Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Worm targets Windows flaw, patch site
San Jose Mercury News ^ | Aaron Davis and Kristi Heim

Posted on 08/11/2003 10:50:25 PM PDT by HAL9000

A virus-like computer attack that began spreading across the Internet and crashing computer networks Monday is expected to infect hundreds of thousands of computers worldwide in coming days.

By Saturday, it may reach a climax when it's programmed to direct all infected computers to attack a security-related Microsoft Web site, computer security experts said.

The target Web site, www.windowsupdate.com, is used by millions of Microsoft users each week to automatically update computers with the latest anti-virus software and patches.

It's unclear how much damage might be caused by the computer worm, already dubbed LoveSan, Blaster and MSBlaster. But security experts said it is similar in structure to the ``Code Red'' virus that affected 300,000 computers and caused an estimated $1.2 billion in cleanup costs in July 2001.

MSBlaster targets a flaw in Microsoft Windows operating systems that the U.S. Department of Homeland Security singled out earlier this month for an unprecedented series of warnings. In two public advisories, federal officials said they believed a sophisticated attack on the software flaw could disrupt as many as 75 percent of all computers linked to the Internet.

As of Monday evening, anti-virus software maker Symantec of Cupertino said it had confirmed about 60,000 infected computers. The attack was expected to spread overnight, possibly to Asia.

Targeted computers

Microsoft had acknowledged the software flaw July 16 and issued a patch for customers to download from the company's Web site. Before Monday's attack, however, Microsoft had declined to say how many users had downloaded the patch, leaving unclear how many computers are still vulnerable to attack.

MSBlaster targets four versions of Windows operating systems: Windows NT, Windows 2000, Windows XP and Windows Server 2003. The worm attacks computers through a flaw in the part of Windows that handles Internet traffic and lets computers share files, among other activities.

Unlike a virus, MSBlaster is considered a computer ``worm'' because it does not require computer users to open an e-mail attachment or take any other action to spread automatically from computer to computer. Home computer users who leave computers constantly online to the Internet through DSL or cable are among those most at risk.

Alfred Huger, senior director of Symantec Security Response, said for now the worm appears to be targeting Windows XP systems about 80 percent of the time. When the worm affects an XP system it often reboots the computer and prompts a warning box to display on the screen.

Users of other systems, like Windows 2000, however, may not get any overt warning that their computers have been infected. Users should monitor to see if their Web access becomes sluggish or look for unusually high CPU readings, Huger said.

The worm is designed to launch an attack called ``denial-of-service'' that could disable the Microsoft Update Web site Saturday, said Johannes Ullrich, chief technology officer at the Internet Storm Center at the Bethesda, Md.-based SANS Institute. That's one month after the company first published the patch intended to guard against an attack.

Microsoft spokesman Sean Sundwall said it was hard to say how reliable the predictions were regarding Saturday's attack. ``But we're taking it on its word,'' Sundwall said.

The denial-of-service attack is programmed to continue until the end of the month and restart again every month on the 16th, Huger said. The worm will be almost impossible to trace and could continue to infect computers for years to come, security officials warned. More than two years after its release, Code Red continues to infect an estimated 10,000 computers each day.

Encrypted message

The Windows Update Web site may have appeared to experience a slowdown Monday, but that could have been because of heavy traffic from people trying to get the patch, Sundwall said.

In addition to the attack date coinciding with the one-month anniversary of Microsoft's release of the patch, encrypted in the worm were strings with messages clearly aimed at Microsoft founder Bill Gates, according to Ullrich.

``billy gates why do you make this possible ? Stop making money and fix your software!!''



TOPICS: News/Current Events; Technical
KEYWORDS: blaster; lowqualitycrap; microsoft; msblast; windows; worm

1 posted on 08/11/2003 10:50:25 PM PDT by HAL9000
[ Post Reply | Private Reply | View Replies]

To: HAL9000
``billy gates why do you make this possible ? Stop making money and fix your software!!''

Linux Marxists at work...
2 posted on 08/12/2003 12:39:52 AM PDT by Bush2000
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
What would constitute an unusally high CPU reading?

