I Just watched uk's BBC NEWS program and it reported that the MSBLAST.exe virus is set to directly attack MICROSOFT !?
Home users suffer web worm woe
MSBlast hit some organisations hard
The latest computer virus to spread via the web seems to be hitting home users the hardest.
Since the MSBlast worm appeared yesterday (12th august 2003) the malicious program has infected more than 188,000 machines and swamped net connections with traffic as it looks for fresh hosts.
Many people struggled to download patches to protect themselves as the virus made it hard for them to connect to the net.
At its height the virus was taking only 30 seconds to find uninfected computers.
Scanning spreads
Unlike many recent viruses the worm travels around by itself and tries to infect any vulnerable Windows computer connected to the net.
It takes over a machine by exploiting a bug in the way that many versions of Microsoft Windows handle the transfer of files across the net.
Once a machine is compromised it starts searching for other machines to infect usually on the small section of the net that the host PC is using.
AFFECTED SYSTEMS
Microsoft Windows NT 4.0
Microsoft Windows NT 4.0 Terminal Services Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
The vulnerability that MSBlast, also called Lovsan, exploits has been known about for almost a month and many firms have been preparing their defences against a virus written to exploit it.
As a result many organisations had patched computers before the worm struck, to limit the damage it could do.
But home users and small businesses tend not to be as diligent as larger companies at keeping computer security up-to-date and many home PCs have been taken over by MSBlast.
As an experiment security firm F-Secure put an unprotected PC on the net to see how quickly it would be infected.
Early on Tuesday it took about five minutes 30 seconds before the machine was found and infected. But by 3pm the same PC was being found and infected in 27 seconds.
According to statistics from Symantec the US and UK have the highest number of infected PCs.
HOW TO AVOID MSBLAST
Keep anti-virus software up to date
Use a firewall on broadband connections
Apply patches to close vulnerabilities
Apply cleaning programs to infected machines
Anti-virus firm Sophos said many home users may not realise that they are infected with the virus which makes machines slow down and re-boot periodically.
The company said users may just believe this is an everyday glitch and take no action.
Large organisations are being caught out by the virus too. In Maryland in the US, the state's Motor Vehicle Administration which issues driving licences and car registrations, was closed as its computer systems were knocked out by the worm.
Also hit was the Federal Reserve Bank of Atlanta, government offices in Hong Kong, Swedish net provider TeliaSonera and German car maker BMW.
MSBlast has not done as much damage as the Slammer worm that struck in January which shut down some cash machine networks and caused widespread net disruption.
But so many machines infected by MSBlast were scanning for new victims that some of the internet's backbone networks were starting to feel the effects.
Keynote Systems, which monitors net traffic times, said average travel times for data passing between net firms on America's West and East coast is usually 85 milliseconds.
As MSBlast began to hit its stride this average travel time grew to between three and nine seconds.
The worm can be cleared by downloading a patch to close the vulnerability it exploits and by running removal programs created by anti-virus firms. Unlike some other worms MSBlast cannot be cleared by simply rebooting a machine.
more news :-Worm blasts across the web
Many versions of Windows are at risk from MSBlast
A Windows worm dubbed MSBlast is quickly spreading across the net and swamping net connections as it looks for more vulnerable machines to infect.
On infected machines the malicious program also launches an attack against the Microsoft site that holds a software patch that keeps the worm out.
Security firms say the design of the worm is hampering its spread but warn that tens of thousands of computers could fall victim to it.
The vulnerability exploited by the worm has been known about for almost a month and net security organisations have been warning that it would soon be exploited.
Damage control
MSBlast is known as a worm because it can spread across the net by itself.
Once installed on a machine MSBlast, also called Lovsan, starts scanning for other vulnerable machines and this can swamp local net connections.
AFFECTED SYSTEMS
Microsoft Windows NT 4.0
Microsoft Windows NT 4.0 Terminal Services Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Network Associates said that many home broadband users were reporting heavy traffic on their net connection as a result of being infected by the worm.
Security firm Symantec said that it had already found MSBlast on more than 57,000 machines.
The worm is likely to find a lot of hosts on the net as it exploits a vulnerability found in many different versions of Microsoft Windows.
The vulnerability exists in the way that Windows shares files across networks. The carefully crafted code of the worm swamps a memory buffer which forces a machine to carry out instructions hidden in the tail of the file.
As well as scanning for more machines to infect, MSBlast is also preparing to launch an attack on 16 August on Microsoft's Windows Update website where many people go to get software patches that close software vulnerabilities.
HOW TO AVOID MSBLAST
Keep anti-virus software up to date
Use a firewall on broadband connections
Apply patches to close vulnerabilities
Apply cleaning programs to infected machines
The vulnerability exploited by MSBlast was first discovered on 16 July and since then security firms, governments and alert services have been warning people that an attack was imminent.
Warnings grew more shrill as security firms reported that malicious hackers were starting to seek out machines that suffered the vulnerability that is now being exploited.
"The time between vulnerabilities being disclosed and exploits being created is decreasing, companies must have an efficient patch management process if they are to protect critical networks," said Graeme Pinkney, operations manager for Symantec. "Time is no longer on their side."
Those most likely to be affected are home users and small firms that tend not to be as diligent about computer security as large companies.
Security firms said that the worm is unlikely to spread as far the recent Slammer worm but said it could rival 2001's Code Red worm which managed to infect 200,000 machines.
Symantec said that it was spreading about 20% of the speed of the Slammer worm when measured by the number of unique machines it was finding and infecting.
Hidden inside the worm are two messages. One taunts Microsoft chairman Bill Gates and reads: "billy gates why do you make this possible? Stop making money and fix your software!" The other is more cryptic and says: "I just want to say LOVE YOU SAN!"
Home users suffer web worm woe
MSBlast hit some organisations hard
The latest computer virus to spread via the web seems to be hitting home users the hardest.
Since the MSBlast worm appeared yesterday (12th august 2003) the malicious program has infected more than 188,000 machines and swamped net connections with traffic as it looks for fresh hosts.
Many people struggled to download patches to protect themselves as the virus made it hard for them to connect to the net.
At its height the virus was taking only 30 seconds to find uninfected computers.
Scanning spreads
Unlike many recent viruses the worm travels around by itself and tries to infect any vulnerable Windows computer connected to the net.
It takes over a machine by exploiting a bug in the way that many versions of Microsoft Windows handle the transfer of files across the net.
Once a machine is compromised it starts searching for other machines to infect usually on the small section of the net that the host PC is using.
AFFECTED SYSTEMS
Microsoft Windows NT 4.0
Microsoft Windows NT 4.0 Terminal Services Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
The vulnerability that MSBlast, also called Lovsan, exploits has been known about for almost a month and many firms have been preparing their defences against a virus written to exploit it.
As a result many organisations had patched computers before the worm struck, to limit the damage it could do.
But home users and small businesses tend not to be as diligent as larger companies at keeping computer security up-to-date and many home PCs have been taken over by MSBlast.
As an experiment security firm F-Secure put an unprotected PC on the net to see how quickly it would be infected.
Early on Tuesday it took about five minutes 30 seconds before the machine was found and infected. But by 3pm the same PC was being found and infected in 27 seconds.
According to statistics from Symantec the US and UK have the highest number of infected PCs.
HOW TO AVOID MSBLAST
Keep anti-virus software up to date
Use a firewall on broadband connections
Apply patches to close vulnerabilities
Apply cleaning programs to infected machines
Anti-virus firm Sophos said many home users may not realise that they are infected with the virus which makes machines slow down and re-boot periodically.
The company said users may just believe this is an everyday glitch and take no action.
Large organisations are being caught out by the virus too. In Maryland in the US, the state's Motor Vehicle Administration which issues driving licences and car registrations, was closed as its computer systems were knocked out by the worm.
Also hit was the Federal Reserve Bank of Atlanta, government offices in Hong Kong, Swedish net provider TeliaSonera and German car maker BMW.
MSBlast has not done as much damage as the Slammer worm that struck in January which shut down some cash machine networks and caused widespread net disruption.
But so many machines infected by MSBlast were scanning for new victims that some of the internet's backbone networks were starting to feel the effects.
Keynote Systems, which monitors net traffic times, said average travel times for data passing between net firms on America's West and East coast is usually 85 milliseconds.
As MSBlast began to hit its stride this average travel time grew to between three and nine seconds.
The worm can be cleared by downloading a patch to close the vulnerability it exploits and by running removal programs created by anti-virus firms. Unlike some other worms MSBlast cannot be cleared by simply rebooting a machine.