Windows worm january 2009




















In living memory eh? Yet another Windows worm. Will they ever learn? Living in a box. The open world of yesterday. Pain Management. Child protection. Karoo - A shot in the arm. A nice, gentle walk. Guilt by name association. Oh stop it! A 2 Web 25 World 20 Youth In the end. Nothing matters. As we all trundle through our daily life's as we do every single day whilst we are alive. The world will still turn. Your loved ones will still love you until they leave, if they leave and some will and do.

The Government will still screw you. Nobody cares about your daily life other than yourself and those who you come into contact with and those who say they love you and you them. This attack has been more widespread on corporate networks because companies did not have the patch installed in time. This could have been caused by any number of reasons. For instance an IT Department may have been short handed or have workload related issues preventing the patch from being installed in a timely manner.

Microsoft did a good job in having home computers updated with the patch but corporate networks are still being infected. This worm is very sophisticated because it exploits multiple secure flaws in Microsoft's Windows OS's. The worm starts by injecting itself into one of Microsoft's common system process, services.

From there it creates a new random five letter DLL file in the Windows system folder. The Windows registry is then edited to make reference to the DLL file and runs when the computer is restarted.

Once the worm is in the computer system, it creates an HTTP server and proceeds to download malware from the hacker's websites. System restore has been wiped clean and reset on the computer making it impossible to restore your system prior to the infection.

Each day there are hundreds of dummy domain names being generated by an algorithm coded in the worm but only one site is the actual malware site. With this trickery employed, it makes it very difficult to find what is being installed each day.

This worm spreads mainly through corporate networks. An infected computer will scan the network for other computers and gain access through the Windows secure flaw. Even though a password is needed to gain access to other computers, it will guess short passwords by brute force method thereby gaining access to those computers.

The only way to stop this worm is by applying Microsoft's patch MS before computer networks get infected. Use this form if you have come across a typo, inaccuracy or would like to send an edit request for the content on this page.

For general inquiries, please use our contact form. For general feedback, use the public comments section below please adhere to guidelines. Best Apple iPad deals available right now: January Best keyboard Because you deserve better. The painful shame of owning an Android phone. You agree to receive updates, promotions, and alerts from ZDNet. You may unsubscribe at any time. By signing up, you agree to receive the selected newsletter s which you may unsubscribe from at any time.

You also agree to the Terms of Use and acknowledge the data collection and usage practices outlined in our Privacy Policy. That worm, called Nimda, nevertheless did serious damage. Since then, the length of time between patches appearing — which hackers can use to "reverse engineer" a piece of malware that will attack the weakness — has shortened, until the latest patch appeared on the same day that an "exploit" against it was found online.

Windows virus infects 9m computers. Topics Data and computer security Computing Internet Viruses. Reuse this content.



0コメント

  • 1000 / 1000