There are now TWO variants of the 'worm'

KMA

Registered User
Forum Member
May 25, 2003
745
2
0
I spent a whole another day talking to people about their blaster worm issues and helping them to get their computers working again. I will do it all over again today. I'm so relieved and happy to know that people are starting to relax and be patient. Everyone seems to understand they're not the only one with this problem, and therefore hold times aren't getting them too stressed. I've been refunding anyone who calls and has the virus. Mostly just for customer satisfaction purposes. But most of them are just grateful to get a human being on the other end to help them.

Did you know that there are now two (at least two, anyway) variants of the worm?

Here's what I found. If you want this worm off of your machine and you don't want it back, it's pretty freakin' simple. These steps are not any big surprise, and they're also not rocket science.

1. Run the fixblast.exe utility found at Symantec's website. If you have MORE than one virus at present, run the Stinger utility at McAfee's site. It should get rid of Blaster (although they call it lovsan) plus a bunch of other virii.

2. Install a firewall (the free version of ZoneAlarm works just fine.)

3. Patch your machine (get all the critical updates available to you at the Windows Update site that are related to security after making sure you have the most recent service pack installed. Make ABSOLUTELY SURE to disable your antivirus software AFTER downloading the service packs & security updates, and before installing them. Upon rebooting your AV will start again).

4. Make sure you're not running IIS unless you NEED to be. (that has nothing to do with THIS particular worm, just good practice. Lots of people install everything with 'custom settings' and install every last thing they can. That's dangerous when you don't know what all those 'optional networking components' actually do.)

5. Keep your antivirus .dat files up-to-date. If you don't renew your 'live update' subscription, then you may as well not be running antivirus at all, because antivirus software is only as good as its most recent .dat file.

6. Run Ad-Aware (or SpybotS&D or whatever) at least once a week. With Ad-Aware, make SURE you've got the 6.181 engine installed. If you don't remove it from your machine, go to lavasoftusa.com and download it from MajorGeeks. EVERY time you run it, before you start, click on 'check for updates' and install them. Because just like AV software, your spyware-fighting software is ALSO only as good as it's latest updates.

I've been reading people blaming Microsoft and Antivirus companies for this debacle. Well here's me telling you this: The person to blame is the asshole who wrote the worm's code. Microsoft and Antivirus companies are not to blame. You're not to blame. The person out there who released this malicious code is. The sooner we all wrap our (sometimes closed) minds around that, the sooner we'll start focusing on legislation to try to stop these people. If you waste time putting the blame in the wrong place, the one guilty party sits back and laughs while he SHOULD be sweating in fear.


I would add that there is no way to know what might have been done to your system while it was vulnerable. Our security officer thinks more has been done by these worms than is being reported. He's seen certain anomalies about how some computers were exploited. He suspects, and others in the IT world agree, that other ports have been used, but not documented in existing reports on the exploit.


Good Luck!!
 

Stuman

Banned
Forum Member
Nov 5, 2002
800
0
0
Memphrica, Tennessee
Thanks for the info KMA!! :clap: Who do you do support for? Are you one of those guys who takes my $245 whenever I call Microsoft IT Pro support? lol :D

Stuman
 

KMA

Registered User
Forum Member
May 25, 2003
745
2
0
Through the net, via your port:
IMPACT OF ATTACK:

Spread through open RPC ports. Customer's machine gets re-booted or the file "msblast.exe" exists on customer's system.

TECHNICAL DETAILS:

This worm scans a random IP range to look for vulnerable systems on TCP port 135. The worm attempts to exploit the DCOM RPC vulnerability patched by MS03-026.

Once the Exploit code is sent to a system, it downloads and executes the file MSBLAST.EXE from a remote system via TFTP. Once run, the worm creates the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! bill

Symptoms of the virus: Some customers may not notice any symptoms at all. A typical symptom is the system is rebooting every few minutes without user input. Customers may also see:

- Presence of unusual TFTP* files
- Presence of the file msblast.exe in the WINDOWS SYSTEM32 directory

To detect this virus, search for msblast.exe in the WINDOWS SYSTEM32 directory or download the latest anti-virus software signature from your anti-virus vendor and scan your machine.

For additional information on recovering from this attack please contact your preferred anti-virus vendor.
 

KMA

Registered User
Forum Member
May 25, 2003
745
2
0
Easy layman's terms for removing the worm-virus:
"Steps for removing the virus":

1. Unplug modem

2. Go to Start, Find/Search, Files and Folders

3. ?Look in? should be set to C: Drive

4. Search for MSBLAST.exe

5. Right click on files or folders found and delete

6. Plug modem back in

7. Reboot computer

8. Immediately download patch from http://windowsupdate.microsoft.com
 
Bet on MyBookie
Top