Technical Background
Win32/Conficker.B exploits a vulnerability in the Windows Server service (SVCHOST.EXE) for Windows 2000, Windows XP, Windows Vista, Windows Server 2003, and Windows 2008. While Microsoft addressed this issue in October with Microsoft Security Bulletin MS08-067, and Forefront antivirus and OneCare (as well as other vendor’s anti-virus products) helped protect against infections, many systems that have not been patched manually through Server Update Services and Microsoft/Windows Update or through Automatic Updates have recently come under attack by this worm. Attacked systems may lock out users, disable our update services and block access to security-related Web sites:
In response to this threat, Microsoft has:
- Updated the January version of the Malicious Software Removal Tool (MSRT) to detect and remove variants of Win32/Conficker.B. You can download this version from the MSRT from either the Microsoft Update site or through its associated Knowledge Base article.
- Created the KB article 962007 “Virus alert about the Win32/Conficker.B worm” to provide public details on the symptoms and removal methods available to address this issue.
- Announced the release of the items and the virus threat itself on the Microsoft Malware Protection Center blog.
Fellow MVP Harry Waldron has provided some excellent coverage of this worm. The figures are quite scary because this is not the easiest infection to remove. See Harry's recent posts on this worm:
- Conficker Worm - F-Secure estimates almost 9 million infections
- AVERT Labs - Conficker Worm using Metasploit payload to spread
- MS08-067 Worm Dangers - 33% of Windows users have not applied patch
- MS08-067 Worm Dangers - New Conficker variants manipulate AUTORUN.INF
References:
Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...
No comments:
Post a Comment
Neither spam nor comments containing vulgarities will be approved.