alter or steal critical corporate or private data. |
Based on analysis of the worm, there will be a tremendous surge in the worm, ... There is reason for concern that the mass traffic associated with the worm's propagation could degrade the overall functioning of the Internet and impact ordinary users. |
Currently, all goverment and private sector watch centers are not reporting any unusual activity associated with the Code Red worm, but we will remain vigilant and continue to monitor the situation throughout the night, |
NIPC operates in a milieu of federal agencies and for-profit entities that feel the NIPC threatens their resources or authorities. Many of those upon whom the NIPC relies to accomplish its mission might prefer that the NIPC, especially housed in the FBI, not succeed. |
We are cautiously optimistic that the impact of the infection stage of this particular variant of the Code Red worm ... has been minimized. |
We were able to develop tools to identify to see if those programs are residing on your system, |
We were able to develop tools to identify to see if those programs are residing on your system, |
We're going to adopt one of the two because those models have been out there for a long time, ... We're still trying to figure out the best method to do that and keep the private sector on a level playing field. |
While there is no activity now, it does not mean that the storm has passed. It will take some time before we can make any definitive conclusions. |