×

Loading...
Ad by
  • 推荐 OXIO 加拿大高速网络,最低月费仅$40. 使用推荐码 RCR37MB 可获得一个月的免费服务
Ad by
  • 推荐 OXIO 加拿大高速网络,最低月费仅$40. 使用推荐码 RCR37MB 可获得一个月的免费服务

@

it's a W32.Blaster.worm.

本文发表在 rolia.net 枫下论坛(forwarded content)

Last night a worm started to spread (MSBlaster) it infects vulnerable systems by randomly scanning IP subnets, after august 15 till the end of the year it will start a distributed DDOS attack on Windowsupdate.com. A message is placed in the registry:
I just want to say LOVE YOU SAN!!
billy gates why do you make this possible ? Stop making money and fix your software!!

It also starts a remote command session and listens to port 4444.

Due to random methods of the worm it may cause the infected computer to crash/ reboot, see pic form ComputerAssociates--->

Luckily this worm does not harm your system that much, it might fill up your network though.

Don't think if you have a firewall that you are safe and dont have to patch, a collegua laptop might be infected at home and is plugging it in your network now!

Read the below message from MS and follow the links to AV sites, for more details and removal instructions:

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

PSS Security Response Team Alert - New Virus: W32.Blaster.worm

SEVERITY: CRITICAL DATE: August 11, 2003

PRODUCTS AFFECTED: Windows XP, Windows 2000, Windows Server 2003, Windows NT 4.0, NT 4.0 Terminal Services Edition

WHAT IS IT?

The Microsoft Product Support Services Security Team is issuing this alert to inform customers about a new worm named W32.Blaster.Worm which is spreading in the wild. This virus is also known as: W32/Lovsan.worm (McAfee), WORM_MSBLAST.A (Trendmicro), Win32.Posa.Worm (Computer Associates). Best practices, such as applying security patch MS03-026 should prevent infection from this worm.

Customers that have previously applied the security patch MS03-026 before today are protected and no further action is required.

IMPACT OF ATTACK: Spread through open RPC ports. Customer's machine gets re-booted or has mblast.exe exists on customer's system.

TECHNICAL DETAILS: This worm scans a random IP range to look for vulnerable systems on TCP port 135. The worm attempts to exploit the DCOM RPC vulnerability patched by MS03-026.

Once the Exploit code is sent to a system, it downloads and executes the file MSBLAST.EXE from a remote system via TFTP. Once run, the worm creates the registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! bill

Symptoms of the virus: Some customer may not notice any symptoms at all. A typical symptom is the system is rebooting every few minutes without user input. Customers may also see:

- Presence of unusual TFTP* files

- Presence of the file msblast.exe in the WINDOWS SYSTEM32 directory

To detect this virus, search for msblast.exe in the WINDOWS SYSTEM32 directory or download the latest anti-virus software signature from your anti-virus vendor and scan your machine.

For additional details on this worm from anti-virus software vendors participating in the Microsoft Virus Information Alliance (VIA) please visit the following links:

Network Associates: http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=100547

Trend Micro: http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MSBLAST.A

Symantec: http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html

Computer Associates: http://www3.ca.com/virusinfo/virus.aspx?ID=36265

For more information on Microsoft’s Virus Information Alliance please visit this link: http://www.microsoft.com/technet/security/virus/via.asp


PREVENTION: Turn on Internet Connection Firewall (Windows XP or Windows Server 2003) or use a third party firewall to block TCP ports 135, 139, 445 and 593; TCP ports 135, 139, 445 and 593; also UDP 69 (TFTP) for zombie bits download and TCP 4444 for remote command shell. To enable the Internet Connection Firewall in Windows: http://support.microsoft.com/?id=283673

1. In Control Panel, double-click Networking and Internet Connections, and then click Network Connections.

2. Right-click the connection on which you would like to enable ICF, and then click Properties.

3. On the Advanced tab, click the box to select the option to Protect my computer or network.

This worm utilizes a previously-announced vulnerability as part of its infection method. Because of this, customers must ensure that their computers are patched for the vulnerability that is identified in Microsoft Security Bulletin MS03-026. http://www.microsoft.com/technet/security/bulletin/MS03-026.asp. Install the patch MS03-026 from Windows Update http://windowsupdate.microsoft.com

As always, please make sure to use the latest Anti-Virus detection from your Anti-Virus vendor to detect new viruses and their variants.

