Feeds

WIN2K is even easier to deface than NT

MS claims give false sense of security

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Firms upgrading their computer systems to the Windows 2000 operating systems from NT 4 are exposing themselves to greater security risks from Web site defacement.

Records kept by security site Attrition.org indicate that an average of 55 per cent of Web site defacements so far this year are linked to exploitation of Windows NT operating systems vulnerabilities. Linux is the second most commonly hacked Web server and accounted for around 21 per cent of Web page defacement last month.

However buried within these figures is a trend of increased exploitation of sites running Windows 2000.

One in ten defaced Web sites in the Attrition archive run Windows 2000, which is racing ahead of the deployment of the technology. Prior to November 2000 less than 3 per cent of defacement were on Windows 2000 servers. The sharp increase since then is likely to be related to the release of exploits against Microsoft's IIS 5 Web server software.

This is having a real effect as s'kiddies are exploiting Windows 2000 vulnerabilities to claim an ever increasing number of high-profile victims including: The Walt Disney Company, The Wall Street Journal, BT, HSBC, The US Navy and The US Army.

Graeme Pinkney, of managed services security firm Activis, said that many firms had been "duped" into a false sense of security with Windows 2000 because of Microsoft's claims of enhanced security functionality with the operating system.

Pinkney said he wouldn't advise customers against using Windows 2000, which he said could be securely configured by people properly aware of latest security issues. This goes for any operating system but is all the more important for NT users, according to Activis.

"Building a secure site with Windows 2000 is like looking after a small child. It needs constant attention," said Pinkney, who added that regular vulnerability scanning and security audits are also a good idea for those administering Linux Web servers. ®

External links

Statistics on defacements from Attrition

Secure remote control for conventional and virtual desktops

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.