A story in today's Wall Street Journal says that 2,400 corporations' and numerous governments' computer systems have been successfully hacked into by coordinated attacks over the past 18 months that have originated from Europe and China.
According to the WSJ, the attack (which was discovered by the security company NetWitness) was much more extensive than the one recently launched against Google. Some 75,000 computers in 196 countries have reportedly been hacked. Cardinal Health and Merck & Co. have been identified as among those attacked. Merck said in the WSJ article that no sensitive information had been compromised.
You can see how botnets work here in this BBC tutorial.
This latest attack shows how vulnerable the state of IT security is right now. This was brought out again in several more stories this week.
First were the results of the latest cyberwar test called "Cyber Shockwave" that took place earlier this week. It was developed by the Bipartisan Policy Center to see how senior government policy officials would react in real-time to a major cyber attack. Ten former senior government officials played out a scenario they had not been briefed on to see how they would react. You can read more about it here.
The results were reportedly not good (see this article in the Los Angeles Times and this in Bloomberg News). The best summation of the current state of IT security as the scenario was being run and the officials debated what to do was this statement from one of the participants: "I'm not hearing any answers here as to how to fix this."
When the Cyber Shockwave was complete, everyone agreed that the US was vulnerable and that a lot more need to be done including possible changes in US law regarding how it can respond to a cyber attack.
Next, Mitre and the SANS Institute released its updated 2010 Top 25 Most Dangerous Programming Errors. The new list has a more focused approach to help define what specific actions programmers can take to mitigate them.
The basic message is the same as last year: there are too many long known and easily fixable programming errors that are creating unnecessary IT security holes.
Finally, there was a story in yesterday's ComputerWorld that says that some 784 PCs in the city of Norfolk, Virginia were taken out by malware resident in an internal virtual print server. The malware activated when the PCs were shut down. When users tried to boot back up again, they discovered that they could not - their C drives were wiped clear.
City officials say that they don't know what attack caused the problem or where it came from since the information was destroyed when the print server was cleaned the virtual print server. The FBI has been called in to assist in the investigation.
Robert N. Charette is a Contributing Editor to IEEE Spectrum and an acknowledged international authority on information technology and systems risk management. A self-described “risk ecologist,” he is interested in the intersections of business, political, technological, and societal risks. Charette is an award-winning author of multiple books and numerous articles on the subjects of risk management, project and program management, innovation, and entrepreneurship. A Life Senior Member of the IEEE, Charette was a recipient of the IEEE Computer Society’s Golden Core Award in 2008.