visitors means ensuring that the uploads can't replace the pages they want to display. This means implementing extensive file and directory permissions. While this can all be done with a Web server, it's much easier to do with an FTP server because this functionality is part of basic FTP server configuration.

The bottom line is that this vulnerability isn't likely to rear its ugly head in the form of mass attacks, but it should serve as yet another wake-up call for anyone still using FTP as a means of transferring files, especially users of wu-ftpd.

Malicious Code
New Bagle variants are being released so quickly that anti-virus vendors are having a hard time keeping up. New variants of the Bagle virus have been released every several hours, and to at least some insiders appear to be tied to the release of virus definitions by McAfee. Virus writers are taking on the AV companies head-on—and winning.

Virus writing seems to be getting downright industrial, with new viruses being turned out like Henry Ford turned out Model Ts. It takes time to decrypt the encrypted viruses, and more to figure out how to identify the contents reliably. Heuristics—the ability to look at an object abstractly rather than specifically—is getting better at identifying new variants, but it's still not efficient enough to completely replace virus definition files.

Here's the biggest problem with all this. The industry has focused so much on selling brainless solutions to consumers regarding security issues that when those solutions become ineffective, as in the case of these Bagle variants, consumers are left vulnerable. If consumers believe that anything that makes it past their defenses is safe, why wouldn't they open virus-laden e-mails? Emphasis should have been placed on consumer education, which could have been made more obvious to the consumer by strict penalties for failure to follow the educational guidelines (as described in my Internet Penalties Plan).

If you think you have the solution without imposing penalties for those consumers who invoke viruses or bots, find some investors—you've got a billion-dollar idea there!

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular