G
Guest
Guest
Source: PC World
A scheduled denial of service attack against Microsoft's main software update Web site did not materialize Saturday, as computers infected with the W32.Blaster worm failed to find their target.
Blaster first appeared on Monday and quickly spread to computers worldwide by exploiting a known security vulnerability in Microsoft's Windows operating system.
By Friday, the worm, which targets a Windows component for handling RPC (Remote Procedure Call) protocol traffic called the Distributed Component Object Model (DCOM) interface, spread to more than 423,000 systems, according to Oliver Friedrichs of Symantec.
In addition to infecting vulnerable Windows machines, Blaster worm was programmed to launch a denial of service attack against windowsupdate.com, an Internet domain owned by Microsoft and used to distribute software updates to Windows customers beginning on Saturday.
Internal Error
However, an error in Blaster's design combined with last minute actions by Microsoft to change the registration of windowsupdate.com cut short that attack.
Blaster's author provided the incorrect domain address for windowsupdate. The address specified in the worm's code, windowsupdate.com, simply forwards users to the actual Windows update site, windowsupdate.microsoft.com, according to Mikko Hypponen, head of antivirus research at F-Secure in Helsinki.
On Thursday, Microsoft delisted the windowsupdate.com domain name, calling it a "nonessential address.
That solution also removed the threat of collateral damage from the attack, because requests for windowsupdate.com would never leave infected machines, slowing down the Internet, according to Sean Sundwall, a Microsoft spokesperson.
On Saturday, Microsoft didn't detect any irregular network activity associated with the Blaster worm, Sundwall said.
The SANS Institute's Internet Storm Center reported Saturday that the DOS attack anticipated from Blaster had been avoided.
Read The Rest/Source: PC World
A scheduled denial of service attack against Microsoft's main software update Web site did not materialize Saturday, as computers infected with the W32.Blaster worm failed to find their target.
Blaster first appeared on Monday and quickly spread to computers worldwide by exploiting a known security vulnerability in Microsoft's Windows operating system.
By Friday, the worm, which targets a Windows component for handling RPC (Remote Procedure Call) protocol traffic called the Distributed Component Object Model (DCOM) interface, spread to more than 423,000 systems, according to Oliver Friedrichs of Symantec.
In addition to infecting vulnerable Windows machines, Blaster worm was programmed to launch a denial of service attack against windowsupdate.com, an Internet domain owned by Microsoft and used to distribute software updates to Windows customers beginning on Saturday.
Internal Error
However, an error in Blaster's design combined with last minute actions by Microsoft to change the registration of windowsupdate.com cut short that attack.
Blaster's author provided the incorrect domain address for windowsupdate. The address specified in the worm's code, windowsupdate.com, simply forwards users to the actual Windows update site, windowsupdate.microsoft.com, according to Mikko Hypponen, head of antivirus research at F-Secure in Helsinki.
On Thursday, Microsoft delisted the windowsupdate.com domain name, calling it a "nonessential address.
That solution also removed the threat of collateral damage from the attack, because requests for windowsupdate.com would never leave infected machines, slowing down the Internet, according to Sean Sundwall, a Microsoft spokesperson.
On Saturday, Microsoft didn't detect any irregular network activity associated with the Blaster worm, Sundwall said.
The SANS Institute's Internet Storm Center reported Saturday that the DOS attack anticipated from Blaster had been avoided.
Read The Rest/Source: PC World