| |
News
CPrivacye Piracy Fight -
Market News Magazine - July 7, 2004 |
' |
Business Week - SEPTEMBER 8, 2003
• Editions:
N. America |
Europe |
Asia |
Edition Preference
COVER STORY
Epidemic
Crippling computer viruses
and spam attacks threaten the information economy. Can they be stopped?
David
Farber, a professor of computer science at Carnegie Mellon University,
was sitting down to lunch with his wife at Taquería Moroleón, a Mexican
restaurant in Kennett Square, Pa., on Aug. 21, when his cell phone
started vibrating. An e-mail had landed in his cell-phone inbox. Yet as
soon as he had cleared the e-mail, the phone vibrated again. And again.
And again. He could hardly get a bite in edgewise. Farber was yet
another victim of a now-famous computer virus, called SoBig, that turned
computers worldwide into drones pumping out millions of e-mails bearing
malicious code. It was a digital snowball effect. Farber's conclusion:
"We're losing the battle against computer viruses."
Indeed, to those most affected, it seems as if this summer's onslaught
of viruses has reached epidemic proportions. Since early August, the
world's computer systems have been blitzed by hundreds of viruses --
some of them real doozies. On Aug. 11, the Blaster virus and related
bugs struck, hammering dozens of corporations, including Air Canada's
reservation and airport check-in systems. Ten days later, the SoBig
virus took over, causing delays in freight traffic at rail giant CSX
Corp. and shutting down more than 3,000 computers belonging to the city
of Fort Worth. Worldwide, 15% of large companies and 30% of small
companies were affected by SoBig, according to virus software tracker
TruSecure Corp. Market researcher Computer Economics Inc. estimates
damage will total $2 billion -- one of the costliest viruses ever. All
told, damage from viruses may amount to more than $13 billion this year.
And it could get worse. Six versions of SoBig have been launched since
January, each more effective than the last. Security experts are now
waiting nervously for the next one, expected on Sept. 11. Because the
author of the SoBig virus has turned thousands of computers into virtual
slaves standing ready to do his bidding as e-mailers, experts wonder
what he has in mind. Is he planning on linking up with spammers and
spreading their ads around ever more quickly? Or does he have something
more nefarious planned -- perhaps a mass delivery system for an even
more pernicious virus?
Even as the damage reports pour in, the Summer of SoBig provides a
jangling wake-up call to businesses, consumers, and the software
industry: Get serious about cyber security. Usually, after each huge
virus attack, people promise themselves they'll do a better job of
protecting their computers. Then they gradually forget about it. That
won't do anymore. "People buy anti-virus programs and firewalls and
think that's the solution, and they're secure. But they're not," says
Brian B. King, a Net security analyst at CERT Coordination Center in
Pittsburgh, which tracks viruses for the federal government. "There's
always a way malicious code can get in."
And that means the very vitality of the information economy could be at
risk. Combine viruses with the scourge of spam, and you have two heavy
anchors dragging on an already sluggish economic ship. Indeed, the virus
epidemic may undermine tech's productivity boost. A new focus on defense
could even discourage corporations from making investments in the latest
computers and software. "Every year, we spend more money on security, on
monitoring," says June Drewry, chief information officer at Chicago
insurance company AON Corp. "That's money you could be investing in
other ways."
At the same time, technology experts are warning of the dangers of
relying so heavily on just one outfit -- Microsoft Corp. -- to provide
the backbone of the computing and Internet world. With a 95% market
share, Microsoft's Windows desktop operating system is a fat, juicy
target for the bad guys. The company got so many complaints about SoBig
that senior executives, including Windows boss Brian Valentine, were
pressed into service manning customer support lines. Some critics even
say that Microsoft, as a virtually essential service, has an obligation
to ensure that its software is sufficiently hostile to hackers. And
while Microsoft has launched a safe-software initiative, tech experts
are calling on the company to make more fundamental changes in the way
it designs programs. "Microsoft has to write better software," says Paul
Saffo, director of think tank Institute for the Future in Menlo Park,
Calif. "It's outrageous that a company this profitable does such a lousy
job."
All of this raises a troubling question: Will people start to question
the effectiveness of the tech gear upon which they've become so
dependent? Already, e-mail systems and networks have proved unreliable.
Data aren't there at your fingertips when you need them. The e-mail
order you're expecting is missing -- while your inbox is overloaded with
hundreds of junk ads. In the future, tech systems could become less
useful, too. If companies and individuals resort to blocking e-mail from
addresses they don't know, it will short-circuit one of the nearly
magical attributes of the Web: Its ability to facilitate instant
connections between strangers.
