Microsoft warns of new Windows attacks
Exploits aimed at PCs that haven't been patched with October's emergency fix
Computerworld - Security researchers at Microsoft Corp. late yesterday warned of a significant increase in exploits of a Windows bug that the software vendor patched with an emergency fix last month, confirming earlier reports by Symantec Corp.
Microsoft again urged users to apply the MS08-067 patch if they have not already done so.
The new attacks, which Microsoft's Malware Protection Center said began over the weekend but spiked during the past two days, use the same worm that Symantec first spotted last Friday.
Dubbed "Conficker.a" by Microsoft and "Downadup" by Symantec, the worm exploits a vulnerability in the Windows Server service, which is used by all versions of the operating system to connect to file and print servers on a network. Microsoft patched the bug in an out-of-cycle update five weeks ago, after it discovered a small number of infected PCs, most of them in Southeast Asia.
According to Ziv Mador, a researcher with the Microsoft Malware Protection Center, the new wave of attacks has spread in corporations and hit "several hundred" home users. Most of the infection reports have come from U.S. users, said Mador in a post to the Malware Protection Center's blog, but his team has received calls from users in several other countries, too. The worm avoids infecting Ukrainian computers, Mador said, which may indicate that the malware was written by a Ukrainian; hackers often purposefully skip systems in the country where they live, hoping to postpone or avoid any reaction by local authorities.
"It is also interesting to note that the worm patches the vulnerable API in memory so the machine will not be vulnerable anymore," said Mador. "It is not that the malware authors care so much about the computer, [they just] want to make sure that other malware will not take it over, too."
The worm also resets the machine's system restore point, said Microsoft in its technical write-up, which may make it difficult or impossible to "roll back" Windows to a pre-infection state.
PCs that have been patched with the MS08-067 fix are protected, Mador stressed.
Last week, Symantec bumped up its ThreatCon security alert status for this vulnerability from 1 to 2 in response to attacks it had tracked hitting its customers and honey pots. Others security vendors, however, disputed the uptick.
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Taking Windows Mobile on Any Device Taking Windows applications mobile has many advantages, but the process of identifying a solution is complex. Learn how to solve this complex problem...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Windows White Papers | Webcasts