Page 1 of 1

Unsecured computers

Posted: 2004-08-20 11:33am
by Ace Pace
http://news.com.com/Study%3A+Unpatched+ ... tag=cd.top

Study: Unpatched PCs compromised in 20 minutes
Published: August 17, 2004, 12:22 PM PDT
By Matt Loney and Robert Lemos
Special to CNET News.com



Don't connect that new PC to the Internet before taking security precautions, researchers at the Internet Storm Center warned Tuesday.

According to the researchers, an unpatched Windows PC connected to the Internet will last for only about 20 minutes before it's compromised by malware, on average. That figure is down from around 40 minutes, the group's estimate in 2003.

The Internet Storm Center, which is part of the SANS Institute, calculated the 20-minute "survival time" by listening on vacant Internet Protocol addresses and timing the frequency of reports received there.

"If you are assuming that most of these reports are generated by worms that attempt to propagate, an unpatched system would be infected by such a probe," the center, which provides research and education on security issues, said in a statement.

The drop from 40 minutes to 20 minutes is worrisome because it means the average "survival time" is not long enough for a user to download the very patches that would protect a PC from Internet threats.

Scott Conti, network operations manager for the University of Massachusetts at Amherst, said he finds the center's data believeable.

"It's a tough problem, and it's getting tougher," Conti said.

One of Conti's administrators tested the center's data recently by placing two unpatched computers on the network. Both were compromised within 20 minutes, he said.

The school is now checking the status of computers before letting them connect to the Internet. If a machine doesn't have the latest patches, it gets quarantined with limited network access until the PC is back up to date.

"We are giving the people the ability to remediate before connecting to the network," Conti said.

The center also said in its analysis that the time it takes for a computer to be compromised will vary widely from network to network.

If the Internet service provider blocks the data channels commonly used by worms to spread, then a PC user will have more time to patch.

"On the other hand, university networks and users of high-speed Internet services are frequently targeted with additional scans from malware like bots," the group stated. "If you are connected to such a network, your 'survival time' will be much smaller."

In a guide to patching a new Windows system, the Internet Storm Center recommends that users turn off Windows file sharing and enable the Internet Connection Firewall. Microsoft's latest security update, Windows XP Service Pack 2, will set such a configuration, but users will have to go online to get the update, opening themselves up to attack.

One problem, experts say, is network administrators' reliance on patching and their assumption that users will quickly patch systems.

Speaking recently at the Microsoft TechEd developer conference in Amsterdam, Microsoft security consultant Fred Baumhardt said the day is likely to come when a virus or worm brings down everything.

"Nobody will have time to detect it," he said. "Nobody will have time to issue patches or virus definitions and get them out there. This shows that patch management is not the be-all and end-all."

Baumhardt stressed the importance of adaptability, using the human immune system as an example: "Imagine if your body said, 'Hmm, I have the flu. I've never had this before, so I'll die.' But that doesn't happen: Your body raises its temperature and so on, to buy time while other mechanisms kick in."

"If the human body did patch management the way (companies do), we'd all be dead."
Not really news, but intresting, importent for those of us that constantly help friends with PC problems, a new PC should get SP1 and SP2 handed on a disc.

On that matter, where can I find SP1 and SP2 basic for download as a file to my computer, so i can burn them and distribute?

Posted: 2004-08-20 11:45am
by Rogue 9
The drop from 40 minutes to 20 minutes is worrisome because it means the average "survival time" is not long enough for a user to download the very patches that would protect a PC from Internet threats.
Depends entirely on your connection, really. I got my first set of patches in seven minutes.

Posted: 2004-08-20 11:48am
by Ace Pace
Rogue 9 wrote: Depends entirely on your connection, really. I got my first set of patches in seven minutes.
Obviously, but that assumes, as it is today, that most of the world does not have broadband, even though the U.S has finnaly reached 50%.

Posted: 2004-08-20 12:48pm
by McNum
20 minutes? I got my last worm in 5 minutes after a reinstall. And that's how you learn NOT to be online while installing Windows XP...

Posted: 2004-08-20 01:32pm
by Pu-239
That's probably the avg time. Anyway, most people w/ broadband should have a firewall/connected behind NAT. I have a firewall running anyway, but I'm on dialup (for long periods of time)- should I be worrying about the winboxes which occasionally dial up directly?

Re: Unsecured computers

Posted: 2004-08-20 08:47pm
by Vertigo1
Ace Pace wrote:On that matter, where can I find SP1 and SP2 basic for download as a file to my computer, so i can burn them and distribute?
www.microsoft.com

;) (seriously though, its not that hard to find. Hell, it was even posted on this very forum.)

Posted: 2004-08-21 09:55am
by Sokartawi
Heh... My server running on win98SE is STILL unpatched and on since January, last time I looked in there for weird things and virusses is 2 months ago and there was nothing in there.

I'd say it's a WinXP problem, like many things are... :twisted:
The thread title is misleading. It's not "unsecured computers", but rather "unsecure operating systems".

Now, I'm absolutely not saying Win98 is secure at all and I'm not going to compare the two, since if everyone would run on Win98 there would probably be blaster-like things for that OS too, but I'm saying that M$ did not do a very good job in making WinXP a secure OS, especially in it's unpatched state.

Posted: 2004-08-21 11:54am
by Faram
Get a cheap router, that will take care of a lot of attacks from the internet.

Then D/L patches and stuff.

Posted: 2004-08-21 03:59pm
by Einhander Sn0m4n
Make Windows Open-Source. Release it as .ISOs and .torrents on SourceForge. Ditch the GODsDAMN ActiveHaX crap and the whole idea of web-on-hard-drive content beyond "Right-click>Save-As". Start a support network of sites and volunteers to help debug the thing 24/7/365. Make sure Explorer.exe dies a painful death. Make sure Idiot Exploiter dies an even more gruesome and messy death. Use a commandline interface to augment the windowing system, journaling filesystems, and turn off ALL unneeded services by default. Keep the browser inside a sandbox separate from the Kernel. Keep the WINDOWING SYSTEM away from the Kernel. AND FUCKING USE SLASH INSTEAD OF BACKSLASH FFS!

Then we'll have Real Windows Security.


Oh wait, I just described practically every last *N*X OS other than SCO UNIX... :P

Posted: 2004-08-21 05:34pm
by Sokartawi
Einhander Sn0m4n wrote: Make Windows Open-Source.
Ditch the GODsDAMN ActiveHaX crap
Use a commandline interface to augment the windowing system,and turn off ALL unneeded services by default
Keep the browser inside a sandbox separate from the Kernel.
Keep the WINDOWING SYSTEM away from the Kernel.
These things annoy me as hell in winblows yah, and every idiot should have known that it should have been done differntly in a PROPER OS.

Posted: 2004-08-21 05:37pm
by Pu-239
Einhander Sn0m4n wrote:Make Windows Open-Source. Release it as .ISOs and .torrents on SourceForge. Ditch the GODsDAMN ActiveHaX crap and the whole idea of web-on-hard-drive content beyond "Right-click>Save-As". Start a support network of sites and volunteers to help debug the thing 24/7/365. Make sure Explorer.exe dies a painful death. Make sure Idiot Exploiter dies an even more gruesome and messy death. Use a commandline interface to augment the windowing system, journaling filesystems, and turn off ALL unneeded services by default. Keep the browser inside a sandbox separate from the Kernel. Keep the WINDOWING SYSTEM away from the Kernel. AND FUCKING USE SLASH INSTEAD OF BACKSLASH FFS!

Then we'll have Real Windows Security.


Oh wait, I just described practically every last *N*X OS other than SCO UNIX... :P
Or just use Linux. :P