Culprit, identified as Rimbot virus, affects about 2,000 machines 
By Phillip McGowan
Sun Reporter
Originally published March 8, 2007, 10:27 PM EST

An Internet virus that has bedeviled media outlets across the county forced
Anne Arundel County to shut down more than 2,000 computers this week,
sending technicians on a furious race to contain the outbreak and produce
payroll checks for county employees. 

The fast-mutating virus, known as Rinbot, disrupted operations at the Turner
Broadcasting System last week, then attacked computers at the Boston Globe
and almost all of the McClatchy Co.'s 32 newspapers, including the
Minneapolis Star Tribune.

The malicious software, which takes command of PCs and can turn them into
"zombies" that attack other systems or send out millions of spam e-mails,
turned up in Anne Arundel County on Wednesday. 

Officials said technical-support staff began receiving scattered reports
Wednesday morning of PCs that started up slowly and displayed repeating
symbols and numbers where text was supposed to appear. 

Realizing that a virus was on the loose, administrators shut down much of
the county's non-emergency network to keep it from spreading. 

Bill Ryan, the county's information technology officer, said the county was
cleaning up infected computers with software provided by Symantec, the
Cupertino, Calif., security firm that is paid $70,000 a year to protect Anne
Arundel's computers from these kinds of attacks. 

He said some computers began coming online at 11 a.m. Thursday -- about 24
hours after IT workers shut down the system. 

Officials so far have been unable to detect the source of the virus. 

So far, no other governments in the Baltimore area have reported similar
infections. Several, including Howard, Carroll and Harford counties, use the
same corporate Symantec security software. 

Payroll first 

Anne Arundel officials said their technical staff moved first to restore
payroll computers, along with those that perform non-essential recordkeeping
for the police and fire departments. 

But for the better part of two days, hundreds of forms for bills, permits
and document requests that would normally be filled out electronically in
county offices were done by hand. 

"County residents should not have known any difference," said county
spokeswoman Rhonda Wardlaw. "County government employees understand the
reality of what we needed to do to keep government running." 

Ryan said the county's overall network did not crash and at no time was Anne
Arundel's emergency operations system -- with comprises about 2,000
computers -- affected. The county's Web site remained online, too. 

Ryan said his staff is moving cautiously with software fixes to prevent a
mutated form of the virus from being introduced. Asked whether the computers
could be back online Friday, he said: "It's too early for me to say that, in
all honesty." 

Still unresolved is how the virus pierced the county's defenses. Security
experts say the first version, attributed to an unknown hacker with an
apparent grudge against Symantec, appeared last year and targeted a flaw in
the company's security software. 

Patches 

Once Symantic analyzed the virus, it released a "patch" in the spring of
2006 and urged network administrators across the country to install the
software. 

When the virus surfaced again last week in the Turner network, parent of
CNN, and McClatchy newspaper computers, it appeared to target some machines
that had never been patched or that were running old versions of Microsoft
Windows that couldn't be patched. 

"The variations of that we're seeing now still exploit the same
vulnerability against which Symantec provided an update," said Ron O'Brien,
a security analyst for Sophos, a Massachusetts-based network security
company that competes with Symantec. 

Others aren't so sure. Ryan said the county had applied all of Symantec's
patches on time, and a Symantec spokesman said he did not know whether
previous software patches would have protected against this version of the
virus, known as Win32.Rinbot.Y. 

"Thousands of viruses come out every day," said Ryan. "Sometimes there's a
remedy for them; sometimes we don't have a remedy for them, which was the
case." 

Sophos' O'Brien said the virus, which his company calls Delbot, is mutating
rapidly, with seven identified variants this week and five last week. 

Clay Myers, information technology director at McClatchy's Tri- City Herald
in Kennewick, Wash., where the virus struck Feb. 27, said he's still
worried. 

"I've got a bad feeling about what this could do everywhere else," he said.
"We've got strong defenses here, and we had all the most recent updates from
Symantec and everywhere else." 

A few years ago, O'Brien said, most invaders such as Rinbot/ Delbot were
spread through e- mail attachments. When users opened them, thinking they
were looking at a photo or some other document, they were running malicious
programs. 

However, e-mail filters have become so proficient at screening out viruses
that hackers are increasingly luring victims by sending messages with links
to Web pages that automatically transmit virus-laden software to unprotected
computers. 

Mike Grant
Bytware, Inc.
775-851-2900 

http://www.bytware.com

CONFIDENTIALITY NOTICE:  This e-mail message and any attachment to this e-mail 
message contain information that may be privileged and confidential.  This 
e-mail and any attachments are intended solely for the use of the individual or 
entity named above (the recipient) and may not be forwarded to or shared with 
any third party.  If you are not the intended recipient and have received this 
e-mail in error, please notify us by return e-mail or by telephone at 
775-851-2900 and delete this message.  This notice is automatically appended to 
each e-mail message leaving Bytware, Inc.  



As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.