Never Offline®   Internet Search Portal™   Atomic Time Zone™   Contact Us
  Home  |  News  |  Digital Media  |  Never Offline®  |        Thu Oct 09 2025 10:27:15 GMT+0000 (Coordinated Universal Time)   Good Late Morning!
Never Offline®
Atomic Time Zone™
BrowserBuddy™
P5™ Software
Internet Search Portal™
New Technology (NT)
Press Relations
Digital Media Area
Windows Update
Download NOL™
Knowledge Base
Beta Team
Digital Media Area
Check your NET Speed
Shopping
Weather
New on the NET?
AMO Information
Tell Friends or Family
Press Releases
Investors and Microsoft
Advertise with Us







Sounding the Code Red Alarm

  07/31/2001 3:06:17 PM MDT Albuquerque, Nm
  By Dustin D. Brand; Owner AMO


Code Red infected 250,000 Servers in it's first day, bunker down and fix the vulerbility before it strikes again.
NOLers Minutes Online:
59060887765
New Fuel for the future... 12/30/2001 6:12:41 AM MST

Comcast to marry AT&T Broadband 12/21/2001 11:11:46 AM MST

What is ITS BIG Deal? 12/21/2001 10:55:13 AM MST

Not @Home with AT&T Broadband 12/09/2001 12:33:33 AM MST

Spray painted Linux 11/28/2001 6:28:52 AM MST

The bump in the road for Broadband. 11/28/2001 6:02:52 AM MST

Online Shoppers Beware the signs of Fraud 11/26/2001 5:18:47 AM MST

Microsoft XBOX gets LAUNCHED! 11/26/2001 4:33:35 AM MST

Intel sets Decade Plan 11/26/2001 3:57:48 AM MST

The Future of the Computer Chip 11/15/2001 4:30:56 AM MST

File swapping case may bring P5 into Court. 11/09/2001 12:45:08 AM MST

Linux isn't looking too well. 11/09/2001 12:37:33 AM MST

Microsoft case split 9/9. 11/07/2001 10:18:57 AM MST

IBM Pixie Dust on market now. 11/07/2001 9:44:33 AM MST

Microsoft closes in on Instant Messenging. 11/01/2001 9:49:08 AM MST

Did Microsoft block Web Browsers from MSN? 11/01/2001 9:21:47 AM MST

Netscape gets upgrade, just for Windows XP 11/01/2001 8:50:07 AM MST

Microsoft and Goverment near Settlement 11/01/2001 8:24:56 AM MST

We made Contact. - 09/05/2001 5:55:55 PM MDT

Never Offline(SM) v3.0 - Join the Global Beta Team!
  In a rare meeting of the FBI and industry leaders today in Washington D.C., a unique warning about the Code Red Internet Worm stated that it will surface again today for another round of attacks.

  "Users must act quickly to mitigate damage from the worm," cautioned Ronald Dick, director of FBI's National Infrastructure Protection Center (NIPC) in Washington. "Government and industry are doing all we can to get the word out," Dick continued.

  Code Red is unique because it feeds on a bug in Microsoft Windows NT and 2000 Index Server which was fixed June 18, and Code Red Surfaced July 19th. The bug/flaw allows the Code Red program to run, scan for more victims, and then attack in unison.

  Because of the scale at which Code Red proliferated, and mainly because of it's ability to attack areas of the internet in unison, Code Red needs to be prevented from spreading immediately.

  The White House was one such target, but was easily fixed by changing it's IP Addresses and patching the vulnerability.

  The first 19 days of a month the worm is set up to scan and infect, but from day 20 until day 27 the worm floods a certain IP address.

  "We have no idea what the ultimate target is. The proliferation of the worm and the volume of its impact are now of ultimate concern," Dick said. Code Red is a self-propagating worm. It scans the Internet for vulnerable systems and infects these systems by installing itself. Once it has nestled itself on a server, it uses that server to scan the Internet for other vulnerable servers and infects those. Web pages on compromised servers are altered. In the first nine hours of its outbreak on July 19, Code Red infected more than 250,000 systems, according to the CERT.

  "When the worm was first discovered, it infected servers for a couple of days. Administrators had started patching servers but may have stopped, thinking the threat was gone," Leech said. "We've got to make sure everybody applies the patch. We could be facing an Internet meltdown, depending on how many unpatched servers are out there. It's going to come down to how many vigilant administrators are out there."

  More information on the IIS Indexing Service DLL flaw and the software fix are available on Microsoft's TechNet Web site at security/bulletin/MS01-033.asp. IIS Web Administrators should check for installation of the patch and run it immediately if IIS has not been updated.

  Related AMO Articles:
   Sircam worm still spreading; stop it.
   Sircam worm, protect yourselves, heres how.


Thanks for using Netscape Mozilla v5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)  
FeedBack: AMaestrO | AMOURLv5.5: http://amo.net/NT/07-31-01CodeRed.html Thu Oct 09 2025 10:27:15 GMT+0000 (Coordinated Universal Time)  
Copyright © America's Multimedia Online All Rights Reserved. Terms of Use Privacy Policy