Until now, viruses have been little more than a nuisance. Most of the 80
or so brand-new viruses created each month have little effect, rarely
doing more than slowing traffic, clogging e-mail inboxes, and hobbling a
smattering of businesses.
But viruses have become far more dangerous of late. Blame that on the
ubiquity of the Internet: It has become a veritable virus superhighway.
A virus launched one morning can infect computers all over the world by
the end of the day. The Slammer virus, which hit in January of this
year, spread ultrafast, infecting nearly 100,000 computers in the first
10 minutes alone.
Virus writers are also getting a whole lot smarter -- and nastier. Take
the Nimda virus, which struck shortly after the September 11, 2001,
terror attacks. Known as a "blended threat," it had five different ways
of replicating and of attacking computers and networks. The culture of
hacking has changed, too. While the previous generation was often
renegade teenagers who broke into networks to show off to their friends,
security experts say that fast-moving, organized international teams of
hackers are now posing a much larger threat.
What really worries security experts is that someone out there --
perhaps even terrorists -- might be able to wipe out the contents of
tens of thousands of computer hard drives or shut down the power grid.
"I expect to see some viruses come along that will be seriously
disruptive," says Hal R. Varian, dean of the School of Information
Management & Systems at the University of California at Berkeley.
Even if such a killer virus never strikes, the combination of viruses
with spam e-mail have turned everyday computing into an ordeal for
consumers. When people check their e-mail, they're greeted with a
seemingly endless string of advertisements for penis enlargement,
Viagra, cheap mortgages, or sexy girls. And that's if e-mail is working.
Unpacking a new computer used to be exciting. Now it can be fraught with
worry. Just ask Linda Beebe, an American retiree who on Aug. 13 had a
new PC delivered to her Pyrenees vacation house in Mauléon-Barousse,
France. When Beebe connected to the Internet, she immediately caught the
Blaster virus, which shut down her computer. It took three full days to
get it working again. "Now I'm so angry I can't even think straight,"
says Beebe.
Of course, no one is arguing that viruses and spam will stop people from
using their computers. "We rely on our e-mail, on getting on the
Internet," says Beebe. And, for businesses, it's absolutely vital.
There's no turning back the digital clock. But these twin scourges will
turn computing into something akin to driving a car: Sometimes you're
tooling along the open road. Other times you're stuck -- cursing -- in
city traffic. And unlucky drivers have head-on collisions.
The computing world can't count on law enforcement to put virus writers
out of commission. Tracking down these criminals is incredibly
difficult. Since they're usually not interested in financial gain,
there's no money trail for sleuths to follow. Virus writers have proved
skillful at covering their tracks. So far, only 10 have been captured
and convicted -- typically because they bragged about their exploits.
And when it comes to the most complex viruses -- the ones like Nimda
that keep mutating to stay ahead of the cleanup crews -- there are
probably a dozen people in the world expert enough to figure them out.
It's a few dozen expert hackers that law enforcers worry about most.
They're brilliant at exploiting vulnerabilities in software, and they
work furiously once they spot them. For instance, after Microsoft
identified a major flaw in its latest Windows operating system versions
and posted a patch on its Web site on July 16, it took less than a month
for virus writers to come up with Blaster and a handful of other viruses
that picked on the flaw. And since many corporations and consumers
hadn't gotten around to loading the patch yet, they got hammered. It
could have been worse. Microsoft found the problem only because it was
notified about it in June by four Polish computer scientists, members of
the Last Stage of Delirium Research Group, which identifies software
vulnerabilities.
Security experts and corporate tech purchasers say the glitches exist
because Microsoft and other software companies have placed a high
priority on getting products out quickly and loading them with features,
rather than attending to security. They're calling on the industry --
and Microsoft in particular -- to make software more secure. Ralph
Szygenda, chief information officer at General Motors Corp., got fed up
when his computers were hit by the Nimda virus in late 2001. He called
Microsoft executives. "I told them I'm going to move away from Windows,"
Szygenda recalls. "They started talking about security all of a sudden."
Last year, amid much fanfare, Microsoft launched its Trustworthy
Computing initiative, a campaign it claimed would put security at the
core of its software design. As part of the campaign, more than 8,500
Microsoft engineers stopped developing the upcoming Windows Server 2003
and conducted a security analysis of millions of lines of freshly
written code. Microsoft ultimately spent $200 million on beefing up
security in Windows Server 2003 alone. "It's a fundamental change in the
way we write software," says Mike Nash, vice-president for security
business. "If there was some way we could spend more money or throw more
people on it, believe me, we'd do it." Yet, embarrassingly, Windows
Server 2003, released in April, was one of the operating systems
exploited by Blaster. The virus carried a snide message for Microsoft
Chairman William H. Gates III: "Billy Gates why do you make this
possible? Stop making money and fix your software!"
