Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Windows Operating Systems Software

Win32 Blaster Worm is on the Rise 1251

EvilNight writes "You know you've got it when a 60 second shutdown timer pops up on your screen. The virus uses the RPC vulnerability. It looks like it's reaching critical mass today. Luckily, it's an easy one to stop: Download this security update. Once you've installed that patch, go here and download the removal tool." Update: 08/12 19:19 GMT by M : Security bulletin URL corrected.
This discussion has been archived. No new comments can be posted.

Win32 Blaster Worm is on the Rise

Comments Filter:
  • Honest question (Score:5, Insightful)

    by lseltzer ( 311306 ) on Tuesday August 12, 2003 @10:09AM (#6674806)
    Dear all of you who are being hit by this attack:

    Why hadn't you applied the patch before? It was released 7/16 and nothing has had this level of publicity before.
  • by Overly Critical Guy ( 663429 ) on Tuesday August 12, 2003 @10:11AM (#6674842)
    Please. I still remember when my system got hosed by a sendmail hole.
  • Risky business (Score:2, Insightful)

    by Doesn't_Comment_Code ( 692510 ) on Tuesday August 12, 2003 @10:11AM (#6674852)
    I had to patch several computers at work, and I noticed that the patch installer software says something at the beginning like,
    "Back up all your harddrives, we are not responsible if this program breaks your entire computer. Do you Accept?"

    Well in the middle of a virus scare, nobody has time to back up every machine in the office. So that really doesn't make me feel comfortable. So far, so good though. No broken computers as of yet.

    But another scary thought that crossed my mind while installing the patch... What if those smooth criminals had gotten into the microsoft servers and put a virus into that patch installer? That would be a killer!

    If you need to use Windows, you might as well use win98.
  • Re:shutdown /a (Score:1, Insightful)

    by Eric Ass Raymond ( 662593 ) on Tuesday August 12, 2003 @10:15AM (#6674891) Journal
    The box wouldn't stay up long enough for him to install the patches :P

    Uh... why didn't he just unplug the net cable and install the patches?

    I mean that's how you're supposed to setup any operating system. No net connection until you've got all the necessary patches installed and firewalls set up. Don't give them even the smallest window of opportunity.

  • Re:shutdown /a (Score:3, Insightful)

    by mjmalone ( 677326 ) * on Tuesday August 12, 2003 @10:17AM (#6674915) Homepage
    He was connecting to it remotely. Also, it's hard to download patches when you aren't connected to the net.
  • by Basje ( 26968 ) <bas@bloemsaat.org> on Tuesday August 12, 2003 @10:19AM (#6674941) Homepage
    RTL Z (national television, all day business news), the Netherlands, this afternoon:

    It was said that if you valued security, Microsoft wasn't the best solution. You'd be better off with Apple or Linux.

    This could very well be a (another) turning point for linux. Of course, by the time something like this happens to Linux, everybody is going to run the other way again, but it could give OS some inroads.
  • Precisely (Score:5, Insightful)

    by Overly Critical Guy ( 663429 ) on Tuesday August 12, 2003 @10:21AM (#6674964)
    There was even a Slashdot article about the exploit. It was such a big deal because it was the first and only vulnerability for Windows Server 2003 so far.

    All these people sarcastically saying to "patch with Linux" or "use the firewall" are missing the point that the smart people downloaded the 1.2MB patch last month and had no idea anything was going on until we read about the worm on Slashdot. My entire work network was unscathed, because they're all kept completely up to date. I can't think of any reason why someone shouldn't be doing the same to their Windows network, except for arcane Slashbot conspiracy theories or just plain needing to hate Microsoft for something, anything.

    If this was a Linux worm, people would be telling everyone else that they should have patched to the latest versions of whatever. But, it's Windows, so it won't exactly happen that way...
  • Re:shutdown /a (Score:5, Insightful)

    by Tony Hoyle ( 11698 ) <tmh@nodomain.org> on Tuesday August 12, 2003 @10:21AM (#6674965) Homepage
    Rule 1: The first thing you do when putting any system on the net is make sure it's behind a firewall.
    Rule 2: See rule 1. Then do it.

    FFS it's not as if it's attacking via port 80... No properly administered system should ever get this. Home users, maybe but businesses????
  • by aug24 ( 38229 ) on Tuesday August 12, 2003 @10:21AM (#6674970) Homepage
    Have you met many people who are MS sysadmins? A good proportion of those that I have met are Joe User types who have knowledge of how to set up, auto-reboot and backup machines, and not a lot more.

    Windows is easier to pick up, but just as hard, possibly harder, to maintain than *nix. So you get less-trained or less-capable or whatever people who are employed doing this, who look fine on the day-to-day, but who are damn-near useless at the harder stuff like security - which should, of course, be the day to day.

    Combine that with the sheer number of sever and critical patches MS expects you to apply, each of which must go through regression testing before deployment, and you can see why sticking the ol' head in the sand looks appealing...

    J.

  • Also....... (Score:3, Insightful)

    by JaJ_D ( 652372 ) on Tuesday August 12, 2003 @10:26AM (#6675004)
    According to the Beeb [bbc.co.uk] and their article [bbc.co.uk] once on a "...machine the malicious program also launches an attack against the Microsoft site that holds a software patch that keeps the worm out."

    Nice twist of fate

    Jaj
  • Re:In addition... (Score:3, Insightful)

    by iworm ( 132527 ) on Tuesday August 12, 2003 @10:26AM (#6675005)
    Yup! I know it is fun to bash MS (and generally easy) but XP has a quite decent firewall built-in, if only people would turn the damn thing on!!

    I think that it would be sensible to have it enabled by default, but obviously Microsoft think otherwise. And yer-average punter won't even know what it is, let alone enable it. Shame, 'cos it works OK.
  • by OpenYourEyes ( 563714 ) on Tuesday August 12, 2003 @10:27AM (#6675023)

    I've been trying to get relatives to fix the Windows DCOM security hole. At least two so far have said "oh! I didn't realize that was a security problem!" They thought the RPC service failing and causing a machine reboot was your everyday "bug", and since it just rebooted the machine (and even gave you 60 seconds to finish up what you were doing!), that it wasn't a big deal.

    I think the 60 second thing is seen as a feature - along the lines of "see! Windows knows when its going to crash and lets you save your work first. Like the computer on Star Trek telling you how many seconds until there is a hull breach."

    All of them heard the news about a security problem. None of them connected it with the problems they were having.

    Finally, to make matters worse, Microsoft's page talks about patching the system, but says nothing about removing the worm. This is problematic since, as noted above, it can sometimes be pretty hard to download the patch if your computer wants to reboot in the middle of the download.

  • by mizidymizark ( 669232 ) on Tuesday August 12, 2003 @10:31AM (#6675057) Homepage
    I know this is Slashdot and all the Linux users need their daily affirmation that they are right, but guys, lay off the common user. To expect someone over dialup to have Windows XP patched with the 200 MB of updates since XP came out is rather harsh. I know this hits more broadband users, but working in tech support, we have seen a fair amount of dialup users get hit as well. So before telling the everyday user to switch to Linux for their home machine, maybe we should get Microsoft to check their product for problems before shipping it out.
  • Re:Coincidence (Score:1, Insightful)

    by Anonymous Coward on Tuesday August 12, 2003 @10:36AM (#6675098)
    The moderation of the parent post as "flamebait" is beyond belief. The information on traffic is informative, the comments on fixing it is simply insightful, anyone who doesn't agree obviously hasn't been doing "community service" already, fixing up numerous people's machines because they can't fix it themselves.
  • Re:Honest question (Score:5, Insightful)

    by caluml ( 551744 ) <slashdot@spamgoe ... minus herbivore> on Tuesday August 12, 2003 @10:36AM (#6675107) Homepage
    Why aren't you blocking stupid useless open ports from the Internet?

    Most people:
    What's a port?
    Do I have any?
    How can I check?

  • by Tyler Eaves ( 344284 ) on Tuesday August 12, 2003 @10:37AM (#6675109)
    2 "windows" holes versus 9 "linux" holes?

    How many of those Linux holes where in the core operating system (IE, kernel + GNU tools)? I'm willing to bet zero.

    Does windows still have 2 holes once you factor in Exchage, Outlook Express, IIS, IE, Office, SQL Server etc?
  • by Anonymous Coward on Tuesday August 12, 2003 @10:37AM (#6675121)
    Welcome to the corporate world. All things, including service packs, must be tested on all platforms with all applications before being deployed into the environment.

    We don't have a couple dozen windows boxes. We have a couple hundred thousand. Patching is *painful*. We're not talking purely servers that are affected--standard workstations. Servers get patches at a much faster rate than the user desktops.

    Even after the 4-6 months goes by and the patches get the official blessing for end-user install, users don't like watching the service packs run for half an hour when they login. Besides, who trusts the users to sit around and let them install without playing with stuff.

    So....We filter internal site connections to try and contain infections, and work as quickly as possible to mitigate the risks of downtime for system updates vs. the risk of collateral damage (outages) caused by Microsoft's weak code and security practices (AKA bug).

    After two years, we're almost done with the Windows2000 conversion, but Microsoft has already been pushing for immediate XP deployment for a year...

    Why aren't they all patched? Because nothing moves fast in large installation bases.
  • by aug24 ( 38229 ) on Tuesday August 12, 2003 @10:38AM (#6675128) Homepage
    I honestly didn't mean that to sound MS bashing - that's just my analysis. It's no excuse, but lots of companies do employ unskilled-ish people to admin their Windows machines, cos they can do the basics.

    Anyway: Linux had nine? Bollocks. I'm sure various packages associated with Open Source had vulnerabilities, but the kernel? No. Prove me wrong.

    J.

