Information Security: "ILOVEYOU" Computer Virus Emphasizes Critical Need for Agency and Governmentwide Improvements (Testimony, 05/10/2000, GAO/T-AIMD-00-171). Pursuant to a congressional request, GAO discussed the "ILOVEYOU" computer virus, focusing on the need for agency and governmentwide improvements in information security. GAO noted that: (1) ILOVEYOU is both a virus and a worm; (2) the damage resulting from this particular hybrid is limited to users of the Microsoft Windows operating system; (3) ILOVEYOU typically comes in the form of an electronic mail (e-mail) message from someone the recipient knows; (4) as long as recipients do not run the attached file, their systems will not be affected and they need only to delete the e-mail and its attachment; (5) if opened, the ILOVEYOU can spread and infect systems by sending itself to everyone in the recipient's address book; (6) there are areas of management and general control that are integral to improving problems in information security; (7) most agencies do not develop security plans for major systems based on risk, have not formally documented security policies, and have not implemented programs for testing and evaluating the effectiveness of controls they rely on; (8) these are fundamental activities that allow an organization to manage its information security risks cost-effectively rather than by reacting to individual problems ad hoc; (9) agencies often lack effective access controls to their computer resources and, as a result, are unable to protect these assets against unauthorized modification, loss, and disclosure; (10) these controls would normally include physical protections such as gates and guards and logical controls, which are controls built into software that: (a) require users to authenticate themselves through passwords or other identifiers; and (b) limit the files and other resources that an authenticated user can access and the actions that he or she can take; (11) testing procedures are undisciplined and do not ensure that implemented software operates as intended, and access to software program libraries is inadequately controlled; (12) GAO found that computer programmers and operators are authorized to perform a wide variety of duties; (13) this, in turn, provides them with the ability to independently modify, circumvent, and disable system security features; (14) GAO's reviews frequently identify systems with insufficiently restricted access to the powerful programs and sensitive files associated with the computer system's operation; (15) such free access makes it possible for knowledgeable individuals to disable or circumvent controls; (16) service continuity controls are incomplete and often not fully tested for ensuring that critical operations can continue when unexpected events occur; and (17) agencies can act immediately to address computer weaknesses and reduce their vulnerability to computer attacks. --------------------------- Indexing Terms ----------------------------- REPORTNUM: T-AIMD-00-171 TITLE: Information Security: "ILOVEYOU" Computer Virus Emphasizes Critical Need for Agency and Governmentwide Improvements DATE: 05/10/2000 SUBJECT: Computer networks Computer security Computer crimes Information resources management Electronic mail Computer viruses Internal controls IDENTIFIER: Internet Melissa Computer Virus ILOVEYOU Computer Virus ****************************************************************** ** This file contains an ASCII representation of the text of a ** ** GAO Testimony. ** ** ** ** No attempt has been made to display graphic images, although ** ** figure captions are reproduced. Tables are included, but ** ** may not resemble those in the printed version. ** ** ** ** Please see the PDF (Portable Document Format) file, when ** ** available, for a complete electronic file of the printed ** ** document's contents. ** ** ** ****************************************************************** * For Release on Delivery Expected at 10 a.m. Wednesday, May 10, 2000 GAO/T-AIMD-00-171 information security "ILOVEYOU" Computer Virus Emphasizes Critical Need for Agency and Governmentwide Improvements Statement of Keith A. Rhodes Director, Office of Computer and Information Technology Assessment Accounting and Information Management Division Testimony Before the Subcommittee on Technology, Committee on Science, House of Representatives United States General Accounting Office GAO Madam Chairwoman and Members of the Subcommittee: Thank you for inviting me to participate in today's hearing on the "ILOVEYOU" computer virus. About this time last year, I testified before this Subcommittee on the "Melissa" virus, which temporarily disrupted the operations of some agencies by forcing them to shut down their e-mail systems. At that hearing, I stressed that the next virus would likely propagate faster, do more damage, and be more difficult to detect and counter. This is just what we have experienced with ILOVEYOU. While it looked a lot like Melissa in its operation, it moved much more swiftly, and it appears to have caused as much, if not more, disruption. Nevertheless, the lessons to be gleaned from both attacks are the same. Federal agencies must implement vigorous security programs to enable them to closely watch their information resources for signs of attack or intrusion and to quickly react to such events when detected. Moreover, the government as a whole must promptly implement long-term solutions that will ensure that agencies focus on security from an organizationwide perspective and implement a comprehensive set of security controls. It must also establish central tracking and reporting mechanisms to facilitate analyses of these and other forms of attacks and their impact. The ILOVEYOU Worm/Virus and Its Immediate Impact ILOVEYOU typically comes in the form of an e-mail message from someone the recipient knows with an attachment called LOVE-LETTER-FOR-YOU.TXT.VBS. The attachment is a Visual Basic Script (VBS) file. As long as recipients do not run the attached file, their systems will not be affected and they need only to delete the e-mail and its attachment. When opened and allowed to run, however, ILOVEYOU attempts to * send copies