office politics
It's all just 1s and 0s
- Messages
- 6,555
- Location
- in the lab
similar techniques were used in the msblaster worm.
MS08-067 worms squirming in the wild | Zero Day | ZDNet.com
MS08-067 worms squirming in the wild | Zero Day | ZDNet.com
Posted by Ryan Naraine @ 10:42 am
Categories: Patch Watch, Zero-day attacks, Microsoft, Browsers, Rootkits, Spam and Phishing, Spyware and Adware, Exploit code, Data theft, Arbitrary Code Execution, Malware
Tags: Denial Of Service, Worm, Attack, Cyberthreats, Microsoft Windows, Security, Viruses And Worms, Operating Systems, Software, Ryan Naraine
40 TalkBacksPrintEmailThumbs UpThumbs Down+1317
First came Microsoft's emergency patch. Then the public release of reliable exploit code. Now, virus hunters are reporting two new in-the-wild worms exploiting the critical MS08-067 vulnerability.
The worms, intercepted on Chinese-language versions of Windows, are being used to install a Trojan downloader, a denial-of-service bot and a rootkit to maintain stealthy presence on infected machines.