[142] in Security FYI

home help back first fref pref prev next nref lref last post

[Security-fyi] Weak or missing Windows passwords being actively exploited

daemon@ATHENA.MIT.EDU (Bob Mahoney)
Fri Apr 12 12:17:27 2002

Mime-Version: 1.0
Message-Id: <p05010409b8dcb44defb7@[66.92.67.186]>
Date: Fri, 12 Apr 2002 12:09:01 -0400
To: netusers@mit.edu, security-fyi@mit.edu
From: Bob Mahoney <bobmah@mit.edu>
Errors-To: security-fyi-admin@mit.edu

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Over the past months the Network Security team has made regular 
efforts to detect missing or weak administrative and privileged 
passwords on Windows systems on campus, notifying system owners and 
asking that effective passwords be put in place.

This past week we have seen a sharp rise in the number of systems 
being compromised via weak or missing passwords of accounts with 
Administrator privileges.  This activity has largely been via 
automated "worm" exploits, resulting in rapid compromise of large 
numbers of systems.

Accordingly, we are adjusting our response to password problems of 
this nature.  Beginning last night, we are taking immediate action 
when missing or weak passwords are detected on Windows systems. 
Network service to these systems will be severed, and mail sent to 
the listed machine contact describing how to properly set a password, 
along with other relevant information.  As soon as passwords are set 
for these accounts, service will be restored.

Our hope is to protect vulnerable systems from compromise, which 
would require a full reinstallation of the affected system to 
resolve; thus, protecting user data, and limiting the need to 
reformat/reinstall such systems by taking immediate action.

This becomes the second situation when we will disable a Windows 
system IN ADVANCE of actual compromise, along with unpatched 
vulnerabilities on the IIS web server process.  In both cases the 
hope is that by briefly interrupting the service to such systems, we 
will prevent the spread of automated compromise, and allow users to 
return to a secure state with as little disruption as possible.

We ask all Administrators of Windows NT, 2K, or XP systems check that 
ALL LOCAL accounts have strong passwords.  Some advice for choosing 
effective passwords can be found at:

http://web.mit.edu/net-security/www/one-sheets/password-change.html

Contact information currently on file will be used.   You can 
verify/update your contact info via:

https:/nic.mit.edu/bin/hostupdate

Thank you.

- -Bob Mahoney, for security@mit.edu

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.3

iQA/AwUBPLcGp3rxxeI5xewJEQL6WgCfQZmPgkWqAuAY+lGGpLkl9Z3nDl4An3YN
qhmy+zuGp/bHuoZuyBZFDZK3
=OPk/
-----END PGP SIGNATURE-----
_______________________________________________
Security-fyi mailing list
Security-fyi@mit.edu
http://mailman.mit.edu/mailman/listinfo/security-fyi

home help back first fref pref prev next nref lref last post