  • Re:Echoes (Score:1, Insightful)

    by Anonymous Coward on Tuesday August 12, 2003 @10:39AM (#6675144)
    Yes. Encouraging millions of users to click a link and then install something on their computer by spamming them all is definitely the way forward..
  • by doon ( 23278 ) on Tuesday August 12, 2003 @10:41AM (#6675168) Homepage
    Ahh that is why I have the firewall in front of the wife's machine. So she can't turn it off. :)
  • Re:shutdown /a (Score:3, Insightful)

    by Eric Ass Raymond ( 662593 ) on Tuesday August 12, 2003 @10:45AM (#6675207) Journal
    Smart-alec. It is evident that you do not administer anything complex..

    Ever thought that's it's good practise to burn Service Packs and any critical patches on a CD-RW as they come by using an already secured computer? Then you don't have to expose your new setup? I know it's folly to trust the default Windows installation and don't fool yourself into thinking that a common distribution like RedHat 8/9 is secure out of box.

    Do not connect to the net until you've secured the box. Standad practise and pure common sense when you think about it.

  • NO (Score:3, Insightful)

    by TrekkieGod ( 627867 ) on Tuesday August 12, 2003 @10:45AM (#6675210) Homepage Journal
    Shouldn't broadband providers be sending emails to their clients with a link in them?

    I get enough junk mail as it is. I don't want to be reminded of people who are too stupid to patch their computer. Besides, it wouldn't work. Even though "the most clueless of windows users can click on a link and then click the 'Yes' button", remember that they DON'T. Windows update comes by default set up to check for updates periodically...then the screen pops up and asks you if you want to update. Unfortunately, the screen also gives you the option to turn off windows update, and that's what the clueless people choose, because they don't want to be "annoyed" by it.

    Instead of bothering me with e-mails, Microsoft should remove the option to disable Windows Update from the "first use" screen. If you can't figure out how to go to system properties and disable/reschedule your windows update, you're not supposed to have it disabled. I think that would maintain quite a few computers with up-to-date patches.

  • Re:Echoes (Score:3, Insightful)

    by pjt48108 ( 321212 ) <mr,paul,j,taylor&gmail,com> on Tuesday August 12, 2003 @10:46AM (#6675216)
    "Why-oh-why can't people patch? Shouldn't broadband providers be sending emails to their clients with a link in them?"

    People don't patch because, quite simply (not that it is true by any means), Windows is supposed to be perfect already, needing no further work. "Where do you want to go today" (besides offline)?

    Also, I would hazard to guess that most broadband providers don't know the email addresses of their customers (would YOU give up your addy to Comcrap? Not ME, bub!). Broadband providers care not a bit about communicating with customers, unless it is to request payment for services rendered.

    "You'd think every hotmail account would get a message saying "Plug that hole" from whoever it is that runs hotmail. "

    Microsoft runs Hotmail. I have a Hotmail account, but I use an iMac, therefore it doesn't apply to me, so I would not want to get that message.

    Besides... It would be just another message in my/your 'other Hotmail folder,' meaning it would be ignored as just another spam mail.

    I agree with an earlier post, though. Everyone who says "Linux isn't ready for your grandma" should be forced to do community service cleaning this crap up. AND maybe doing weekly patches on all the Wintel machines in his/her neighborhood. AND maybe making sure certain ports are closed on those same PCs.

    I could go on (but I won't).
  • Re:Honest question (Score:4, Insightful)

    by M. Silver ( 141590 ) <{ten.xyneohp} {ta} {revlis}> on Tuesday August 12, 2003 @10:50AM (#6675250) Homepage Journal
    Because Windows bugs you to turn on Automatic Updates.

    A lot of people shut that off after a patch awhile back that smoked JavaScript. (And guess what? It requires JavaScript to perform Automatic Updates, so they couldn't download the patch that fixed the patch.) I mean, when the first "visible" thing the Update does brings your system to its knees, and requires you to pay a tech to fix it, Joe Average User is going to be a little confused about exactly how it's supposed to *protect* you from a virus that brings your system to its knees, and requires you to pay a tech to fix it...
  • Re:Honest question (Score:2, Insightful)

    by AKnightCowboy ( 608632 ) on Tuesday August 12, 2003 @10:57AM (#6675339)
    Why didn't I install the patch? Because, quite frankly, I don't want to spend a couple hours a week patching my machines.

    Don't be ridiculous. For one thing it doesn't take that long to run Windows Update once a week, and for another you could just use auto update if you're that lazy. Have it run at 3am and download+update any new critical patches. Hopefully on newer versions of Windows they will make that the default so Mom and Pop don't have to even worry about it.

    When your computer connects to the Internet it'll automatically download patches and apply them. In fact, you shouldn't have a choice whether it does it or not. Maybe make it a complicated registry hack to shut it off. Too many people are lazy or inept and don't apply patches which results in worms like this spreading.

