Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

New Worm Installs Patches - new worm takes trys to repair systems infected by Blaster Worm
CRN ^ | 08/18/03 | Marcia Savage

Posted on 8/18/2003, 9:02:56 PM by bedolido

A new worm takes a different twist by trying to repair systems infected by Blaster and patch the vulnerability it exploits, antivirus vendors said Monday.

The worm, called Nachi or MSBlast.D, tries to delete Blaster from some infected systems and install patches, according to Trend Micro. Last week's Blaster worm, also called MSBlast and Lovsan, infected hundreds of thousands of systems by exploiting a Remote Procedure Call (RPC) flaw in Microsoft Windows.

Nachi exploits the same flaw but can delete the MSBlast.exe file left by Blaster on machines running Windows 2000 and Windows XP and download Microsoft patches to fix the flaw, according to Trend Micro.

The company rated the new worm as a medium risk. Computer Associates ranked the worm as medium-on-watch, while Network Associates called it a medium risk.

"Some may call this a good virus, but it can cause all sorts of problems when patches are applied to a computer unbeknownst to the administrator of that computer," said Ken Dunham, malicious code intelligence manager at iDefense, said in an alert issued Monday.


TOPICS: Culture/Society; Miscellaneous; News/Current Events
KEYWORDS: blaster; infected; installs; new; patches; repair; systems; worm
Navigation: use the links below to view more comments.
first 1-2021-22 next last

1 posted on 8/18/2003, 9:02:57 PM by bedolido
[ Post Reply | Private Reply | View Replies]

To: bedolido
How bad does it have to get before even the worm writers take pity on you?
2 posted on 8/18/2003, 9:05:17 PM by Knitebane
[ Post Reply | Private Reply | To 1 | View Replies]

To: bedolido
I hope it works.

I'm getting 300 - 400 attempts on my port 135 in an hour!
I guess it's worse for those with broadband.

3 posted on 8/18/2003, 9:07:46 PM by mrsmith
[ Post Reply | Private Reply | To 1 | View Replies]

To: Knitebane
How bad does it have to get before even the worm writers take pity on you?

I tried to rewrite the title line and forgot to proff read it...lol. I hope he takes pity on me asap.

4 posted on 8/18/2003, 9:08:17 PM by bedolido (None of us is as dumb as all of us!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: bedolido
Some may call this a good virus, but . . .

Right! Whoever wrote this one . . . Thanks, but no thanks. I don't want 50,000 good viruses on my computer doing battle with 50,000 bad viruses.

5 posted on 8/18/2003, 9:10:42 PM by LibWhacker
[ Post Reply | Private Reply | To 1 | View Replies]

To: bedolido
Interesting. I just saw this flit by on some IT site.

Do you think this might be a (gasp!) creative thought about healing/resolving virus issues? Personally, I think this is the only way to do it.

If you have a bad virus, you send out a "good" virus to track it down.

One of the problems is that our network has a ton of individual users who never update anything and have absolutely no protection against viruses, data theft, you name it. We also have many cheap corporate users who simply don't understand the need to be on top of these things.

Maybe a "repair" virus could be a real solution. If you don't want it (or the thing it's repairing), then protect your system. Otherwise, get repaired.

I do hope they put up a help site for computer professionals who are going to need who to assist people/companies with strangely configured systems who may be put out of operation by the repair, though.
6 posted on 8/18/2003, 9:12:45 PM by livius
[ Post Reply | Private Reply | To 1 | View Replies]

To: bedolido
...takes a different twist by trying to repair systems infected by Blaster and patch the vulnerability it exploits

Does it succeed? If so, how often?

7 posted on 8/18/2003, 9:14:45 PM by freedomcrusader
[ Post Reply | Private Reply | To 1 | View Replies]

To: bedolido
Oh, and could this be the guilty conscience of the person who authored the Blaster worm in the first place?
8 posted on 8/18/2003, 9:15:28 PM by freedomcrusader
[ Post Reply | Private Reply | To 1 | View Replies]

To: mrsmith
I'm getting 300 - 400 attempts on my port 135 in an hour! I guess it's worse for those with broadband.

Definitely. I have used ISDN at work from 1997 to 2000, and DSL from summer 2000 till the present. anyone with a broadband internet connection is a prime target for hackers. You need to get a firewall like Zone Alarm (Zone Alarm is free for personal use) or Norton Firewall or a router with built in firewall. One big advantage for people who connect to the internet via broadband is that the virus updates, operating system patches, and service packs are much easier and quicker to download.