of itself using Microsoft Outlook (an electronic mail software program) to all entries in all of the recipient's address books, * infect the Internet Relay Chat (IRC) program so that the next time a user starts "chatting" on the Internet, the worm can spread to everyone who connects to the chat server, * search for picture, video, and music files and overwrite or replace them with a copy of itself, and * install a password-stealing program that will become active when the recipient opens Internet Explorer and reboots the computer. (Internet accounts set up to collect this information were reportedly disabled early Friday). In short, ILOVEYOU looks a lot like Melissa in operation: it comes via e-mail; it attacks Microsoft's Outlook; it's a hybrid between a worm and a virus; and it does some damage-but it mostly excels at using the infected system to e-mail copies of itself to others. The one main difference is that it proliferated much faster than Melissa because it came during the work week, not the weekend. Moreover, ILOVEYOU sent itself to everyone on the recipient's e-mail lists, rather than just the first 50 addressees as Melissa did. In fact, soon after initial reports of the worm/virus surfaced in Asia on May 4, ILOVEYOU spread rapidly throughout the rest of the world. By 6 pm the same day, Carnegie Mellon's CERT Coordination Center had received over 400 direct reports involving more than 420,000 Internet hosts. And by the next day, ILOVEYOU appeared in new guises, labeled as "Mother's Day," "Joke," "Very Funny," among others. At least 14 different variants of the virus had been identified by the weekend, according to DOD's Joint Task Force-Computer Network Defense. These variations retriggered disruptions because they allowed the worm/virus to bypass filters set up earlier to block ILOVEYOU. At least one variant-with the subject header "VIRUS ALERT!!!"-was reportedly even more dangerous than the original because it was also able to overwrite system files critical to computing functions. Reports from various media, government agencies, and computer security experts indicate that the impact of ILOVEYOU was extensive. The virus reportedly hit large corporations such as AT&T, TWA, and Ford Motor Company; media outlets such as the Washington Post and ABC news; international organizations such as the International Monetary Fund, the British Parliament, and Belgium's banking system; state governments; school systems; and credit unions, among many others, forcing them to take their networks off-line for hours. The virus/worm also reportedly penetrated at least 14 federal agencies-including the Department of Defense (DOD), the Social Security Administration, the Central Intelligence Agency, the Immigration and Naturalization Service, the Department of Energy, the Department of Agriculture, the Department of Education, the National Aeronautics and Space Administration (NASA), along with the House and Senate. We still do not know the full effect of this virus on the agencies that were penetrated. While many were forced to shut down their e-mail networks for some time, many also reported that mission-critical systems and operations were not affected. Of course, if an agency's business depends on e-mail for decision-making and service delivery, then the virus/worm probably had a significant impact on day-to-day operations in terms of lost productivity. It also appears that major efforts were required to control the virus. Based on a discussion with military CERT representatives, for example, responding to the virus/worm has been a tremendous task that took several days to get under control. Some DOD machines required complete software reloads to overcome the extent of the damage. The virus/worm spread rapidly through the department, penetrating even some classified systems. DOD's operational commands responded in widely varying ways-some made few changes to their daily operational procedures while others cut off all e-mail communications for an extended period of time. Representatives of DOD's Joint Task Force-Computer Network Defense said that they will recommend new procedures to better coordinate the department's response to future incidents, based on experience with the ILOVEYOU virus/worm. Virus/Worm Reiterates Challenge in Protecting Information Technology Assets and Sensitive Data While the ILOVEYOU worm/virus resulted in relatively limited damage in terms of systems corrupted, the incident continues to underscore the formidable challenge that the federal government faces in protecting its information systems assets and sensitive data. It again shows, for example, that computer attack tools and techniques are becoming increasingly sophisticated; viruses are spreading faster as a result of the increasing connectivity of today's networks; commercial-off-the-shelf (COTS) products can be easily exploited for attack by all their users; and there is no "silver bullet" solution to protecting systems, such as firewalls or encryption. Moreover, ILOVEYOU illustrates the difficulty of investigating cyber crime. In particular, investigations of computer attacks such as ILOVEYOU must be conducted on an international scale. Moreover, only the computer used to launch the virus can be traced-not the programmer. Lastly, evidence is fleeting-the more time that passes between the first attack and an arrest, the more time the programmer has to destroy all links to the crime. Additionally, ILOVEYOU once again proved that governmentwide reporting mechanisms are ineffective. Like Melissa more than a year ago, little information was available early enough for agencies to take proactive steps to mitigate the damage. The CERT Coordination Center posted its advisory at approximately 9:30 pm May 4, while FBI's National Infrastructure Protection Center (NIPC) issued a brief notice at 11:00 am on May 4 and more information at 10:00 pm. In addition, there is still no complete information readily available on the impact that this virus had across the federal government. More important, like Melissa and other attacks this Subcommittee has focused on, our experience with ILOVEYOU is a symptom of broader information security concerns across government. Over