  • Re:Precisely (Score:4, Insightful)

    by aug24 ( 38229 ) on Tuesday August 12, 2003 @10:57AM (#6675340) Homepage
    I can't think of any reason why someone shouldn't be doing the same to their Windows network, except for arcane Slashbot conspiracy theories or just plain needing to hate Microsoft for something, anything.
    Did you merrily click past the EULA that said if it destroyed your system and data it wasn't MS's fault or responsibility? Did you install on one box and then do a complete round of System Test, or did you just blindly trust MS?

    J.

  • by Da Penguin ( 122065 ) on Tuesday August 12, 2003 @11:00AM (#6675372)
    People are saying that the admins should have installed the patches, and that not doing so is being lazy/inexperienced. The only thing I found surprising about people not patching, is that they actually had to do this manually! Am I the only one that thinks that any secure system should have an updater to notify people of the patches and let them easily install it? How hard would that be, and it /is/ MS's fault after all. Maybe I'm just spoiled by OS X's "Software Update" util.
  • by Zak3056 ( 69287 ) on Tuesday August 12, 2003 @11:02AM (#6675406) Journal
    Seriously. If you fancy a laugh, and you're working in the City of London, then go to the Halifax ATM between Canon Street and Poultry.
    Then try, really, really hard to stop laughing...


    I don't know why I have to point this out, but that's NOT funny--it's freaking SCARY.
  • This is not FUD (Score:5, Insightful)

    by JRHelgeson ( 576325 ) on Tuesday August 12, 2003 @11:04AM (#6675420) Homepage Journal
    The security community has been saying for nearly a month that people needed to update their machines. We watched as the hacker community perfected their code for the RPC/DCOM vulnerability and posted their work on hacker sites and discussion groups. Yet the more we begged and pleaded people to update their machines, the more I heard "Aw, they're just hyping the FUD factor."

    Let it be suffice to say that if a company is trying to sell you something based upon the FUD factor, treat the information as suspect. I agree, vendors whose software doesn't sell on its own laurels hype the hell out of the FUD factor and give the industry a bad reputation. But don't lump these vendors in with the security consultants that are trying to provide a free service and free advise based upon information that is going around in the security community.

    When you get security information, consider the source. Is the security information provided with a sales pitch attached? If so, google the information to determine if it is FUD or legetimate. If it's legit, it'll pay to listen.

    Regardless, people, patch your *#&($*@& machines!

  • Laptops (Score:5, Insightful)

    by mrscott ( 548097 ) on Tuesday August 12, 2003 @11:05AM (#6675436)
    Think about this scenario: a perfectly competent administrator has a properly configured firewall which blocks the problem. The "road warrior" brings his laptop from from 3 weeks on the road and had used a bunch of hotel access points where he got the worm. He connects it to his docking station in the office effectively bringing the problem behind the firewall.
  • Re:shutdown /a (Score:1, Insightful)

    by Anonymous Coward on Tuesday August 12, 2003 @11:06AM (#6675448)
    The worm's already hitting slashdot: the article is being posted over and over [slashdot.org] again...
  • by Junks Jerzey ( 54586 ) on Tuesday August 12, 2003 @11:06AM (#6675449)
    All the Linux users (and *BSD for that matter) are walking around with a big smile on their lips days like this.

    Sigh. The Windows exploit is essentially a buffer overrun. Microsoft knew about this and released a patch *before* this worm was even written. So it comes down to two things:

    1. It's a common problem caused by people writing OS-level services in languages that are prone to these types of problems. Windows and Linux are in the same boat here. Many such exploits have been found in boths OSes, and more will be found in the future.

    2. It doesn't matter how fast a patch is released if people don't download and install the patches. Again, both Windows and Linux are identical in this respect.

    If Linux were on 90% of all desktop PCs, you'd see the same kinds of viruses and worms. It's not like there haven't been UNIX worms in the past; to think otherwise is fooling yourself. And if Linux were that popular, it would only be a matter of time until bogus "security updates" started making the rounds, so people log in as root to install them, and BANG.
  • Re:Honest question (Score:5, Insightful)

    by Maserati ( 8679 ) on Tuesday August 12, 2003 @11:07AM (#6675466) Homepage Journal
    I had to explain ports and firewalls to one of our Account Services people yesterday. My analogy was a company with oine main number and everyone else on extensions behind that number. So if calling their number (IP address) and asking for extension 80 (port) lets you talk to Janie (900.69.69.69:69) then that's just like connecting to a web server at an address:port combination.

    Specifically, we were trying to figure out if a clients BOFH was a BOFH, a PFY or a PHB. We think he's a PHB since there's a lot of money (cash and obligations) sunk into a project that needs a port opened in their firewall and he won't/can't/hasn't opened it up yet.

