The following text is
copyright 2004 by Network World, permission is hearby given for reproduction,
as long as attribution is given and this notice is included.
Estimating
the cost of a Windows Armageddon
By Scott Bradner
Some of the folks who
predicted, accurately it turned out, that the Internet would be subject to
"Warhol Worms" are at it again.
This time they predict that a single carefully planned worm attack could
cost US businesses more than the gross domestic product of Guatemala within a
few hours.
In their latest paper,
"A Worst-Case Worm" (http://www.icir.org/vern/papers/worst-case-worm.WEIS04.pdf)
Nicholas Weaver and Vern Paxson explore the possible "worst case"
damages from an Internet-based worm attack on the Windows operating
system. They assumed that the
attackers would be working for a country that wanted to cause economic harm to
the US (there do seem to be more than a few candidate countries these days) and
use a yet unreported vulnerability in Windows. The also assumed that the attack would be designed to do as
much harm, including destroying the data on the disk and destroying the boot
ROM where possible, as it could and that the worm would be programmed to use
different attacks on different vendor's systems and be smart enough to
recognize that it had infected a laptop and not destroy the laptop until the
laptop was reconnected to a network, for example, a network behind a corporate
firewall. Such an attack could
infect as many as 50 million computers far faster than the vendors of virus
checkers could react.
Even though the authors
put the cost of damage to home PCs at zero they came up with the estimate of
$50 billion worth of damage for a single well planned attack. The damages could be a lot higher. Stuart Stanford,a coauthor with Weaver and Paxson of the "Warhol Worm" paper
(See "Doing better than Andy http://www.nwfusion.com/columnists/2003/0210bradner.html.),
felt that damages could be "substantially larger."
The estimate was
discussed on the Nanog mailing list (http://www.merit.edu/mail.archives/nanog/index.html)
and some people disagreed with the $50 billion estimate but even if the actual
damages were only half of that we are still talking about real money here.
So now we are scared,
what should you do? The article's
authors do not offer any magic shields.
They do suggest that the ability to rewrite boot ROMs be physically disabled
where possible but that is not possible in all systems, itŐs a lot of work to
do and it only reduces the potential impact. The hypothetical attack in the article used a yet to be
discovered flaw in Windows SMB/CIFS file sharing. But SMB/CIFS is at least as much of an
example of the kind of target as it is a prediction. As we find out constantly,
there are many possible targets in a system as complex as Windows.
Not to be a fatalist, but
I do not see any way to eliminate the risk of a major attack like the one that Weaver
and Paxson describe anytime soon.
I do think that Microsoft has (finally) internalized the message that
security is more important than ease of use when ease of use, as interpreted by
Microsoft, has meant leaving the barn door open by default. A major message from Microsoft's current
security road show is that Windows XP Service Pack II disables rather than
enables things by default. That
will help but Windows is complex and there are many security holes yet to be
discovered.
disclaimer: Even for
Harvard, $50 billion is real money but the University did not comment on this
topic - I did