Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Microsofts Swift Response Nabbed Sasser Suspect

    Written by

    Dennis Fisher
    Published June 7, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      When indications of a worm exploiting the LSASS vulnerability in Windows surfaced April 30, the staff at Microsoft Corp.s Security Response Center didnt hesitate; they knew exactly what to do.

      Within an hour of the first reports of the worm, which would later come to be known as Sasser, Kevin Kean was on a conference call with the companys internal penetration testers, field representatives and partners in the Virus Information Alliance. The group went over details to determine whether the threat was serious enough to call out the heavy hitters and move into whats known as “immediate response” phase.

      “It was pretty clear to us at that point that this could be serious, so we decided to mobilize,” said Kean, director of the MSRC, in Redmond, Wash.

      For insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzers Weblog.

      From there, the chase was on. Microsofts internal analysts and security and forensics experts worked around the clock with the help of law enforcement officials and outside specialists to analyze Sasser code, searching for any clue that might lead them to the worms creator. And in this case, after a week of long hours, hard work and not a little bit of luck, the effort paid off with the arrest and indictment of an 18-year-old German man who authorities say has confessed to writing not only Sasser but the Netsky family of viruses as well.

      This is one of the rare cases in which a suspect was actually arrested and indicted for allegedly creating and distributing a worm or virus. More often, security experts and law enforcement officials end up banging their heads against a wall with little in the way of clues to go on. And thats part of the reason Kean and his team at Microsoft have developed a regimented quick-response program for cases such as Sasser where time is of the essence and the MSRC staffs unique expertise and experience are invaluable.

      Next page: The program has matured over time.

      Response program has


      evolved “>

      The program now in place at the MSRC has evolved over time as the nature and speed of threats on the Internet have morphed. Driving the program are checklists that assess the potential level of damage from the worm or virus and how many customers are likely to be affected. Team members practice regularly; in fact, they were in the middle of a drill when the original MyDoom worm hit.

      In the Sasser case, once the decision to move into immediate-response mode was taken, Kean gathered members of the Secure Windows Initiative Attack Team in a command center. Communications and public relations teams set up in a room nearby to begin getting the word out to customers about the worm.

      For most of that weekend, the technical teams pored over Sassers code. Analysts on the team carry pagers at all times and worked in shifts throughout the event. By the end of the weekend, the team understood the worm well enough to build a cleaner tool capable of removing Sasser from infected machines.

      “Making the process formal early on saved us time and confusion. Everyone knows exactly what to do,” said Kean. “Everybody involved contributes to the analysis. We share what we learn with everyone.”

      At the same time, analysts were also looking for clues in the worms code about the authors identity and/or possible motives. As it turned out, they need not have worried. While Microsoft staff and federal agents were hunting for the authors fingerprints in the Sasser code using the latest in modern tools and techniques, what eventually delivered the suspected Sasser creator to authorities was the oldest lure on earth: money.

      /zimages/5/28571.gifClick here to read Larry Seltzers take on why its a good time to beef up defenses against worms like Sasser.

      Several days after Sasser emerged, acquaintances of the worms suspected author contacted Microsoft officials in Germany and asked whether theyd be entitled to a reward if they handed over information on the worms creator. Microsoft has established a multimillion-dollar fund to pay rewards to those who supply evidence leading to the conviction of a virus author, so officials told the informants they could receive up to $250,000.

      After that, things moved quickly. Microsoft officials contacted German investigators as well as the FBI and told them what they knew. After interviewing the informants, officials moved in and arrested the teenager at his parents home in Germany within 48 hours of the informants first contact with Microsoft. By Friday, May 7, one week after Sasser first appeared, the teen was in custody.

      Back in Redmond, the MSRC team was winding down its investigation and going through its post-mortem analysis on the response effort.

      “The response procedure doesnt stop after the initial analysis,” Kean said. “This is the only way to learn and get any better.”

      /zimages/5/28571.gifCheck out eWEEK.coms Security Center at http://security.eweek.com for the latest security news, reviews and analysis.

      /zimages/5/77042.gif

      Be sure to add our eWEEK.com developer and Web services news feed to your RSS newsreader or My Yahoo page

      Dennis Fisher
      Dennis Fisher

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×