    This may still be better than the other (former) client who put two people in our office using VPN to connect to their home network... and then changed their proxy configuration without telling anyone (like their helpdesk). It took me a week of phone tag to get one of their network analysts to finally say "OK, try this". Then they sent her an XP laptop with that setting locked into the old-and-wrong setting. I think she had to ship it back since they wouldn't cut loose with the admin password. Neither would I, but the box would have worked before I sent it out. We aren't suing them for specifically "rampant idiocy", but that MUST be a factor. We're suing them, a spokesfigure was perp-walked recently and business is way down. I wonder how long they'll manage to stay out of Chapter 11.

    Stupid people suffer.
  • by koa ( 95614 ) on Tuesday August 12, 2003 @11:15AM (#6675560)
    Heres another problem I see with this whole thing. WHY does this patach REQUIRE a reboot after installation? One would think that by 2003 Production server uptime would at LEAST be somewhere on the minds of the people in Redmond! I mean, look- you stop the effected service (windows can do this y'know!) then you replace files.. then START the services back up. I would write more in this post but I accidentally moved my mouse and I need to reboot my machine for the changes to take effect!
  • Re:Precisely (Score:3, Insightful)

    by antibryce ( 124264 ) on Tuesday August 12, 2003 @11:16AM (#6675564)
    My entire work network was unscathed, because they're all kept completely up to date. I can't think of any reason why someone shouldn't be doing the same to their Windows network...


    Because MS patches are often just as poorly written as their base software is? Patches take time to roll out on production servers because they have been known to break things.

  • Re:Sad really (Score:3, Insightful)

    by b-baggins ( 610215 ) on Tuesday August 12, 2003 @11:18AM (#6675587) Journal
    What absolutely amazes me is that people so casually accept that "patch and reboot" is an acceptable aspect of an operating system.

    In a rational world, Windows should have been tossed out of the business door two years ago as a piece of junk product.

    I'll just keep reading all this panic and scrambling from the quiet comfort of my OS X machine.
  • Re:shutdown /a (Score:2, Insightful)

    by Eric Ass Raymond ( 662593 ) on Tuesday August 12, 2003 @11:20AM (#6675616) Journal
    Indeed.

    I admit the default security of a fresh Windows installation is (or, after Windows 2003 Server: has been) abyssmal. That's why every self-respecting administrator does either have the new setups behind a proper firewall or he/she has stacks of CDs with all the relevant Service Packs and critical patches on them.

    I don't see how something like a default Redhat 7.2 or 8.0 installation would be different. Every conceivable exploit is known not only to the real pros but to script kiddies (or actually their root kits) too.

  • Re:shutdown /a (Score:3, Insightful)

    by MikeDX ( 560598 ) on Tuesday August 12, 2003 @11:21AM (#6675629) Journal
    I think you need to get the dvd boset for ALL of the security updates
  • by Zed2K ( 313037 ) on Tuesday August 12, 2003 @11:23AM (#6675650)
    I don't understand how its intruisive. It puts up a very small icon in the bottom that tells you when there is a new upgrade. It downloads when you ask it to and then installs when you tell it to all in the background. Its not like it pops up this huge box that takes up the whole screen with flashing text and no ignore button.

    Everyone who gets bit by this deserves it.
  • Re:Nice touch. (Score:3, Insightful)

    by fizbin ( 2046 ) <martin@s[ ]plow.org ['now' in gap]> on Tuesday August 12, 2003 @11:26AM (#6675688) Homepage
    Could/Would this be illegal and/or dangerous?

    In the form you described, yes.

    It is a significantly more gray area if you were to listen for attempts on your machine and, after receiving an active probe (not just a SYN packet, because single SYNs are very fakeable), hit the attacking machine with something that used this vulnerability to wipe out the virus.

    If you want to stretch things, it might even be acceptable to then download and install the microsoft security patch (although that's pushing things a bit). Maybe. Much more acceptable would be to replace the worm with something that looked sufficiently like the worm to prevent re-infection, but did nothing.

    However, creating and releasing a "beneficial virus" is just flat out illegal and dangerous. Have you ever written code that worked exactly as it was supposed to, on systems you've never seen? Have you ever gotten a piece of code bug-free before the first large test? Have you ever created a binary that someone could look at and easily verify behaved exactly as advertised?

    The idea is that so long as you are disarming a machine that has directly attacked one of your machines, you are on defensible moral (IANAL, so I won't talk about legal) ground. However, forcing an update on a third party, or even doing more than the minimum necessary to disarm the machine attacking you, places you in the same category as the original virus writer - you cannot know all the effects of your actions, therefore doing more than the absolute minimum necessary is irresponsible.
  • Re:Honest question (Score:5, Insightful)

    by Ilgaz ( 86384 ) on Tuesday August 12, 2003 @11:27AM (#6675692) Homepage
    Well, I wonder why MS opens RPC (135) to outside World.

    Yes yes, services use it, as Steve Gibson's sayin "impossible to close without firewall" ...

    Don't blame people not using firewall, they are mostly newbies , e.g. XP home users. Ask the real question: Why you open a port outside World by default OS install?

    Everyone knew port 135 would be exploited in a real bad way before, that was just a matter of time.