the past several years, our analyses as well as those of the inspectors general have found that virtually all of the largest federal agencies have significant computer security weaknesses that place critical federal operations and assets at risk to computer-based attacks. Our most recent individual agency review, of the Environmental Protection Agency (EPA), identified many security weaknesses associated with the computer operating systems and the agencywide computer network that support most of EPA's mission-related and financial operations. In addition, EPA's own records identified serious computer incidents in the last 2 years. EPA is currently taking significant steps to address these weaknesses, but resolving them on a lasting basis will require substantial ongoing management attention and changes in the way EPA views information security. EPA is not unique. Within the past 12 months, we have identified significant management weaknesses and control deficiencies at a number of agencies, including DOD, NASA, State, and VA. Although the nature of operations and related risks at these and other agencies vary, there are striking similarities in the specific types of weaknesses reported. I would like to briefly highlight six areas of management and general control problems since they are integral to understanding and implementing long-term solutions. * First, we continue to find that poor security planning and management is the rule rather than the exception. Most agencies do not develop security plans for major systems based on risk, have not formally documented security policies, and have not implemented programs for testing and evaluating the effectiveness of controls they rely on. These are fundamental activities that allow an organization to manage its information security risks cost-effectively rather than by reacting to individual problems ad hoc. * Second, agencies often lack effective access controls to their computer resources (data, equipment, and facilities) and, as a result, are unable to protect these assets against unauthorized modification, loss, and disclosure. These controls would normally include physical protections such as gates and guards and logical controls, which are controls built into software that (1) require users to authenticate themselves through passwords or other identifiers and (2) limit the files and other resources that an authenticated user can access and the actions that he or she can take. * Third, in many of our audits we find that application software development and change controls are weak. For example, testing procedures are undisciplined and do not ensure that implemented software operates as intended, and access to software program libraries is inadequately controlled. * Fourth, many agencies lack effective policies and procedures governing the segregation of duties. We commonly find that computer programmers and operators are authorized to perform a wide variety of duties, such as independently writing, testing, and approving program changes. This, in turn, provides them with the ability to independently modify, circumvent, and disable system security features. * Fifth, our reviews frequently identify systems with insufficiently restricted access to the powerful programs and sensitive files associated with the computer system's operation, e.g., operating systems, system utilities, security software, and database management system. Such free access makes it possible for knowledgeable individuals to disable or circumvent controls. * Sixth, we have found that service continuity controls are incomplete and often not fully tested for ensuring that critical operations can continue when unexpected events (such as a temporary power failure, accidental loss of files, major disaster such as a fire, or malicious disruptions) occur. Actions Needed to Prepare for Future Computer Attacks Figure 1: Actions Agencies Can Take To Immediately Reduce Risks * Ensure that agency personnel Better understanding of risks allows at all levels understand the senior executives to make more significance of their informed decisions regarding dependence on computer support appropriate levels of financial and and the related risks to personnel resources to protect these mission-related operations. assets over the long term. Our audits often find that security is * Ensure that policies and weak, not because agencies have no controls already implemented policies and controls, but because the are operating as intended. policies and controls they have implemented are not operating effectively. Security weaknesses are frequently discovered in commercial software * Ensure that known software packages after the software has been vulnerabilities are reduced by sold and implemented. To remedy these promptly implementing software problems, vendors issue software patches. "patches" that users can install. In addition, organizations such as the CERT Coordination Center routinely issue alerts on software problems. Examples of such tools are (1) scanners that automatically search for * Use readily available software system vulnerabilities, (2) password tools to help ensure that cracking tools, which test password controls are operating as strength, and (3) network monitoring intended and that systems are tools, which can be used to monitor secure. system configuration and network traffic, help identify unauthorized changes, and identify unusual or suspicious network activity. Our audits have shown that even agencies with poor security programs * Expand on the good practices often have good practices in certain that are already in place in areas of their security programs or the agency. certain organizational units. In these cases, we recommend that the agency expand or build on these practices throughout the agency. Such lists enable individual * Develop and distribute lists organization units to take advantage of the most common types of of experience gained by others. They vulnerabilities, accompanied can be developed based on in-house by suggested corrective experience, or adapted from lists actions. available through professional organizations and other centers of expertise. To combat viruses and worms specifically, agencies