RECOVERY: Security best practices suggest that previously compromised machine be wiped and rebuilt to eliminate any undiscovered exploits that can lead to a future compromise. See Cert Advisory:

Steps for Recovering from a UNIX or NT System Compromise. http://www.cert.org/tech_tips/win-UNIX-system_compromise.html

For additional information on recovering from this attack please contact your preferred anti-virus vendor.

RELATED MICROSOFT SECURITY BULLETINS: http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

RELATED KB ARTICLES: http://support.microsoft.com/?kbid=826955

RELATED LINKS: http://www.microsoft.com/security/incident/blast.asp

As always please make sure to use the latest Anti-Virus detection from your Anti-Virus vendor to detect new viruses and their variants更多精彩文章及讨论,请光临枫下论坛 rolia.net
Report

Replies, comments and Discussions:

  • 工作学习 / IT杂谈 / XP刚才两次给关,说是RPC(remote process control)service被终止,是不是中什么毒啦?就今天才有,先没注意,下午用不了 XP了。请指点,谢。:)
    • ^
    • up! my friend has same problem
    • up! my friend has same problem
    • Up! lots of Rolian have the same problem.
    • 我今天开始也遇到同样的问题了,是不是盗版软件的关系?我把RPC的recovery属性改为"take no action", 关机倒是不关了,但还是有点担心。
      • My XP home is bind with Machine. Also have this problem.
      • Could you should me how you did? Thank you very much.
    • Could it be the new RPC DCOM worm?
    • I got the exactly same problem. Don't know how to do.
    • here is the solution. download the patch , install,it's ok. Good luck.
      http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-026.asp
      • note: I have to disconnect the internet , then install, restart. PLS choose the right patch(version). :-P
        • 没有中文版补丁?
    • 中毒了
      下午出现同样问题,删掉了一个叫 msb*.exe 的文件, 但RPC 还是会crash, 刚装了补丁,希望有用。
      • 补丁 works. :-P
        • Thanks. The patch works fine.
          • u r welcome. :-P
    • 我也遇到好几次了,能详细介绍怎么对付吗
    • it's a W32.Blaster.worm.
      本文发表在 rolia.net 枫下论坛(forwarded content)

      Last night a worm started to spread (MSBlaster) it infects vulnerable systems by randomly scanning IP subnets, after august 15 till the end of the year it will start a distributed DDOS attack on Windowsupdate.com. A message is placed in the registry:
      I just want to say LOVE YOU SAN!!
      billy gates why do you make this possible ? Stop making money and fix your software!!

      It also starts a remote command session and listens to port 4444.

      Due to random methods of the worm it may cause the infected computer to crash/ reboot, see pic form ComputerAssociates--->

      Luckily this worm does not harm your system that much, it might fill up your network though.

      Don't think if you have a firewall that you are safe and dont have to patch, a collegua laptop might be infected at home and is plugging it in your network now!

      Read the below message from MS and follow the links to AV sites, for more details and removal instructions:

      ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

      PSS Security Response Team Alert - New Virus: W32.Blaster.worm

      SEVERITY: CRITICAL DATE: August 11, 2003

      PRODUCTS AFFECTED: Windows XP, Windows 2000, Windows Server 2003, Windows NT 4.0, NT 4.0 Terminal Services Edition

      WHAT IS IT?

      The Microsoft Product Support Services Security Team is issuing this alert to inform customers about a new worm named W32.Blaster.Worm which is spreading in the wild. This virus is also known as: W32/Lovsan.worm (McAfee), WORM_MSBLAST.A (Trendmicro), Win32.Posa.Worm (Computer Associates). Best practices, such as applying security patch MS03-026 should prevent infection from this worm.

      Customers that have previously applied the security patch MS03-026 before today are protected and no further action is required.

      IMPACT OF ATTACK: Spread through open RPC ports. Customer's machine gets re-booted or has mblast.exe exists on customer's system.

      TECHNICAL DETAILS: This worm scans a random IP range to look for vulnerable systems on TCP port 135. The worm attempts to exploit the DCOM RPC vulnerability patched by MS03-026.

      Once the Exploit code is sent to a system, it downloads and executes the file MSBLAST.EXE from a remote system via TFTP. Once run, the worm creates the registry key:

      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! bill

      Symptoms of the virus: Some customer may not notice any symptoms at all. A typical symptom is the system is rebooting every few minutes without user input. Customers may also see:

      - Presence of unusual TFTP* files

      - Presence of the file msblast.exe in the WINDOWS SYSTEM32 directory

      To detect this virus, search for msblast.exe in the WINDOWS SYSTEM32 directory or download the latest anti-virus software signature from your anti-virus vendor and scan your machine.

      For additional details on this worm from anti-virus software vendors participating in the Microsoft Virus Information Alliance (VIA) please visit the following links:

      Network Associates: http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=100547

      Trend Micro: http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MSBLAST.A

      Symantec: http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html

      Computer Associates: http://www3.ca.com/virusinfo/virus.aspx?ID=36265

      For more information on Microsoft’s Virus Information Alliance please visit this link: http://www.microsoft.com/technet/security/virus/via.asp


      PREVENTION: Turn on Internet Connection Firewall (Windows XP or Windows Server 2003) or use a third party firewall to block TCP ports 135, 139, 445 and 593; TCP ports 135, 139, 445 and 593; also UDP 69 (TFTP) for zombie bits download and TCP 4444 for remote command shell. To enable the Internet Connection Firewall in Windows: http://support.microsoft.com/?id=283673

      1. In Control Panel, double-click Networking and Internet Connections, and then click Network Connections.

      2. Right-click the connection on which you would like to enable ICF, and then click Properties.

      3. On the Advanced tab, click the box to select the option to Protect my computer or network.

      This worm utilizes a previously-announced vulnerability as part of its infection method. Because of this, customers must ensure that their computers are patched for the vulnerability that is identified in Microsoft Security Bulletin MS03-026. http://www.microsoft.com/technet/security/bulletin/MS03-026.asp. Install the patch MS03-026 from Windows Update http://windowsupdate.microsoft.com

      As always, please make sure to use the latest Anti-Virus detection from your Anti-Virus vendor to detect new viruses and their variants.

      RECOVERY: Security best practices suggest that previously compromised machine be wiped and rebuilt to eliminate any undiscovered exploits that can lead to a future compromise. See Cert Advisory:

      Steps for Recovering from a UNIX or NT System Compromise. http://www.cert.org/tech_tips/win-UNIX-system_compromise.html

      For additional information on recovering from this attack please contact your preferred anti-virus vendor.

      RELATED MICROSOFT SECURITY BULLETINS: http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

      RELATED KB ARTICLES: http://support.microsoft.com/?kbid=826955

      RELATED LINKS: http://www.microsoft.com/security/incident/blast.asp

      As always please make sure to use the latest Anti-Virus detection from your Anti-Virus vendor to detect new viruses and their variants更多精彩文章及讨论,请光临枫下论坛 rolia.net
    • 真懒啊!不会查查旧贴吗?#1327981。 不过很哼哼mm能自力更生找到答案还是有才气的。不介意的话发一份简历给我,看看我能不能帮你。
      • 谢夸奖,才气不多,运气不好,上次sql也遭遇了,所以,倒霉经验吧。
        rolia信箱不能发附件,偶先发个mail给你。
        谢谢。
        • 给你回了。收到了吗?
          • 没有收到啊,55555555555~~~~~~~~~~~
    • 详情见此贴:#1330201,希望能各位有帮助!
      • 我的XP是不能更新补丁的,上次更新后,要激活的。这次难道就不要激活的吗?有点怕。D版的,都不要更新或打什么补丁。供参考.
        • 我也有同样的顾虑,到底可不可以download this patch呢?
          • NO!