Orwell Award Announcement SusanOhanian.Org Home


Outrages

 

9486 in the collection  

    "Bagle" Virus Infiltrates U. S. Department of Ed Listserve

    Ohanian Comment: I must confess when I received two e-mails containing virus attachments from the NCLB branch of the U. S. Department of Education, I wondered if Rod Paige had been looking at the cartoons on this site. That didn't make me curious to open the attachments.

    A new internet virus spreading rapidly throughout the world may be propagating itself through a popular U.S. Department of Education (ED) listserve, posing a potential security risk to thousands of school advertisement
    systems and other education stakeholders who receive eMail transmissions via the department.

    The "Bagle" or "Beagle" worm, which originated over the long holiday weekend, provided an unwelcome surprise for some educators who logged into their eMail in-boxes when school resumed Jan. 20.

    The virus, which arrives in the form of an eMail with the subject line "hi" and the words "test, yep" in the body of the message, is packaged as an attachment. When the attachment is executed, it unleashes a nefarious worm that sends itself to every eMail address in the user's address book. CNN.com reported that the worm also has the capability to select a name at random from an infected address book, then spoof that name to dupe trusting recipients into opening the infected attachment.

    eSchool News first discovered that ED may be propagating the virus early Tuesday morning when several editors received the bogus transmissions. The messages--more than 10 of which had been received by editors at press time--appeared as if they originated from Kirk Winters, a public information officer for the department who is responsible for sending out "ED News," a weekly internet newsletter delivered every Monday to thousands of subscribers to ED's eMail listserve.

    Though it's unclear whether someone at ED actually opened the attachment, thereby permitting the spread of the worm, or whether it simply is spoofing Winters' eMail address in hopes of fooling unsuspecting educators, a department spokesman said he believes the agency's virus-detection software neutralized the worm automatically by removing it from infected messages before they reached recipients.

    "We've checked with our information technology people, and our virus protection apparently stripped the virus from the message," wrote Public Affairs Specialist Jim Bradshaw in an eMail. "In other words, individuals may have gotten a virus message, but no virus."

    eSchool News was unable to verify Bradshaw's claim before press time. But Bradshaw added that his department is assessing the situation and will contact its eMail subscribers with any information that may be necessary to keep the worm from spreading.

    Fortunately for schools, security experts say the worm--which reportedly affects only machines running the Windows operating system--is far less serious than its two most recent predecessors, SoBig and Blaster, which bogged down and, in some cases, crippled internet servers worldwide last year.

    Brian King, an internet security analyst for CERT, part of the Software Engineering Institute at Carnegie Mellon University in Pennsylvania, said computer users so far have reported only minor disruptions.

    One reason is that internet security companies acted quickly to update their virus patches to prevent against the spread of the worm. Also, the worm only takes effect when a user attempts to run the attached executable file. "It really takes a human to actually click on the attachment in order to spread [the virus]," King said, calling it "pretty basic."

    To avoid being infected with the virus, computer users need only heed the warnings of security experts, King said. That includes implementing a good eMail filtering system and taking care not to open attachments in the form of executable files.

    But that's sometimes easier said than done in schools, where computer users--from students to staff members--often vary widely in their degree of high-tech expertise.

    "Because schools have a more diverse user community," King said, "there is certainly some chance that they may be more susceptible to these kinds of attacks."

    To protect against that possibility, King recommends that schools align their internet filters to block messages containing executable files as attachments, "so that users don't even have the opportunity to open these kinds of attachments," he said.

    The one real danger of the worm, he added, is that it contains a "back-door" function that enables the intruder, or propagator of the original virus, to track exactly who is executing the attachment--but only when the hacker is actually watching the user logs as the worm progresses.

    Though CERT could not say how many users have been infected so far or where the virus originated from, the organization has confirmed that "Bagle" is set to expire Jan. 28.

    In the meantime, experts recommend that users conduct virus scans on their machines and perform updates to their security software.

    Links:

    U.S. Department of Education
    http://www.ed.gov

    CERT
    http://www.cert.org

    — Corey Murray
    'Bagle' virus infiltrates ED listserve
    eSchoolNews.com
    2004-01-21
    http://www.eschoolnews.com/news/showStory.cfm?ArticleID=4842


    INDEX OF OUTRAGES

Pages: 380   
[1] 2 3 4 5 6  Next >>    Last >>


FAIR USE NOTICE
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of education issues vital to a democracy. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information click here. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.