Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Virus has had Vancouver school computers down for three weeks - so far
Macdailynews.com Vancouver Sun ^ | january 30, 2009 | Mary Frances Hill

Posted on 02/01/2009 11:42:01 PM PST by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061 next last
To: Knitebane

This is the biggest worm attack for years, and in theory could hit 350 million PCs or thereabouts. However, in spite of this “amazing” worm “skyrocketing,” F-Secure says: “Downadup infections appear to have peaked during the week.” Its latest reported estimate is only 15 million, which is not all that impressive for something that was first seen last November, and should be able to double every day.

Maybe the next version(s) will do better. But let's hope not.

Of course, there's no real reason why anyone should have Downadup/Conflickr: Microsoft patched that security hole last October with Microsoft Security Update MS08-067 (KB958644), and on October 25, I posted Microsoft releases critical patch, extra to Windows update to tell you to install it. I'm sure there are a few unlucky souls among the estimated 15m victims, but I suspect most have got Downadup/Conflickr because they are too lazy or too dim to install Windows Updates, or they're running pirated copies of Windows.


41 posted on 02/02/2009 12:49:28 PM PST by js1138
[ Post Reply | Private Reply | To 38 | View Replies]

To: js1138
That one’s only two years old.

I just grabbed the first one on Google. There were so many to choose from.

Here then, here's one from December.

42 posted on 02/02/2009 12:52:32 PM PST by Knitebane
[ Post Reply | Private Reply | To 40 | View Replies]

To: Knitebane

“Users of Windows Vista and Server 2008 can breathe easy as those packages are unaffected by the flaw. XP - running SP3 - is also clear of trouble.”

So the bottom line is that people who are running pirated versions of Windows that are not updated run some risk. OK.


43 posted on 02/02/2009 12:55:35 PM PST by js1138
[ Post Reply | Private Reply | To 42 | View Replies]

To: js1138
I'm sure there are a few unlucky souls among the estimated 15m victims, but I suspect most have got Downadup/Conflickr because they are too lazy or too dim to install Windows Updates, or they're running pirated copies of Windows.

Or perhaps it's because previous updates have hosed their computers (see post #30 above) or because something they installed happened to uninstall the patch.

Oh wait, that could never happen!

Er, well...maybe it could, since it's happened before.

44 posted on 02/02/2009 12:56:34 PM PST by Knitebane
[ Post Reply | Private Reply | To 41 | View Replies]

To: js1138
So the bottom line is that people who are running pirated versions of Windows that are not updated run some risk. OK.

And those users that have installed the SP blocker built by Microsoft to get around all the problems associated with SP3.

45 posted on 02/02/2009 12:57:54 PM PST by Knitebane
[ Post Reply | Private Reply | To 43 | View Replies]

To: Knitebane

If you browse the internet of open email without having security updates and without having a virus scanner, you should probably be doing something else with your time.

There is another free and relatively painless preventive, which I use with my business clients.

I do occasional backups of System State. It takes about two minutes and can be scheduled.

Restoring System State after a virus attack takes about ten minutes — including a reboot and reinstallation of updates.

I recovered four machines by this procedure. It’s a lot less painful than tracking down spyware removers, and a lot faster than reformatting. Unfortunately I need tricks like this, because the companies I work with do not restrict internet access, and given enough users, some will install almost anything.


46 posted on 02/02/2009 1:08:22 PM PST by js1138
[ Post Reply | Private Reply | To 45 | View Replies]

To: js1138
If you browse the internet of open email without having security updates and without having a virus scanner, you should probably be doing something else with your time.

Or you could just run an operating system that isn't a cheap whore for every virus, worm and other bit of malware around.

I recovered four machines by this procedure.

Well, you hope so.

The problem with "restoring" owned machines is that you can't ever be sure that you got everything.

Security best practice for a compromised machine is format and re-install from known, clean media.

Unfortunately I need tricks like this, because the companies I work with do not restrict internet access, and given enough users, some will install almost anything.

No, the unfortunate part is that you think this kind of thing is necessary.

47 posted on 02/02/2009 1:18:02 PM PST by Knitebane
[ Post Reply | Private Reply | To 46 | View Replies]

To: Swordmaker

Simple solution: just stick with notebook paper and pencil. Never fails.

Old school prevails!


48 posted on 02/02/2009 1:30:04 PM PST by Cedar
[ Post Reply | Private Reply | To 1 | View Replies]

To: ReignOfError
I don't expect to see a world in which the Mac occupies the place once held by Windows,

If Mac ever does they'd end up being as lazy & bloated as MSFT.

49 posted on 02/02/2009 1:30:08 PM PST by Tribune7 (Obama wants to put the same crowd that ran Fannie Mae in charge of health care)
[ Post Reply | Private Reply | To 33 | View Replies]

To: js1138
If you browse the internet of open email without having security updates and without having a virus scanner,

I don't :-)

OK, I'm pretty good about security updates.

