Practical UNIX and Internet Security, 3rd Edition
by Simson Garfinkel, Gene Spafford, Alan Schwartz
Chapter 23. Protecting Against Programmed Threats
It’s 4:00 a.m. on Friday, August 13, and Hillary Nobel’s pager is ringing. Nobel, the network administrator for a major New York City law firm, has gotten used to having her pager go off two hours before she is supposed to wake up: her firm has been under attack by computer hackers in China for several weeks now. The hackers have never gotten in, as near as she can tell: practically every page has been a false alarm. So Nobel turns off her pager and goes back to sleep.
Nobel’s phone rings a few moments later. When she picks up the phone, she hears a panicked voice on the other end of the line. It’s her counterpart at the firm’s London office. None of the firm’s desktop computers are working properly when they are plugged into the network, although they all work fine if the network connector is pulled and they are run as standalone machines.
Grumbling, Nobel turns on her laptop and tries to log into her firm’s central server. But instead of a nice friendly login screen asking for her username and password, she instead sees this message:
Dear Ms. Nobel, The virus reports and false alarms on your firm's so-called "intrusion detection system" are the result of a slow, stealthy worm (SSW) that was illegally brought into your office network on an infected laptop on July 9th. The SSW is software that was designed by our programmers as a part of our copyrighted game software; your employee's use of this software is in violation of our copyright. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access