    If os is a client only, do not turn on rpc listening on port 135... Its THAT hard?
  • Re:Honest question (Score:3, Insightful)

    by andrewmc ( 88496 ) on Tuesday August 12, 2003 @11:32AM (#6675760)
    Why hadn't you applied the patch before?

    Because it's not always that easy. Have you ever tried convincing very busy people to apply a patch when Windows Update has completely screwed their machine twice before? They'd rather risk spending an hour cleaning up after than risk another full day reinstalling and reconfiguring their machines. Having seen what happened the last time, I can understand their point of view (even if I don't agree myself).

  • by doon ( 23278 ) on Tuesday August 12, 2003 @11:38AM (#6675826) Homepage
    Hopefully the ATM isn't on the Internet, and it is on a private network that has infected hosts on it.

    If it was just out on the net and got hit by that I would be pulling all my money from that bank rather quickly.

  • Re:Echoes (Score:2, Insightful)

    by doon ( 23278 ) on Tuesday August 12, 2003 @11:52AM (#6676004) Homepage
    To play the bad guy here, If people got used to doing this, all you need to do is fake an e-mail to said ISP's customers along with a link to some site that installs an even better worm/virus/spyware/malware/etc... The "ohh shiny"...Click syndrome would strike big time. Remember these are the same people that wind up giving out their CC/Paypal account info because of an "Official" looking e-mail.

    Now how is the Isp going to keep track of what their Customers run. How are we supposed to get in touch with them? Looking at our maillogs (I admin a small, 13K or so ISP). Half or our customers don't even check their e-mail we provide them, their boxes just sit and collect spam until they hit quota. So it would be for naught. Even when we do send out e-mails most people ignore them anyway. Or call tech support to ask what they have to do.

    Enough babbling out of me. I guess I need a lot more sleep, the 2 hours last night is no where near enough.
  • by MarcQuadra ( 129430 ) * on Tuesday August 12, 2003 @11:55AM (#6676050)
    I'm inside a major bank right now (3rd biggest in USA?), and our entire network is having issues. I keep having to disconnect from the proxies and reconnect bacause they're dropping my connections. I don't think there are many machines on the inside with the worm, and under 5% of our machines are nt-based (the rest is win98, on Novell/NT servers).

    It seems that the only machines inside that have this are portables, which probably picked it up from the outside, and some departments who run their own servers for testing and development (and often have under-the-radar links to the outside so the dept. admins can play with them). InfoSec is pulling the plug on anything that shows symptoms, which means that servers keep dis and re-appearing. The PC-support work queue in Rhode Island usually has 3-10 items in it, and I'm counting 40 right now.

    I'm also getting calls from remote sites connected through frame-relays that are saying they can't access anything reliably if it's off their LAN.

    I'm quite thankful for our InfoSec folks, and the fact that we use Novell for most servers, I'll be sad to see it go to XP/2003 in the fall...
  • by ctid ( 449118 ) on Tuesday August 12, 2003 @12:06PM (#6676176) Homepage
    I suppose it's too much to point out that this worm exploits a vulnerability that's already been patched by Microsoft, so that only lazy or incompetent admins are going to get hit by it.

    I think you mean lazy and incompetent admins, plus thousands upon thousands of home users who have no idea what a patch is, or what a firewall is, or what ports are in this context. It appears that you'd want nearly all home users of Windows XP to be "stoned, burned, crucified, sterilized and beheaded". That seems a bit extreme to me.

    The reason I am gloating (I can't speak for other slashdotters) is that I'm sick of reading that Linux is not ready for the desktop because it's too difficult to use. I'm looking forward to the many many accounts of normal Windows users who are able to successfully patch their systems in the sixty seconds they have before it shuts itself down again.
  • by Tired_Blood ( 582679 ) on Tuesday August 12, 2003 @12:09PM (#6676217)
    When's the first computer voting machine going to be hit with something similar?

    And will these problems again be explained as "user error"? (think Florida '00)
  • by Loundry ( 4143 ) on Tuesday August 12, 2003 @12:14PM (#6676284) Journal
    They are trying to differentiate it from an "email virus." They are labeling it because of it's entry point, not OS.

