Windows regains mantle of most vulnerable
OS
news release
news release
& faq
London, UK - 14 August 2002, 11:30 GMT - mi2g The latest
figures compiled by the Intelligence Unit at mi2g indicate that
Windows has once again regained the position of most vulnerable online operating
system.
Although overt attacks on Microsoft Windows based systems had been broadly
falling in the first quarter of 2002, the rate at which Windows systems are
being compromised is outpacing Linux again, having increased by 5% in June
followed by a further 12% rise in July. In comparison, attacks on Linux systems
decreased by 39% in June.
In April and May this year, Linux systems were successfully attacked worldwide
in far greater numbers (2192 / 2057) than Windows systems (1677 / 1991). In
June and July however, the trend reversed and more Windows systems (2082 /
2338) were compromised than Linux systems (1260 / 1711).
The sudden rise in attacks on systems running Linux earlier this year was
due to several easily exploitable vulnerabilities being uncovered in open
source third party applications such as PHP scripts and bulletin boards. Bad
or default configuration of Linux and the applications running on it were
also determining factors for the success of the overt attacks.
A total of 27,273 successful overt digital attacks have taken place so far
in 2002, 47% were on systems running Windows, 36% on Linux based systems and
17% on various operating systems including Unix, BSD, Solaris, AIX and others.
“The recent Apache vulnerabilities have affected
both Windows and Linux systems. Online administration is about overall configuration
management. At one level it is about patching the known vulnerabilities of
the OS and the server software that runs on top. At another level it is about
selecting reliable third party applications so as to stop them from being
used as a launch pad for deeper penetration,” said DK Matai,
Chief Executive of mi2g.
The top ten domains that have been the biggest victims of digital attack
so far in 2002 are: .com (Commercial), .de (Germany), .br (Brazil), .net (Network),
.org (Organization), .it (Italy), .uk (UK), .kr (Korea), .tw (Taiwan) and
.ch (Switzerland) in that order.
Executive Summary of the July 2002 SIPS Report - July was the second
most intense month on record for overt digital attacks with 4,879 incidents,
the peak being May 2002 with 4,897. The most prominent hacker group in July
was hax0rs lab. The operating system most susceptible to attack was Microsoft
Windows followed by Linux reversing the April/May one off blip in which Linux
overtook Windows temporarily. The most attacked domain after .com was .it
(Italy) followed by .br (Brazil) and then .net and .org. The principal motives
for digital attacks have been political tension and protest; anti-globalisation,
environmental and animal rights protest; disgruntled or misdirected workforce;
intellectual challenge; commercial gain.
Notes to Editors
mi2g has been collecting data on overt digital attacks going back
to 1995 via the SIPS (Security Intelligence Products and Systems)
database. The SIPS database has information on over 70,000 overt digital
attacks and over 6,000 hacker groups. The SIPS intelligence citations
include the 2002 Computer Security Institute (CSI) / Federal Bureau of Investigation
(FBI) Computer Security Issues and Trends Survey [Vol. VIII, No. 1 - Spring
2002].
Detailed copies of the SIPS reports for each month, including back
issues can be ordered from the intelligence.unit@mi2g.com
. A vetting process may be carried out prior to the release of the SIPS
reports to individuals and for overseas orders.
mi2g solutions engineering pays particular regard to security. mi2g
advises on the management of Digital Risk and incorporates Bespoke Security
Architecture in its SMART sourcing solutions. mi2g has pioneered the
Contingency Capability Radar to assist in rigorous business continuity planning
based on ISO 17799.
For further information - www.mi2g.net
What are Asymmetric Threats?
Any threat, which is disproportionate, such as the risk of a small group
attacking a large country or a few individuals harming thousands is described
as asymmetric. Chemical, biological, radiological, nuclear and digital (CBRN-D)
attacks can all manifest asymmetrically.
What is Bespoke Security Architecture?
Bespoke Security Architecture brings together firewall layers, intrusion
detection and other defensive structures, as well as automated intelligence
techniques with legal, human resource and company policies.
What is Digital Risk Management?
Digital Risk Management deals with a variety of issues associated with implementing
digital solutions and integrating Service Level Management. It includes selecting
the optimum technology set, managing external partners and alliances, linking
payments to targets, defining rigorous quality control procedures, managing
the growth in online traffic post launch, achieving the expected return on
investment, and bringing about the changes in the corporate culture required
for successful eBusiness.
What is the Contingency Capability Radar?
The Contingency Capability Radar is an ISO 17799 based platform, containing
tools and templates to assess and visualise risk exposure of an entire global
enterprise.
What is SMART Sourcing?
mi2g SMART Sourcing is the careful selection of cost effective and
trustworthy suppliers from around the world for building and maintaining highly
secure digital platforms on a 24 by 7 basis.
First contact for additional information - Intelligence
Unit, mi2g
Telephone: +44 (0) 20 7924 3010 - Facsimile: +44 (0) 20 7924 3310 - eMail:
Intelligence Unit
Related Articles