9 posted on 8/18/2003, 9:16:49 PM by Paleo Conservative (Do not remove this tag under penalty of law.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: mrsmith
I'm getting 300 - 400 attempts on my port 135 in an hour! I guess it's worse for those with broadband.

Definitely. I have used ISDN at work from 1997 to 2000, and DSL from summer 2000 till the present. anyone with a broadband internet connection is a prime target for hackers. You need to get a firewall like Zone Alarm (Zone Alarm is free for personal use) or Norton Firewall or a router with built in firewall. One big advantage for people who connect to the internet via broadband is that the virus updates, operating system patches, and service packs are much easier and quicker to download.

10 posted on 8/18/2003, 9:17:29 PM by Paleo Conservative (Do not remove this tag under penalty of law.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: freedomcrusader
More likely a desperate attempt by Microsoft to limit the damage.
11 posted on 8/18/2003, 9:18:08 PM by thoughtomator (Are we conservatives, or are we Republicans?)
[ Post Reply | Private Reply | To 8 | View Replies]

To: mrsmith
I'm getting 300 - 400 attempts on my port 135 in an hour! I guess it's worse for those with broadband.

Definitely. I have used ISDN at work from 1997 to 2000, and DSL from summer 2000 till the present. anyone with a broadband internet connection is a prime target for hackers. You need to get a firewall like Zone Alarm (Zone Alarm is free for personal use) or Norton Firewall or a router with built in firewall. One big advantage for people who connect to the internet via broadband is that the virus updates, operating system patches, and service packs are much easier and quicker to download.

12 posted on 8/18/2003, 9:18:56 PM by Paleo Conservative (Do not remove this tag under penalty of law.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Paleo Conservative
I have zonealarm on my dial-up. That's how I know I'm getting all these attempts.
13 posted on 8/18/2003, 9:21:59 PM by mrsmith
[ Post Reply | Private Reply | To 12 | View Replies]

To: mrsmith
My girlfriend is getting hit a similar rate with her dial up as you are. On my T1, Zone Alarm has only logged 6 attempts since this thing started last week.
14 posted on 8/18/2003, 9:24:33 PM by Flying Circus (orthodoxy requires orthopraxy)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Liz
Ping.
15 posted on 8/18/2003, 9:30:01 PM by Graewoulf
[ Post Reply | Private Reply | To 1 | View Replies]

To: Graewoulf
Did you get hit?
16 posted on 8/18/2003, 10:00:56 PM by Liz
[ Post Reply | Private Reply | To 15 | View Replies]

To: mrsmith
I guess it's worse for those with broadband.

It's not a s bad as you think. I just installed ADSL last week. With Zone alarm installed you can block and then report the attempted port scan in minutes. They will diminish in frequency as you report them, most are from the same source.

Here's a good tip, I need to pass on to MicroSoft, maybe other FR users have noticed it. CFS III, Combat Flight Simulator is infected with something that the MS patches can not fix. The first symptom is many port scans while this software is running. The other symptom is replacement of the left hand airspeed indicator, with a redundant climb meter.

17 posted on 8/18/2003, 10:09:43 PM by SSN558 (Be on the lookout for Black White-Supremacists)
[ Post Reply | Private Reply | To 3 | View Replies]

To: mrsmith
"I'm getting 300 - 400 attempts on my port 135 in an hour!"

I haven't gotten any in days. This wouldn't have been possible if MS weren't so sloppy with their code, let every country in the Western Hemisphere study the code for their Server 2000 software and put out oly a tiny, limp wristed link tot he patch on their site. This has happened with MS before. They DO NOT go out of their way to notify users of a security hole. The best plse to get these warnings is the FBI.

I spent two solid days last week helping almost hyysterical users get the thing out of their system.

Note to MS users: download updates regularly! Not once...but once a MONTH. Run anti-virus software and keep your virus defs updated! Use a good, personal firwall!

18 posted on 8/18/2003, 10:52:03 PM by cake_crumb (UN Resolutions = Very Expensive, Very SCRATCHY Toilet Paper)
[ Post Reply | Private Reply | To 3 | View Replies]

To: cake_crumb
Uh...make that EASTERN hemisphere.
19 posted on 8/18/2003, 10:57:37 PM by cake_crumb (UN Resolutions = Very Expensive, Very SCRATCHY Toilet Paper)
[ Post Reply | Private Reply | To 18 | View Replies]

To: SSN558
Well how do I report them?

I would like to tell them they have the worm.

I can "whois" them, but AFAIK there isn't any way for a dial-up like me to contact them.

20 posted on 8/18/2003, 11:00:27 PM by mrsmith
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-22 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson