BLASTER WORM EXE set to attack MICROSOFT DIRECTLY !!!

I Just watched uk's BBC NEWS program and it reported that the MSBLAST.exe virus is set to directly attack MICROSOFT !?

Worm blasts across the web


Many versions of Windows are at risk from MSBlast
A Windows worm dubbed MSBlast is quickly spreading across the net and swamping net connections as it looks for more vulnerable machines to infect.

On infected machines the malicious program also launches an attack against the Microsoft site that holds a software patch that keeps the worm out.

Security firms say the design of the worm is hampering its spread but warn that tens of thousands of computers could fall victim to it.

The vulnerability exploited by the worm has been known about for almost a month and net security organisations have been warning that it would soon be exploited.

Damage control

MSBlast is known as a worm because it can spread across the net by itself.

Once installed on a machine MSBlast, also called Lovsan, starts scanning for other vulnerable machines and this can swamp local net connections.


AFFECTED SYSTEMS
Microsoft Windows NT 4.0
Microsoft Windows NT 4.0 Terminal Services Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Network Associates said that many home broadband users were reporting heavy traffic on their net connection as a result of being infected by the worm.

Security firm Symantec said that it had already found MSBlast on more than 57,000 machines.

The worm is likely to find a lot of hosts on the net as it exploits a vulnerability found in many different versions of Microsoft Windows.

The vulnerability exists in the way that Windows shares files across networks. The carefully crafted code of the worm swamps a memory buffer which forces a machine to carry out instructions hidden in the tail of the file.

As well as scanning for more machines to infect, MSBlast is also preparing to launch an attack on 16 August on Microsoft's Windows Update website where many people go to get software patches that close software vulnerabilities.


HOW TO AVOID MSBLAST
Keep anti-virus software up to date
Use a firewall on broadband connections
Apply patches to close vulnerabilities
Apply cleaning programs to infected machines
The vulnerability exploited by MSBlast was first discovered on 16 July and since then security firms, governments and alert services have been warning people that an attack was imminent.

Warnings grew more shrill as security firms reported that malicious hackers were starting to seek out machines that suffered the vulnerability that is now being exploited.

"The time between vulnerabilities being disclosed and exploits being created is decreasing, companies must have an efficient patch management process if they are to protect critical networks," said Graeme Pinkney, operations manager for Symantec. "Time is no longer on their side."

Those most likely to be affected are home users and small firms that tend not to be as diligent about computer security as large companies.

Security firms said that the worm is unlikely to spread as far the recent Slammer worm but said it could rival 2001's Code Red worm which managed to infect 200,000 machines.

Symantec said that it was spreading about 20% of the speed of the Slammer worm when measured by the number of unique machines it was finding and infecting.

Hidden inside the worm are two messages. One taunts Microsoft chairman Bill Gates and reads: "billy gates why do you make this possible? Stop making money and fix your software!" The other is more cryptic and says: "I just want to say LOVE YOU SAN!"
more news :-

Home users suffer web worm woe


MSBlast hit some organisations hard
The latest computer virus to spread via the web seems to be hitting home users the hardest.

Since the MSBlast worm appeared yesterday (12th august 2003) the malicious program has infected more than 188,000 machines and swamped net connections with traffic as it looks for fresh hosts.

Many people struggled to download patches to protect themselves as the virus made it hard for them to connect to the net.

At its height the virus was taking only 30 seconds to find uninfected computers.

Scanning spreads

Unlike many recent viruses the worm travels around by itself and tries to infect any vulnerable Windows computer connected to the net.

It takes over a machine by exploiting a bug in the way that many versions of Microsoft Windows handle the transfer of files across the net.

Once a machine is compromised it starts searching for other machines to infect usually on the small section of the net that the host PC is using.


AFFECTED SYSTEMS
Microsoft Windows NT 4.0
Microsoft Windows NT 4.0 Terminal Services Edition
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
The vulnerability that MSBlast, also called Lovsan, exploits has been known about for almost a month and many firms have been preparing their defences against a virus written to exploit it.

As a result many organisations had patched computers before the worm struck, to limit the damage it could do.

But home users and small businesses tend not to be as diligent as larger companies at keeping computer security up-to-date and many home PCs have been taken over by MSBlast.

As an experiment security firm F-Secure put an unprotected PC on the net to see how quickly it would be infected.

Early on Tuesday it took about five minutes 30 seconds before the machine was found and infected. But by 3pm the same PC was being found and infected in 27 seconds.

According to statistics from Symantec the US and UK have the highest number of infected PCs.


HOW TO AVOID MSBLAST
Keep anti-virus software up to date
Use a firewall on broadband connections
Apply patches to close vulnerabilities
Apply cleaning programs to infected machines
Anti-virus firm Sophos said many home users may not realise that they are infected with the virus which makes machines slow down and re-boot periodically.

The company said users may just believe this is an everyday glitch and take no action.

Large organisations are being caught out by the virus too. In Maryland in the US, the state's Motor Vehicle Administration which issues driving licences and car registrations, was closed as its computer systems were knocked out by the worm.

Also hit was the Federal Reserve Bank of Atlanta, government offices in Hong Kong, Swedish net provider TeliaSonera and German car maker BMW.

MSBlast has not done as much damage as the Slammer worm that struck in January which shut down some cash machine networks and caused widespread net disruption.

But so many machines infected by MSBlast were scanning for new victims that some of the internet's backbone networks were starting to feel the effects.

Keynote Systems, which monitors net traffic times, said average travel times for data passing between net firms on America's West and East coast is usually 85 milliseconds.

As MSBlast began to hit its stride this average travel time grew to between three and nine seconds.

The worm can be cleared by downloading a patch to close the vulnerability it exploits and by running removal programs created by anti-virus firms. Unlike some other worms MSBlast cannot be cleared by simply rebooting a machine.
 
yet more info :-

... Microsoft battens down for Blaster attack
By Iain Thomson [13-08-2003]
Infections falling but denial of service attack due this weekend



Microsoft is gearing up for the initial denial of service attack against its software update service by computers infected with the Blaster worm this coming Saturday.

The worm has been constructed to use infected PCs to launch the attack on the sixteenth of every month by flooding the windowsupdate.com site with requests.

Blaster also contains a message from its writer warning Bill Gates to make his software more secure.

"We're preparing for attack," said Stuart Okin, chief security officer for Microsoft UK. "We've made plans for dealing with the worm's payload but obviously can't discuss exactly what's planned.

"As it is, we've seen very heavy activity on windowsupdate.com in the last few days, for obvious reasons, as people patch their systems."

The US has had the highest number of infections with the UK second, according to Symantec.

Infection rates seem to be falling but it is likely that the virus will continue to be relatively common in the wild for some time to come.

"I think it is going to hang around," said Mark Fisher, technical manager for Trend Micro.

"Home users who may not be patched can harbour a worm like this. Education is going to be key to getting home users to patch more frequently and help avoid future worms."

There had initially been fears that the worm could spread much more rapidly. The US department of homeland security issued two warnings about the flaw used by the worm in the Windows operating systems.

The critical flaw is in Microsoft's Distributed Component Object Model Remote Procedure Call (RPC) interface.

The vulnerability involves the RPC protocol, which deals with inter-computer communications. Microsoft warned that, under certain circumstances, the RPC might not properly check messages sent to the PC.
not lookin good for old billy gates at microsoft huh ?!

:)
 
Maybe this will give M$ the kick up the ass they need 2 tighten up their OS security

I really am startin 2 think that their plan is 2 make as much money from rush released OS's, everytime a new 1 comes out they boast about how secure it is, when XP was released they already had a hell of a lot of bug fixes & patches on their site

But cheers 4 keepin us all updated VIPER:)

BaNzI:D
 
The success of Microsoft in unparalled; just try and name any other company that has made as much money selling beta software...
 
Couldnt agree more Business is their thing

Crush The Opposition To Ensure A Monopoly
Hype Your Crap products
Sell At Inflated Prices
Aftersales Nearly Nil
Stop Supporting Old Stuff To Make Em Buy The New
Make Huge Profits
Pay The Bosses Huge Salaries
Keep The Workers Happy When You Need Em
Sack Em When You Dont

Yep The Business Is The Thing.

But Remember "How Are The Mighty Fallen"
& Dont Think It Cant Happen <> Remember Enron

If They Dont Change Their Ways As Sure As Eggs Is Eggs They Will Fail

This Is Where I Came In & So Did Linux

:eek::eek::eek::mad:
 
Well said poacher, well said bud:)

Just read the bit about M$ droppin activation & slashin the price of XP in Thailand

Amazin what they will do if they think they gonna lose out 2 linux:mad:

BaNzI:D
 
Top