could take steps such as ensuring that security personnel are adequately trained to respond to early warnings of attacks and keeping antivirus programs up-to-date. Strengthening intrusion detection capabilities may also help. Clearly, it is difficult to sniff out a single virus attached to an e-mail coming in but if 100 e-mails with the same configuration suddenly arrive, an alert should be sounded. User education is also key. In particular, agencies can teach computer users that e-mail attachments are not always what they seem and that they should be careful when opening them. By no means, should users open attachments whose filenames end in ".exe" unless they are sure they know what they are doing. Users should also know that they should never start a personal computer with an unscanned floppy disk or CD-ROM in the computer drive. I would like to stress, however, that while these actions can jump-start security improvement efforts, they will not result in fully effective and lasting improvements unless they are supported by a strong management framework. Based on our 1998 study of organizations with superior security programs, this involves managing information security risks through a cycle of risk management activities that include * assessing risks and determining protection needs, * selecting and implementing cost-effective policies and controls to meet these needs, * promoting awareness of policies and controls, and of the risks that prompted their adoption, among those responsible for complying with them, and * implementing a program of routine tests and examinations for evaluating the effectiveness of policies and related controls and for reporting the resulting conclusions to those who can take appropriate corrective action. Additionally, a strong central focal point can help ensure that the major elements of the risk management cycle are carried out and can serve as a communications link among organizational units. Such coordination is especially important in today's highly networked computer environment. I would also like to emphasize that while individual agencies bear primary responsibility for the information security associated with their own operations and assets, there are several areas where governmentwide criteria and requirements also need to be strengthened. First, there is a need for routine periodic independent audits of agencies to provide (1) a basis for measuring agency performance and (2) information for strengthened oversight. Except for security audits associated with financial statement audits, current information security reviews are performed on an ad hoc basis. Second, agencies need more prescriptive guidance regarding the level of protection that is appropriate for their systems. Currently, guidance provided by the Office of Management and Budget (OMB) and the National Institute of Standards and Technology (NIST) allows agencies wide discretion in deciding what computer security controls to implement and the level of rigor with which they enforce these controls. As a result, existing guidance does not ensure that agencies are making appropriate judgments in this area and that they are protecting the same types of data consistently throughout the federal community. More specific guidance could be developed in two parts: the first being a set of data classifications that could be used by all federal agencies to categorize the criticality and sensitivity of the data they generate and maintain and the second being a set of minimum mandatory control requirements for each classification which would cover such issues as the strength of system user authentication techniques, appropriate types of cryptographic tools, and the frequency and rigor of testing. Third, there is a need for stronger central leadership and coordination of information security related activities across government. Under current law, responsibilities for guidance and oversight of agency information security is divided among a number of agencies, including OMB, NIST, the General Services Administration, and the National Security Agency. Other organizations have become involved through the administration's critical infrastructure protection initiative, including the FBI's National Infrastructure Protection Center and the Critical Infrastructure Assurance Office. The federal Chief Information Officers Council is also supporting these efforts. While all of these organizations have made positive contributions, some roles and responsibilities are not clear, and central coordination is lacking in key areas. In particular, as this latest attack showed, information on vulnerabilities and related solutions is not being adequately shared among agencies, and requirements related to handling and reporting security incidents are not clear. In conclusion, more than 12 months later, not much is different with the ILOVEYOU worm/virus than with Melissa. Many agencies were hit; most were fortunate that the worst damage done was to shut down e-mail systems and temporarily disrupt operations; and early warning systems for incidents like these still need to be improved. Moreover, our audits continue to find that most agencies continue to lack the basic management framework needed to effectively detect, protect against, and recover from these attacks. Lastly, as seen with ILOVEYOU's variations, we can still expect the next virus to propagate faster, do more damage, and be more difficult to encounter. Consequently, it is more critical than ever that federal agencies and the government act as whole to swiftly implement both short- and long-term solutions identified today to protect systems and sensitive data. Madam Chairwoman, this concludes my testimony. I would be happy to answer any questions you or Members of the Subcommittee may have. Contacts and Acknowledgments (511998) Orders by Internet For information on how to access GAO reports on the Internet, send an e-mail message with "info" in the body to: Info@www.gao.gov or visit GAO's World Wide Web home page at: http://www.gao.gov Web site: http://www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov 1-800-424-5454 (automated answering system) *** End of document. *** answering system)