Notices
Non Scooby Related Anything Non-Scooby related

**** WARNING: Blaster worm ****

Thread Tools
 
Search this Thread
 
Old 12 August 2003, 11:10 PM
  #31  
SiDHEaD
Scooby Regular
Thread Starter
 
SiDHEaD's Avatar
 
Join Date: Apr 2002
Location: Birmingham
Posts: 9,196
Likes: 0
Received 0 Likes on 0 Posts
Post

Have a read of that word doc i put up earlier. It has how to stop the pc restarting, so u can get the patch on and remove using symantec's removal tool!

Andy
Old 13 August 2003, 09:11 AM
  #32  
ianmiller999
Scooby Regular
 
ianmiller999's Avatar
 
Join Date: Feb 2003
Posts: 1,285
Likes: 0
Received 0 Likes on 0 Posts
Post

It must be getting quite a serious problem now because even blueyonder sent me an email telling me to get this patch and do this etc etc.
Old 13 August 2003, 09:43 AM
  #33  
PG
Scooby Regular
 
PG's Avatar
 
Join Date: Jul 2001
Location: Perthshire
Posts: 6,396
Likes: 0
Received 0 Likes on 0 Posts
Post

thanks for the help Andy

Paul
Old 13 August 2003, 12:47 PM
  #34  
JackClark
Scooby Senior
 
JackClark's Avatar
 
Join Date: Dec 2000
Location: Overdosed on LCD
Posts: 20,853
Received 51 Likes on 34 Posts
Post

Here are some good instructions on how to keep your PC online.

From Freeserve.com

To prevent your PC rebooting as soon as you connect to the Internet please follow these simple instructions. This will let you connect successfully to download the appropriate Microsoft security updates and update your existing antivirus software.

Before you go online:

Click on Start
Click Run then type: services.msc
When the Services window opens up, scroll down the list to the first Remote Procedure Call (RPC)
Right-click on this and select Properties
Click on the Recovery tab
You will see the drop-down menus labelled First failure, Second failure and Subsequent failures. These will be set to 'Restart' as default.
Change each drop-down menu to 'Take No Action' then click Apply and OK.
Close the Services window
Now connect to the Internet to download the relevant security patch for your version of Windows

[Edited by JackClark - 8/13/2003 12:48:32 PM]
Old 13 August 2003, 12:49 PM
  #35  
Nimbus
Scooby Regular
 
Nimbus's Avatar
 
Join Date: Jun 2000
Posts: 4,413
Likes: 0
Received 0 Likes on 0 Posts
Angry

Had this on our network yesterday...

Simptoms I saw were...

1. svchost.exe caused errors and was closed
2. copy/past function did not work
3. could not open the search option in win2k start menu


sorted now, but still a few devices out on our network that need cleaning.
Old 13 August 2003, 01:08 PM
  #36  
unclebuck
Scooby Regular
 
unclebuck's Avatar
 
Join Date: Nov 2002
Location: Talk to the hand....
Posts: 13,331
Likes: 0
Received 0 Likes on 0 Posts
Thumbs down

Getting quite serious now

As an experiment security firm F-Secure put an unprotected PC on the net to see how quickly it would be infected.

Early on Tuesday it took about five minutes 30 seconds before the machine was found and infected. But by 3pm the same PC was being found and infected in 27 seconds.

According to statistics from Symantec the US and UK have the highest number of infected PCs.


Be careful out there. If your machine is not yet protected, get it sorted quick

UB
Old 13 August 2003, 01:16 PM
  #37  
Nimbus
Scooby Regular
 
Nimbus's Avatar
 
Join Date: Jun 2000
Posts: 4,413
Likes: 0
Received 0 Likes on 0 Posts
Post

We've identified the source (or maybe one possible) on our net. Actually, I found it with the help of a Personal Firewall when it reported the following (removed the full IP to protect the guilty )...


File Version : 5.00.2134.1
File Description : Generic Host Process for Win32 Services
File Path : C:\WINNT\SYSTEM32\SVCHOST.EXE
Process ID : 178 (Heximal) 376 (Decimal)

Connection origin : remote initiated
Protocol : TCP
Local Address : 192.***.***.***
Local Port : 135 (EPMAP - Location service - Dynamically assign ports for RPC)
Remote Name :
Remote Address : 192.***.***.***
Remote Port : 1785

Ethernet packet details:
Ethernet II (Packet Length: 62)
Destination: ***
Source: ***
Type: IP (0x0800)
Internet Protocol
Version: 4
Header Length: 20 bytes
Flags:
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset:0
Time to live: 124
Protocol: 0x6 (TCP - Transmission Control Protocol)
Header checksum: 0x48e7 (Correct)
Source: 192.***.***.***
Destination: 192.***.***.***
Transmission Control Protocol (TCP)
Source port: 1785
Destination port: 135
Sequence number: 965599004
Acknowledgment number: 0
Header length: 28
Flags:
0... .... = Congestion Window Reduce (CWR): Not set
.0.. .... = ECN-Echo: Not set
..0. .... = Urgent: Not set
...0 .... = Acknowledgment: Not set
.... 0... = Push: Not set
.... .0.. = Reset: Not set
.... ..1. = Syn: Set
.... ...0 = Fin: Not set
Checksum: 0x59 (Correct)
Data (0 Bytes)

Binary dump of the packet:
0000: 00 10 A4 E1 F7 3E 00 D0 : 58 BF 4E 20 08 00 45 00 | .....>..X.N ..E.
0010: 00 30 4D 8A 40 00 7C 06 : E7 48 C0 A8 9B 62 C0 A8 | .0M.@.|..H...b..
0020: AD 41 06 F9 00 87 39 8D : DF 1C 00 00 00 00 70 02 | .A....9.......p.
0030: 40 00 59 00 00 00 02 04 : 05 B4 01 01 04 02 | @.Y...........


[Edited by Nimbus - 8/13/2003 1:22:08 PM]
Old 13 August 2003, 01:16 PM
  #38  
Miles
Scooby Regular
 
Miles's Avatar
 
Join Date: Oct 1998
Location: The Granite City/Dallas, Tx.
Posts: 2,519
Likes: 0
Received 0 Likes on 0 Posts
Post

So in comparison to other bugs how big a threat is this, love bug scale-more less?
This isn't a destructive worm, thankfully, however it will lead to loss of service on compromised systems. However, the vulnerability within the OS that it exploits could be used to spread a worm that could be destructive and then that would be when things get nasty.

Is there a patch for Windows 98
Win9x systems do not have this vulnerability and hence are not at risk from this worm. Which is good news.

Edit for formating

[Edited by Miles - 8/13/2003 1:19:23 PM]
Old 13 August 2003, 01:36 PM
  #39  
Hos
Scooby Regular
iTrader: (1)
 
Hos's Avatar
 
Join Date: Jul 1999
Location: Dundee
Posts: 978
Likes: 0
Received 0 Likes on 0 Posts
Post

AH! this has been driving me nuts for 3 days now and i didn't know what it was.

Just updated my virus definitions and the blaster worm is showing up now.

Thanks for the info Andy on how to remove it. Alot of help!
Old 13 August 2003, 01:43 PM
  #40  
ianmiller999
Scooby Regular
 
ianmiller999's Avatar
 
Join Date: Feb 2003
Posts: 1,285
Likes: 0
Received 0 Likes on 0 Posts
Post

This isn't a destructive worm
I thought the worm was trying to get all the infected PCs to attack the microsoft automatic update page on August 16th
Old 13 August 2003, 01:44 PM
  #41  
Badger Stuffer
Scooby Regular
 
Badger Stuffer's Avatar
 
Join Date: Jan 2003
Posts: 3,824
Likes: 0
Received 0 Likes on 0 Posts
Post

I had this ****** on all our machines this morning.

All sorted now but took us all down for a while.

*******.

Old 13 August 2003, 02:20 PM
  #42  
supertouring
Scooby Regular
 
supertouring's Avatar
 
Join Date: Mar 2003
Location: www.supertouring.co.uk www.cliocupexperience.co.uk
Posts: 2,136
Likes: 0
Received 0 Likes on 0 Posts
Post

Been having problems on my laptop (then my PC) over the last couple of days. Thanks to this thread I was able to spot that I had the same symptoms so cleaned it out and applied the W2K patch.
Good old scoobynetters!
Old 13 August 2003, 02:39 PM
  #43  
gregh
Scooby Regular
 
gregh's Avatar
 
Join Date: Dec 1999
Posts: 3,360
Likes: 0
Received 0 Likes on 0 Posts
Post

If my XP computer is up to date using Windows Update do I also need to run this MS download mentioned in this thread?

regards,

greg
Old 13 August 2003, 02:42 PM
  #44  
Stueyb
Scooby Regular
 
Stueyb's Avatar
 
Join Date: May 2002
Posts: 1,893
Likes: 0
Received 0 Likes on 0 Posts
Post

Just to let you know that some other symptoms i have encountered with users and this worm.

OLE errors, not being able to open documents via OLE from email. Also the control panel in Win2k going funny.
Old 13 August 2003, 02:48 PM
  #45  
PG
Scooby Regular
 
PG's Avatar
 
Join Date: Jul 2001
Location: Perthshire
Posts: 6,396
Likes: 0
Received 0 Likes on 0 Posts
Post

As I said earlier, my mate seems to have this however when going to step 2 :

Step 2 - Remove the Worm application
Load up task manager by right-clicking on a clear section of the start bar.
Click on the processes tab.
Select the process named “msblast.exe”. Click on the “End Process” button. Say yes to confirmation.
Goto Start - Search (find files on Win 2000) and select all files / folders. Put in “msblast.exe” and click search. When the search is complete. Select any “msblast.exe” files and right-click -> delete.

it is nowhere to be seen on the processes window ????
I have also searched for file / folder and nothing showed up ??
little help please.
Old 13 August 2003, 03:49 PM
  #46  
Chris L
Scooby Regular
 
Chris L's Avatar
 
Join Date: May 2000
Location: MY00,MY01,RX-8, Alfa 147 & Focus ST :-)
Posts: 10,371
Likes: 0
Received 0 Likes on 0 Posts
Arrow

Greg if you are using the Automatic Windows update feature, then you should be OK as this patch was first posted by Microsoft on 17 July. So assuming it has run since then, then you will have the patch. If you are unsure, goto the Windows Update page and check for recent updates.

Chris
Old 13 August 2003, 04:59 PM
  #47  
JackClark
Scooby Senior
 
JackClark's Avatar
 
Join Date: Dec 2000
Location: Overdosed on LCD
Posts: 20,853
Received 51 Likes on 34 Posts
Post

PG, download and run this rather than do things manualy.
Old 13 August 2003, 10:21 PM
  #48  
unclebuck
Scooby Regular
 
unclebuck's Avatar
 
Join Date: Nov 2002
Location: Talk to the hand....
Posts: 13,331
Likes: 0
Received 0 Likes on 0 Posts
Angry

Jeez... so I installed the patch last night and I have a firewall so was assured that it couldn't get through.

But - tonight I start my machine and it can't access the net. I reboot and guess what - firewall reports that MSBlast.exe is trying to access the internet [img]images/smilies/mad.gif[/img][img]images/smilies/mad.gif[/img][img]images/smilies/mad.gif[/img]

Anyway, the FixBlast.exe eventually tracked down the ****** hiding on my E drive Everything seems normal again now.

There must be loads of peeps out there with this virus, wondering why their machines are 'not working right'.

Thanks once again for the advice on this thread.

UB
Old 15 August 2003, 09:20 AM
  #49  
ianmiller999
Scooby Regular
 
ianmiller999's Avatar
 
Join Date: Feb 2003
Posts: 1,285
Likes: 0
Received 0 Likes on 0 Posts
Post

I think there is a lot of money to be made out of this virus, imagine the amout of inexperience home users calling out technicians and the £1 a minute phone lines.
Old 15 August 2003, 01:34 PM
  #50  
Velrybas chick
Scooby Regular
 
Velrybas chick's Avatar
 
Join Date: Aug 2003
Posts: 31
Likes: 0
Received 0 Likes on 0 Posts
Post

I've read on the microsoft web page that users of Win98 shoudn't be affected.

Is this true?

Yes I know, I do have Win 98............

Kate
Old 15 August 2003, 03:12 PM
  #51  
SiDHEaD
Scooby Regular
Thread Starter
 
SiDHEaD's Avatar
 
Join Date: Apr 2002
Location: Birmingham
Posts: 9,196
Likes: 0
Received 0 Likes on 0 Posts
Post

Yes Windows 98 is fine (as far is this worm goes anyway )

Andy
Old 15 August 2003, 07:45 PM
  #52  
J4CKO
Scooby Regular
iTrader: (1)
 
J4CKO's Avatar
 
Join Date: Jan 2003
Posts: 19,384
Likes: 0
Received 1 Like on 1 Post
Post

Wife rang me during the day so having spoken to somebody about it ten mins before knew what the problem was, downloaded the neccessary and took it home on a floppy, half an hour to scan using the Virus killer and 2 mins to install the Windows patch, phew, a lot easier than detecting that bloody Klez thing !
Old 15 August 2003, 09:46 PM
  #53  
Dazza01
Scooby Regular
 
Dazza01's Avatar
 
Join Date: May 2003
Location: Nott'm Home of the Reds
Posts: 6,431
Likes: 0
Received 0 Likes on 0 Posts
Cool

Got the fecking thing monday night,started my pc up then after about a minute kept coming up "system shutdown in 60 seconds"
got a "fix" from local dealer who revamp my pc few months back.
But glad to say were back up and running again....



[Edited by Dazza01 - 8/15/2003 9:50:05 PM]
Old 16 August 2003, 05:13 PM
  #54  
Leslie
Scooby Regular
 
Leslie's Avatar
 
Join Date: Aug 2002
Posts: 39,877
Likes: 0
Received 0 Likes on 0 Posts
Post

Thanks for taking the trouble to warn us Andy.

Les
Old 17 August 2003, 06:36 PM
  #55  
PG
Scooby Regular
 
PG's Avatar
 
Join Date: Jul 2001
Location: Perthshire
Posts: 6,396
Likes: 0
Received 0 Likes on 0 Posts
Post

Another prob with this fookin virus !!!

there is a disk handed out in PC world ATM and they also hand across a sheet of paper detailing the removal procedure.

The disk contains the Symatec removal tool & patch. Is this enough just to run the disk and bobs yer uncle or do I need to **** about with disabeling all other sorts of stuff ?



HELP..............again
Old 17 August 2003, 08:12 PM
  #56  
unclebuck
Scooby Regular
 
unclebuck's Avatar
 
Join Date: Nov 2002
Location: Talk to the hand....
Posts: 13,331
Likes: 0
Received 0 Likes on 0 Posts
Post

If you've got msblast.exe on your machine it will find it and remove it. It will also remove an entry in the Registry and create a small text file 'log' to report what it has done.

Probs still a good move to run the Windows patch even though.

UB
Old 17 August 2003, 11:23 PM
  #57  
PG
Scooby Regular
 
PG's Avatar
 
Join Date: Jul 2001
Location: Perthshire
Posts: 6,396
Likes: 0
Received 0 Likes on 0 Posts
Thumbs up

Thank you UB
Old 17 August 2003, 11:34 PM
  #58  
Dazza01
Scooby Regular
 
Dazza01's Avatar
 
Join Date: May 2003
Location: Nott'm Home of the Reds
Posts: 6,431
Likes: 0
Received 0 Likes on 0 Posts
Thumbs up

Hello all,
re earlier thread.
the fix i got sorted out my pc, m/blast thingy found it and got rid then the windows thingy sorted the hole from where it came and blocked it.
sorry im not a pc wizard but im back up and running......
Old 18 August 2003, 11:59 AM
  #59  
Boro
Scooby Regular
iTrader: (1)
 
Boro's Avatar
 
Join Date: Jul 2003
Location: Cornwall
Posts: 7,222
Likes: 0
Received 0 Likes on 0 Posts
Post

It could have been a whole lot worse

Extract from www.grc.com

We can only speculate what was in the mind of the worm's author(s). But if the 200,000 instances of this worm had chosen to target "windowsupdate.microsoft.com" or even "microsoft.com" with an unthrottled Raw Socket SYN flood, a very different scenario would be playing out today and tomorrow: Microsoft.com would be gone.

But the worm's originator(s) appear to have been more interested in making a point, than in taking Microsoft.com permanently off the Internet — which they could have easily done.
Old 18 August 2003, 12:16 PM
  #60  
PiNkEyE69
Scooby Regular
 
PiNkEyE69's Avatar
 
Join Date: Apr 2002
Posts: 3,838
Likes: 0
Received 0 Likes on 0 Posts
Thumbs up

there is a disk handed out in PC world ATM and they also hand across a sheet of paper detailing the removal procedure.
Really???
Is this all PC Worlds? As I have a few friends with the virus and can't remove it because of any internet access shuts the pc down.


Quick Reply: **** WARNING: Blaster worm ****



All times are GMT +1. The time now is 04:35 PM.