Unfortunately, glitchy software is not so easy to fix. Security experts
say the company and the rest of the software industry need to undertake
a much more fundamental shift in the way they write programs if they
hope to make progress against virus writers. Aviel Rubin, a professor of
computer science at Johns Hopkins University, says a lot of the features
in Windows are designed to make PCs easy to use and to integrate one
program with another -- yet it's those very technologies that virus
writers exploit. "First, make programs secure. Everything else comes
after that," urges Rubin. "If you don't do this, computers will quickly
become unusable."
Some Microsoft critics believe that the only way for the software giant
fundamentally to mend its ways is for it to become liable for the damage
its customers suffer as a result of viruses. They propose that the
software industry adopt minimal standards for software quality and
security. "We need liabilities in software, just like any other consumer
product," says Bruce Schneier, the chief technology officer for
Counterpane Internet Security Inc., a security software company. "When
that happens, this will be fixed. Now, there's no business incentive to
fix the problem."
Others suggest that corporations and consumers switch from Windows to
avoid viruses. While Apple's Macintosh computer and the Linux operating
system aren't inherently more secure, they're not targets for virus
writers the way Windows is. Linux has gained traction as a corporate
server computer and industry analysts say Linux could become a more
attractive alternative on desktop computers if the Windows virus scourge
isn't brought under control. The Indian Institute of Technology in
Bombay, for instance, is now switching its workstations from Windows to
Linux, partly because of security concerns.
For now, much of the burden for combating viruses lies with computer
users themselves. Most large corporations already have basic anti-virus
software. But security experts maintain that they need to come up with
better procedures for frequently updating their computers with the
latest security patches to programs and inoculations against new
viruses. Verizon Communications (VZ
) Inc. has gotten serious about security in the past couple of years and
already has a system for automatically updating its 200,000 computers as
soon as patches are available. As a result, it escaped unscathed from
this summer's attacks. "As far as business impact, it was a nonevent for
us," says Chief Information Officer Shaygan Kheradpir.
Many corporations are sizing up a new generation of security software
that approaches threats holistically -- with all the defenses plugged
into one another. An integrated collection of virus-scanning, firewall,
and intrusion-detection software is designed to defeat viruses, no
matter how they try to enter the company. A new kind of scanning
software checks out not just the labels on packets of information that
are zooming along the networks but also makes sure the data inside are
really what the labels say they are. And a security dashboard keeps tabs
on everything that's happening on a company's network -- looking for
evidence that something many be awry. Their purchases are expected to
boost total sales of security software by 10%, to $3.8 billion, this
year, while the overall software industry remains flat, according to
researcher Gartner Inc.
Small businesses and home users need to be just as vigilant. Basic
anti-virus software now ships on most PCs, and network routers used for
Internet access are equipped with firewall software that scans for
viruses. But analysts say they fear consumers and small businesses
aren't taking advantage of the software they have. It's no wonder.
Unlike corporations, these computer users don't have their own info-tech
departments. Fortunately, several companies offer services with annual
fees of $25 to $35 that automatically alert people when a new virus
antidote is ready to be downloaded into their computer.
The key is slavishly downloading new software the moment it's available.
Jonathan Hamilton learned that lesson the hard way. The finance
newsletter writer in Norcross, Ga., paid no attention to the Windows
Update feature in his home office computer. When Blaster struck, his
16-year-old son, Daniel, dutifully downloaded a patch that blocked the
virus. Dad did not. The result: His computer was knocked out of
commission for five days, and he barely got his newsletter out on time.
"Live and learn," Hamilton says.
But even constant vigilance may not be enough. As with a war on terror,
it's not necessarily what you anticipate that can hurt you most. Tomasz
Ostwald of the Last Stage of Delirium Research Group, which spotted the
big glitch in Windows, says he's most worried about hackers coming up
with new forms of viruses. The worst threat, he said, would be worms
that wend their way into companies without being detected, hide, and
wait -- then perform some act of destruction or thievery. "The most
successful attack may be the undetected one," says Ostwald.
That's a chilling thought. In the cyberworld, with brainiac hackers
tapping away on their keyboards late into the night, any technical feat
is possible. And no threat is safely ignored.
By Steve Hamm in New York, with Jay Greene in
Redmond, Wash., Cliff Edwards and Jim Kerstetter in San Mateo, Calif.,
and bureau reports
|
|
|
|