Morris
Lim
This article was published in between the
release of Code Red and Code Red II. In
this article, the author briefly described how this worm functions and infects
computers with Microsoft’s Internet Information Servers by scanning on the
Internet and delivers the worm to other vulnerable computers using port 80. It also mentions this worm is time sensitive;
all its attacks are directed by the system clock and follow in a predetermined
schedule. The article mentions the
primary target was the White House; however, the White House got rid of the
problem by redirecting its IP address.
However the damage the worm did to the whole Internet and those
Microsoft Windows based servers was enormous.
The access to the internet was slowed down, and some of the systems were
frozen. It also prompted users to quickly
get their systems patched. Interestingly
enough, even though Code Red II was launched in August, in this article, which
was published in the end of July, the author is already aware of the presence
of different versions of Code Red that were spreading on the Internet.
In the very end of this article, it also mentions that
Microsoft is trying to find out faster ways of delivering new updates and
patches. However, we know that Microsoft
did not come up with a satisfactory solution during the Blaster worm and Sasser worm.
Reference:
Code Red: Is This the
Apocalypse? Michelle Delio, Wired News,
URL:
http://www.wired.com/news/technology/1,45681-0.html