August 18th will mark two years since the Zotob virus wriggled through a known Windows vulnerability into DHS's US-VISIT system and crashed parts of it. Now a new GAO report finds that the network remains "riddled with information security control weaknesses" that continue to put personal information and border security at risk.
THREAT LEVEL readers will recall that the Bureau of Customs and Border Protect (CBP) stonewalled my Freedom of Information Act request on the Zotob incident, until I successfully sued the agency in federal court. The released documents showed that CBP knowingly left the US-VISIT computers vulnerable to the Windows 2000 bug favored by Zotob, some nine days after Microsoft announced the hole and published a patch.
Amazingly, two years later, the GAO finds CBP still isn't keeping US-VISIT patched. From the report (.pdf):
Looking back, Zotob was something of a gift to CBP. Since 2005, those types of fast-spreading worms have largely gone the way of the Dodo. Today malware writers are all about bots, which are designed to stay hidden on computers indefinitely, instead of burning through them like a forest fire. With nothing clearing out the rotting deadwood of unpatched Windows machines except a couple GAO auditors, there's little reason to think that US-VISIT isn't owned up right now.
The GAO report was requested by Senator Joe Lieberman, Chair of the Homeland Security and Governmental Affairs Committee, who said in a press release that DHS needs to get its act together.