50 posted on 02/02/2009 1:33:26 PM PST by Tribune7 (Obama wants to put the same crowd that ran Fannie Mae in charge of health care)
[ Post Reply | Private Reply | To 46 | View Replies]

To: Knitebane

“attacks would take the form of tricking users into opening an attachment, so it’s not an auto-execute risk,”


51 posted on 02/02/2009 1:36:03 PM PST by TiberiusClaudius
[ Post Reply | Private Reply | To 42 | View Replies]

To: TiberiusClaudius
“attacks would take the form of tricking users into opening an attachment, so it’s not an auto-execute risk,”

Don't worry, it's only a zero-day exploit and although it requires the user to do exactly what Vista's UAC has trained users to do, there will be an auto-execute zero-day exploit along soon.

Microsoft security holes, death and taxes.

52 posted on 02/02/2009 1:43:53 PM PST by Knitebane
[ Post Reply | Private Reply | To 51 | View Replies]

To: Knitebane
The problem with "restoring" owned machines is that you can't ever be sure that you got everything.

My experience is otherwise. I don't completely trust malware scanners, but restoring executables and the registry removes active malware. You can then clean any infected files, because they're orphaned.

53 posted on 02/02/2009 1:47:15 PM PST by js1138
[ Post Reply | Private Reply | To 47 | View Replies]

To: js1138
My experience is otherwise.

The plural of "anecdote" is not "facts".

Besides, Microsoft disagrees with you.

You can’t clean a compromised system by removing the back doors. You can never guarantee that you found all the back doors the attacker put in. The fact that you can’t find any more may only mean you don’t know where to look, or that the system is so compromised that what you are seeing is not actually what is there.

The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications).

54 posted on 02/02/2009 2:07:08 PM PST by Knitebane
[ Post Reply | Private Reply | To 53 | View Replies]

To: Knitebane
The only way to clean a compromised system is to flatten and rebuild.

Depending on what you mean by compromised, I could agree. But all the machines I have any control over have up-to-date anti-virus, anti-spyware, and the latest patches. The internet is accessed through a hardware firewall with all incoming ports blocked.

The cases where I had to reinstall were not successfully infected. Basically the duel between the protective software and the attempt to install malware resulted in an unbootable machine.

55 posted on 02/02/2009 3:00:38 PM PST by js1138
[ Post Reply | Private Reply | To 54 | View Replies]

To: Knitebane
If you read the link you posted for him, all the "attacker" can do is run commands from the user's user space.

If the user isn't an Administrator, there isn't any remote rooting.

But that's true of any executable that a user downloads and runs within their user space - the executable can f*** with that user's files, but it can't touch the rest of the system.

56 posted on 02/02/2009 3:37:49 PM PST by KayEyeDoubleDee
[ Post Reply | Private Reply | To 39 | View Replies]

To: Swordmaker
Mohammad Akif, security and privacy lead at Microsoft Canada
57 posted on 02/02/2009 7:26:32 PM PST by PAR35
[ Post Reply | Private Reply | To 1 | View Replies]

To: KayEyeDoubleDee
If the user isn't an Administrator, there isn't any remote rooting.

Windows privilege escalation bugs are a dime a dozen. Here's the first one that came up on a search...

Privilege escalation vulnerability affects Windows Vista SP1, XP

That exploit, while not yet seen in the wild, was due to an inherent problem in all modern versions of Windows known as Token Kidnapping. It's a design flaw in Windows. It's not something that you can just patch, to fix it would require a complete re-design of the Windows architecture.

The gist of it is: Any user can make certain system calls that allow that unprivileged user to run processes as any other user, including the administrator.

Details here.

58 posted on 02/04/2009 8:37:49 AM PST by Knitebane
[ Post Reply | Private Reply | To 56 | View Replies]

To: js1138
But all the machines I have any control over have up-to-date anti-virus, anti-spyware, and the latest patches.

Matters not one bit.

Once a system has been compromised, unless you are running (and properly running) a file verification system like Tripwire, ALL files on the machine are now suspect.

Detection software only catches stuff that is well known. J. Random Attacker may not use well-known exploits. He might use a well-known trojan to install something he wrote, in which case all of your third-party software won't do a thing to detect it.

The internet is accessed through a hardware firewall with all incoming ports blocked.

How about outbound ports? Are you aware of how a bot net works?

The bot software gets installed on a machine. It can be by trojan or worm. The bot software sits there quietly and then contacts a server on the Internet. That's how it gets it's instructions. Many of them are spam bots. They download a list of addresses and spam messages and start sending spam out.

The bot gets controlled not by someone sending messages to the bot, but by the bot communicating outbound.

Unless you are blocking outbound traffic, and snooping the outbound traffic with an intrusion detection system, a firewall that only blocks inbound traffic does little to help.

Bottom line, once a machine has been infected you can never be sure you got everything. And much of the new malware isn't like the old stuff. It doesn't bother the user and it doesn't hog up your bandwidth. It's quiet and unobtrusive. It joins up with millions of its brothers and that's where the power comes from.

Just "cleaning" the systems is insufficient. And it's not just me saying that. Wipe and reinstall is industry best practice for a reason.

59 posted on 02/04/2009 9:03:35 AM PST by Knitebane
[ Post Reply | Private Reply | To 55 | View Replies]

To: Knitebane
How about outbound ports? Are you aware of how a bot net works?

My firewall logs outgoing traffic, and I read it occasionally.

60 posted on 02/04/2009 3:14:21 PM PST by js1138
[ Post Reply | Private Reply | To 59 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson