A just-completed study into the Slammer worm that hit the Internet a week ago has concluded what many people already suspected: Slammer represented a significant milestone in the evolution of worms and was by far the fastest-spreading worm yet seen.The study was conducted by a group of experts representing the Cooperative Association for Internet Data Analysis (CAIDA), International Computer Science Institute, Silicon Defense, University of California at Berkeley’s Electrical Engineering and Computer Sciences department and the University of California at San Diego Computer Science and Engineering department.During the first three minutes of the worm’s spread, the number of infected machines doubled roughly every 8.5 seconds, the study found. This is more than 250 times faster than Code Red, which hit in mid-2001 and had a doubling time of 37 minutes, according to the report. The worm hit its full scanning rate of around 55 million [m] scans per second at around three minutes after the attack began at roughly 05:30 GMT on Saturday.The result of this fast spread was that within 10 minutes of the start of the attack the majority of the estimated 75,000 machines that were hit had been infected, said the report. Slammer’s spread was considerably faster for several reasons, said the report. First, it was small. At just 376 bytes in size, the worm and required headers fit inside a 404-byte UDP packet. Code Red was 4K bytes in size, while the Nimda worm was around 37K bytes.The worm also worked differently than Code Red. Slammer generated random IP addresses and despatched itself to those addresses without scanning to find out whether the target machine was running either of the two pieces of software that were vulnerable to attack: Microsoft’s SQL Server 2000 database and Microsoft SQL Server 2000 Data Engine. Because of its random nature, the worm would hit all vulnerable machines, given enough time. However, the speed with which it propagated appears to have contributed to its downfall. Spread of the worm eventually began to slow because bandwidth from infected machines to the Internet could not support the exponential growth in IP packets being generated, the report said.Its signature, attacking a specific port on vulnerable systems, was also easy to detect and network-level blocking of the ports in question was effective in slowing the worm.In the case of Code Red, the worm probed machines to find vulnerable servers and only attacked IP addresses of machines judged vulnerable. This led to a much slower rate of spread.The report also identified at least one implication of the attack.It said smaller user populations could potentially be more vulnerable to attack. In the past, worms often only targeted software for which there was a large installed base of users. But given the speed with which Slammer-like worms can spread, less popular software now also presents a viable breeding ground for worms, the report said. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe