Protect your corporate IT network from hackers and other unwanted intruders with Proxy Sentinel™. Click here for all the details and get the peace of mind you deserve.
Back to our Homepage Proxy Sentinel™ high performance Internet proxy server and secure firewall solution Firewall Sentinel™ secure & powerful Internet firewall solution About Internet Security.ca and GCIS Frequently Asked Questions on Internet security issues Internet Security Industry News - Stay informed of what's happening Contact Internet Security.ca today and order your Proxy Sentinel™ or Firewall Sentinel™ server now!

Internet Security Industry News

Blaster worm attack a real bust

Save your company's valuable data with Proxy Sentinel™ from Internet Security. Click here for all the details.

August 17, 2003

A scheduled denial of service attack against Microsoft's main software update website did not materialise on Saturday, as computers infected with the W32.Blaster worm failed to find their target.

Blaster first appeared on Monday last week and quickly spread to computers worldwide by exploiting a known security vulnerability in Microsoft's Windows operating system. By Friday, the worm, which targets a Windows component for handling RPC (Remote Procedure Call) protocol traffic called the Distributed Component Object Model (DCOM) interface, spread to more than 423,000 systems, according to Oliver Friedrichs of Symantec.

In addition to infecting vulnerable Windows machines, Blaster worm was programmed to launch a denial of service (DOS) attack against windowsupdate.com, an internet domain owned by Microsoft and used to distribute software updates to Windows customers beginning on Saturday. However, an error in Blaster's design combined with last minute actions by Microsoft to change the registration of windowsupdate.com cut short that attack.

Blaster's author provided the incorrect domain address for windowsupdate. The address specified in the worm's code, windowsupdate.com, simply forwards users to the actual Windows update site, windowsupdate.microsoft.com, according to Mikko Hyppönen, head of antivirus research at F-Secure in Helsinki. On Thursday, Microsoft delisted the windowsupdate.com domain name, calling it a "nonessential address."

That solution also removed the threat of collateral damage from the attack, because requests for windowsupdate.com would never leave infected machines, slowing down the internet, according to Sean Sundwall, a Microsoft spokesman. On Saturday, Microsoft didn't detect any irregular network activity associated with the Blaster worm, Sundwall said.

The SANS Institute's Internet Storm Center reported on Saturday that the DOS attack anticipated from Blaster had been avoided. The number of Blaster infections is also down more than 80% since the worm's peak last Monday, indicating that vulnerable computers are being cleaned and patched by their owners, Friedrichs says.

Symantec expects that trend to continue, he says. In time, Blaster will join predecessors like the Code Red and NIMDA worms, inhabiting a small population of infected machines that pose a risk to new, unpatched systems, but not spreading much beyond that, he says. For Microsoft, the Blaster worm outbreak stoked internal efforts to shore up vulnerable services.

Even though Blaster missed its target, future worms might be smarter, faster and more destructive, Friedrichs says. Microsoft is using the occasion to take "a number of steps" to protect valuable customer services such as the windowsupdate.microsoft.com website from attack, Sundwall says.

He declined to provide details of what changes the company is making. Microsoft is also using the Blaster outbreak as an impetus to improve communication with consumers about the need to patch regularly, Sundwall says.

"We learn from every worm out there. What we learned from [Blaster] is that there aren't enough consumers who installed the patch and use [Windows] autoupdate," he says. Microsoft customers should expect a concerted effort by the Redmond, Washington company to reach out in coming weeks and raise awareness of the need to patch vulnerable systems, he says.

Article by Paul Roberts
Source: Computer World


Save Internet Security.ca's URL to the list of your favorite web sites
in your Web browser by clicking here.

Back to the top of the page.         
Click here to order your Proxy Sentinel™ Internet security server today!

Proxy Sentinel™ is the most secure Internet proxy server on the market today. Click here for more information.

You can link to the Internet Security web site as much as you like. Read our section on how your company can participate in our reciprocal link exchange program and increase your rankings in the major search engines such as
Google and all the others.

Site optimized by Pagina+™
Powered by Sun Hosting
Development platform by My Web Services
Internet Security.ca is a fully-owned subsidiary of GCIS
Internet Security.ca is listed in
Global Business Listing

| Home | Proxy Sentinel™ | Firewall Sentinel™ | FAQ | News | Sitemap | Contact |
Copyright © Internet Security.ca 2003    Terms of use    Privacy agreement    Legal disclaimer