[Infowarrior] - DOD Bans Disks, USB Drives

Richard Forno rforno at infowarrior.org
Fri Nov 21 04:21:31 UTC 2008


Under Worm Assault, Military Bans Disks, USB Drives
By Noah Shachtman EmailNovember 19, 2008 | 6:12:30 PM
Categories: Info War
http://blog.wired.com/defense/2008/11/army-bans-usb-d.html

The Defense Department's geeks are spooked by a rapidly spreading worm  
crawling across their networks. So they've suspended the use of so- 
called thumb drives, CDs, flash media cards, and all other removable  
data storage devices from their nets, to try to keep the worm from  
multiplying any further.

The ban comes from the commander of U.S. Strategic Command, according  
to an internal Army e-mail. It applies to both the secret SIPR and  
unclassified NIPR nets. The suspension, which includes everything from  
external hard drives to "floppy disks," is supposed to take effect  
"immediately." Similar notices went out to the other military services.

In some organizations, the ban would be only a minor inconvenience.  
But the military relies heavily on such drives to store information.  
Bandwidth is often scarce out in the field. Networks are often  
considered unreliable. Takeaway storage is used constantly as a  
substitute.

The problem, according to a second Army e-mail, was prompted by a  
"virus called Agent.btz." That's a variation of the "SillyFDC" worm,  
which spreads by copying itself to thumb drives and the like. When  
that drive or disk is plugged into a second computer, the worm  
replicates itself again — this time on the PC. "From there, it  
automatically downloads code from another location. And that code  
could be pretty much anything," says Ryan Olson, director of rapid  
response for the iDefense computer security firm. SillyFDC has been  
around, in various forms, since July 2005. Worms that use a similar  
method of infection go back even further — to the early '90s. "But at  
that time they relied on infecting floppy disks rather than USB  
drives," Olson adds.

Servicemembers are supposed to "cease usage of all USB storage media  
until the USB devices are properly scanned and determined to be free  
of malware," one e-mail notes. Eventually, some government-approved  
drives will be allowed back under certain "mission-critical," but  
unclassified, circumstances. "Personally owned or non-authorized  
devices" are "prohibited" from here on out.

To make sure troops and military civilians are observing the  
suspension, government security teams "will be conducting daily scans  
and running custom scripts on NIPRNET and SIPRNET to ensure the  
commercial malware has not been introduced," an e-mail says. "Any  
discovery of malware will result in the opening of a security incident  
report and will be referred to the appropriate security officer for  
action."

"The USB ban should be effective in stopping the worm," Olson says.  
Asked if such a wide-spread measure was a bit of over-kill, Olson  
responded, "I don't know."

"I know this [is an] inconvenience," e-mails one Michigan Army  
National Guardsman. "This has been briefed to the CoS [Chief of Staff]  
of the ARMY. This is not just a problem for Michigan, and is effecting  
operations around the world. This is a very serious threat and should  
be treated as such. Please understand that this is a form of attack,  
and we need to have patience in dealing with this issue."


More information about the Infowarrior mailing list