    I think you may be right. If the worm spread itself solely due to a flaw in Microsoft Outlook (I know, perish the thought!), then would the mainstream press have labeled it as an "e-mail virus" or a "Micorosoft Outlook virus"? My guess is that it would be the former with the real culprit mentioned as an afterthought.
  • by p00ya ( 579445 ) on Tuesday August 12, 2003 @12:17PM (#6676308) Homepage
    Have you met many people who are MS sysadmins? A good proportion of those that I have met are Joe User types who have knowledge of how to set up, auto-reboot and backup machines, and not a lot more.
    Just like a good proportion of the people who call themselves "linux sysadmins" I know have managed to work their way through the mandrake or redhat install process and are able to declare that they have triumphed against "M$" and that they are right now basking in the freedoms of open source and Free software. Armed with a knowledge of how to use KATE to edit whatever they can get their hands on in /etc/ to the point where they can setup proftpd and an httpd on their home box, they can then find their way into maintaining small-business webservers. To which,
    So you get less-trained or less-capable or whatever people who are employed doing this, who look fine on the day-to-day, but who are damn-near useless at the harder stuff like security - which should, of course, be the day to day.
    applies just as easily. C'mon, MCSE quals aren't rocket science, but you can afford the windows sysadmins some dignity. It's not so much about the OS itself, it's about who's using it.
  • by UrGeek ( 577204 ) on Tuesday August 12, 2003 @12:17PM (#6676310)
    Then "no soup for you!" Microsoft has not and (at this time says) will not provide a fix for this. They claim that "the Windows NT 4.0 architecture will not support a fix to this issue, now or in the future." WHAT HORSESHIT! So all of the Windows NT 4.0 machines of the world are open doors to this (and other) attacks. Oh, they do recommend that you put it behind a firewall and block port 135. And if you happen to be using 135, well, you gotta have to recode and recompile any and all programs that do. Don't have the source code? Well, how good are you are reverse engineering. And be careful, it may be illegal were you live. AND you gotta trust everyone behind that firewall to not crack your machine!

    Now, the karmaic debt in all of this - Microsoft's Windows Update will get attacked by WinNT 4.0 every month. Mmmm. So, everyone else gets fixed and the ones that MICROSOFT want you to upgrade become easily identified as problems on the net.

    Sure, one P.-off muther-F. may have written this worm to get at Microsoft. Or maybe it came from somewhere in Washington state. So, what is next? All "obsolete" versions of Microsoft products get infected with worms that will install a gigabyte of child prono and then email the police? I guarantee with publicity like this, evildoers will be using WinNT as a platform for all kind of crap for now on. Thanks a lot, Microsoft, the Crackers Best Friend!

    Here's the Microsoft spin on this from the FAQ in Microsoft Security Bulletin MS03-010 (http://www.microsoft.com/technet/treeview/default .asp?url=/technet/security/bulletin/ms03-010.asp):

    "If Windows NT 4.0 is listed as an affected product, why is Microsoft not issuing a patch for it?"

    "During the development of Windows 2000, significant enhancements were made to the underlying architecture of RPC. In some areas these changes involved making fundamental changes to the way the RPC server software was built. The Windows NT 4.0 architecture is much less robust than the more recent Windows 2000 architecture, Due to these fundamental differences between Windows NT 4.0 and Windows 2000 and its successors, it is infeasible to rebuild the software for Windows NT 4.0 to eliminate the vulnerability. To do so would require rearchitecting a very significant amount of the Windows NT 4.0 operating system, and not just the RPC component affected. The product of such a rearchitecture effort would be sufficiently incompatible with Windows NT 4.0 that there would be no assurance that applications designed to run on Windows NT 4.0 would continue to operate on the patched system."

    "Microsoft strongly recommends that customers still using Windows NT 4.0 protect those systems by placing them behind a firewall which is filtering traffic on Port 135. Such a firewall will block attacks attempting to exploit this vulnerability, as discussed in the workarounds section below."

    "Will Microsoft issue a patch for Windows NT 4.0 sometime in the future?"

    "Microsoft has extensively investigated an engineering solution for NT 4.0 and found that the Windows NT 4.0 architecture will not support a fix to this issue, now or in the future."

    The moral is upgrade. Upgrade and get people like Microsoft who abandon you out of your life. Upgrade to Linux.
  • Wow (Score:4, Insightful)

    by autopr0n ( 534291 ) on Tuesday August 12, 2003 @12:26PM (#6676392) Homepage Journal
    I wonder when someone will release a virus for an exploit that they just found, one that they didn't tell Microsoft about. If they found one for IIS it would basically kill the entire windows internet (since you couldn't just firewall off the port).

    And of course the same thing could happen with Linux. There have been security holes in Apache and especially in various distros.

    I guess we're lucky that people finding holes so far have been benign. (or at least more interested in having access then causing chaos...)
  • Re:Precisely (Score:3, Insightful)

    by Overly Critical Guy ( 663429 ) on Tuesday August 12, 2003 @01:06PM (#6676932)
    I mention Linux because it's a double standard here. The fact you use the word "jabbering" tells me I clearly struck a nerve.

    Call me incompetent if you want. It's incompetent not to install "critical" updates from the company who made your freaking operating system. My network went 100% untouched. You're the one whining.
  • by Anonymous Coward on Tuesday August 12, 2003 @01:10PM (#6676984)
    specifically, running it on an ATM that's connected to the Internet...
  • by gregarican ( 694358 ) on Tuesday August 12, 2003 @01:25PM (#6677159) Homepage
    You are a clown. The lack of Linux boxes you claim shows your lack of knowledge. Linux Apache servers run a decent amount of the Internet's web content there, sparky.

    If Linux has as many security problems as Windows I really doubt you can name too many of them since you're not even aware of general facts.

    Reformatting, reinstalling, and patching in the long run will save time versus trying to find needles in the haystack of which files were modified, deleted, or otherwise compromised if you were hit by this RPC exploit. Weeks later you'd be hunting around for incorrect files or would have IRC bots screwing you up. Penny wise, pound foolish.

  • Re:Sad really (Score:5, Insightful)

    by b-baggins ( 610215 ) on Tuesday August 12, 2003 @01:55PM (#6677499) Journal
    Now, this being modded as funny is REALLY sad.

    Apple's versioning is as follows: .x = new release = full price .xy = maintenance upgrade = free.

    So, 10.1 was full price. 10.1.1 was free. 10.2 was full price. 10.2.6 was free. 10.3 is full price. 10.3.x will be free. 10.4 will be full price, etc.

    Apple does not sell upgrade CDs. You buy a full install. This means you don't need to have any previous version of OS X on the machine. So compate the right things. So let's put this in terms the Microsoft Marketing Influenced(TM) can understand.

    I paid $129 for the full version of OS X. You paid $299 for the full version of Windows2000 Professional.

    I paid $129 for the full version of Jaguar. You paid $399 for the full version of WindowsXP Professional.

    I will pay $129 for the full version of Panther. You will pay >$399 for the full version of Longhorn Professional.

    Now who should we laugh at?

    For all the ranting slashdotters do on how stupid the non-tech/geek person is, I find it hilarious that such a logical, programmer-centric versioning system totally confuses said slashdotter.

    I guess MS was pretty smart to call Winnt 5 Windows 2000, and Winnt 5.1 Windows XP, or you'd all be screaming about that $399 "upgrade" as well.
  • by Dalcius ( 587481 ) on Tuesday August 12, 2003 @03:09PM (#6678318)
    An ATM running an open and unpatched SMB on a network that, directly or not, is exposed to the internet...

    Some things are completely understandable. But this just makes me want to sit down with the IT guy who dempt this up and ask him what the hell he was thinking.
  • by Zak3056 ( 69287 ) on Tuesday August 12, 2003 @03:18PM (#6678413) Journal
    No it isn't. Seriously. While it would certainly inconvenience you if the ATM were to crash while you're using it (including up to a lost card, if it's an older machine that still "takes" the card instead of swiping it), the transaction model should ensure that even if a machine were to crash or be disconnected in the middle of a transaction, the transaction will be completely unrolled. That's the point of transactions, and these machines are designed to deal with failures.

    You're wrong--it's not scary that the ATM is running Windows. It's not even scary that the ATM is in a reboot loop. What's scary is the ATM is connected to a public network (or connected to machines connected to the public network) such that it was able to contract this virus.

    Inconvenience has NOTHING to do with it.
  • by digital_franciscan ( 666729 ) on Tuesday August 12, 2003 @03:24PM (#6678466)
    Our university has just shut out all traffic from outside the system. That's almost as good as a DoS.
  • Re:Precisely (Score:3, Insightful)

    by Slime-dogg ( 120473 ) on Tuesday August 12, 2003 @04:12PM (#6678944) Journal

    Heh. Not only can MS updates break things, there are other factors that come into play here. We have an http uploading control that we use in conjunction with a web application. It relied upon IIS's willingness to accept malformed HTTP headers (there was an extra null character appended to the end). It was a bug that was uncaught, because IIS accepted those headers.

    MS released a patch about a month ago that tightened the security of IIS. I've got no problem with that. Instead of accepting malformed headers, it denied all of them. This broke the control that we were using, causing a down time for our production application.

    It probably cost us a bit of money. It was not directly caused by a MS patch, I'm more inclined to blame the company that produced the control. The fact of the matter, however, was that a MS patch was applied without being tested in a production environment. Something broke. It's best to do some QA on your systems before updating, even if MS isn't the one at fault. It's just good practice, and can save your butt in the long run.

  • by mr3038 ( 121693 ) on Tuesday August 12, 2003 @04:36PM (#6679306)
    unfortunately, Microsoft in their infinite wisdom have decided that users can't turn off RPC's network functionality.

    Actually, it's possible to close all ports in windows, but it's harder than it should be. Just close all those services that nobody needs and run dcomcnfg.exe and remove all remote DCOM/COM+/whatever support. If you know that you need those, you obviously shouldn't do this. But if you know that you need those protocols, you probably work for Microsoft anyway. Dinkumware's fport [google.com] helps you to find out which programs keep all those ports open.

    Yes, the default settings from redmond are brain-dead at best - what else is new?

    I don't run a firewall on my windows workstation but on the other hand it doesn't have any ports open, other than those opened by Mozilla to browse the web and those opened by miranda. Having a firewall doesn't help with those ports. Obviously, running a firewall could help catching software that's trying to call home, but I don't run every random piece of software I can get my hands on. If somebody can still crash a windows that doesn't have a single port open, you're fucked anyway.

If all else fails, lower your standards.

Working...