3 posted on 08/12/2003 12:46:30 AM PDT by onyx (Name an honest democrat? I can't either!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: onyx
Depends on what you have running but at idle, you shouldn't read any more than a few %.
4 posted on 08/12/2003 12:55:02 AM PDT by paul544 (3D-Joy OH Boy!!!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: paul544
A firewall should keep you safe. Keep your anti-virus definition files up to date. Get free tools from http://grc.com to turn off raw sockets and universal plug and play services to keep out hackers. And don't download any suspicious files from sources you don't trust. Taken all together these four simple steps should keep your computer virus and trojan horse free.
5 posted on 08/12/2003 1:05:14 AM PDT by goldstategop (In Memory Of A Dearly Beloved Friend Who Lives On In My Heart Forever)
[ Post Reply | Private Reply | To 4 | View Replies]

Well I got it... I am running 2000Pro on Dial-Up and I am running 3 firewall programs, it still got through without my knowledge. I checked to see if I had it after reading a different FR thread that was posted about it, sure enough it was on my system. I had to update my virus scan software and it detected it and then removed it for me.

Do a file search for for MSBlaster.exe and see if it pops up, if it does update your virus software and run it. If you have it but do not have a virus protector, go to http://www.grisoft.com and download the free version of AVG, after you download it, run the software update for it and it will install the latest updates for it, then run AVG for a full virus check (after you have downloaded the software and updated it) and it will detect it and remove it for you.

I had it on my system and my computer was "not" shutting down like other people who also had it. My computer was operating fine, but I decided to check for it and sure enough it was there.
6 posted on 08/12/2003 1:14:48 AM PDT by stlnative
[ Post Reply | Private Reply | To 1 | View Replies]

To: paul544
Thank you for your kind response! Much appreciated.
7 posted on 08/12/2003 4:29:06 AM PDT by onyx (Name an honest democrat? I can't either!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: HAL9000
One article on news.google.com says port 134. Another says port 4444. Recorded tons & tons of hits on port 2034 since a couple of days ago. What's the straight dope?
8 posted on 08/12/2003 4:38:33 AM PDT by Nataku X (Never give Bush any power you wouldn't want to give to Hillary.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
Port 137 is getting pounded on my machine.
9 posted on 08/12/2003 4:45:59 AM PDT by AppyPappy (If You're Not A Part Of The Solution, There's Good Money To Be Made In Prolonging The Problem.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
Linux Marxists at work...

Prove it... or retract.

10 posted on 08/12/2003 7:08:32 AM PDT by TechJunkYard (because... so much is riding on your wires)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Bush2000
Linux Marxists at work...,p> Why should Linux users care? We don't get infected by Windows virii...
11 posted on 08/12/2003 9:33:10 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 2 | View Replies]

To: TechJunkYard
No need to ask for a retraction. You know you won't get it, nor the admission that the software does indeed need to be fixed.
12 posted on 08/12/2003 10:06:03 AM PDT by rdb3 (I'm not a complete idiot. Several parts are missing.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: TechJunkYard
Prove it... or retract.

Their statement is a dead giveaway: The "software must be free" crowd has a problem with anybody who wants to profit from software sales.
13 posted on 08/12/2003 10:33:37 AM PDT by Bush2000
[ Post Reply | Private Reply | To 10 | View Replies]

To: Bush2000
Bump for later
14 posted on 08/12/2003 10:37:53 AM PDT by r9etb
[ Post Reply | Private Reply | To 13 | View Replies]

To: Bush2000
The "software must be free" crowd has a problem with anybody who wants to profit from software sales.

Not true... the problem they have is with companies which use dishonest and illegal means.

However, your deflection won't work. You have asserted that a Linux hacker wrote and/or released this worm. If you have proof of this, I want to see it, otherwise shut your hypocritical face. You wouldn't let any of us get away with such accusations against Microsoft.

15 posted on 08/12/2003 11:11:41 AM PDT by TechJunkYard (because... so much is riding on your wires)
[ Post Reply | Private Reply | To 13 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson