● 01.18.09

●● Microsoft Botnets: The Chaos Continues

Posted in Microsoft, Security, Windows at 6:50 pm by Dr. Roy Schestowitz

Fear not the Windows zombies

There are many ways to “Suck at Information Security”, but one easy way is to choose a platform that leads to entire military bases getting cracked.

↺ “Suck at Information Security”
entire military bases getting cracked

The British military is one of the very few which choose this tactless route even for nuclear submarines and it costs it dearly.

even for nuclear submarines
↺ costs it dearly
Virus ‘sends RAF e-mails to Russia’THE Ministry of Defence is investigating a major breach in security amid claims that all e-mail traffic from a number of RAF stations has been sent to a Russian internet server.The e-mails were allegedly diverted to the Russian sender by a worm virus that entered the MoD systems 12 days ago bringing down computers and blocking e-mail communications across the military.

The world is already filled with about 320 million Windows PCs that are zombies, so what’s another massive botnet anyway?

about 320 million Windows PCs that are zombies
↺ what’s another massive botnet
New Botnets Replace Vanquished PestsAlthough the shutdown of a California Web hosting company eradicated several prominent botnets last year, others have stepped up to fill the gaps, a security researcher says.Gone from the landscape, said Joe Stewart, director of research at Atlanta-based SecureWorks Inc., are “Srizbi” and “Storm,” the botnets Stewart ranked as No. 1 and No. 5, respectively, in an April 2008 botnet census.

How can anyone combat Windows worms that appear all the time in new forms?

↺ appear all the time
A variant of a malicious worm that targeted Microsoft Windows now is spreading via USB sticks, researchers say.Security company BitDefender Labs, based in Bucharest, Romania, detected the Windows worm variant in late December. The original worm known as Win32.Worm.Downadup, first made its appearance in late November, exploiting a Microsoft vulnerability in the Windows RPC Server Service. Since then, it has rapidly spread across numerous corporate networks with the aim of distributing malicious software on susceptible computers.

Even an Instant Messaging (IM) program is no longer safe because Microsoft turned simple communication protocols into something that can invoke unknown executables.

↺ something that can invoke unknown executables
Internet MSN users are warned. Some programme writers are now using IM to spread malicious programs such as viruses and worms. These viruses can spread when a person opens an infected file, such as pictures of pornographic nature, that is sent through IM by someone who appears to be a contact.

Why is a program for exchange of text leading to the running of untrusted code? This is an architectural deficiency that would prove costly. Outlook and ActiveX are almost perfect examples and they requires no social engineering to lead to a raft of menaces. █

“Our products just aren’t engineered for security.”

–Brian Valentine, Microsoft executive

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.

Permalink  Send this to a friend

Permalink
↺ Send this to a friend

----------

Techrights

➮ Sharing is caring. Content is available under CC-BY-SA.