Madrid, August 17 2005 - To prevent the Zotob and IRCBot worms from continuing to spread, above all through computers that do not have effective anti-malware protection installed, Panda Software has made its free PQRemove applications available to all users, which detect and eliminate all known variants of Zotob, as well as IRCBot.KC and KD from any computer that could be affected. These tools can be downloaded from http://www.pandasoft...load/utilities/
Proof of the threat posed by these new malware specimens is that over the last few hours, companies and media like DaimlerChrysler, Kraft Foods, UPS, General Electric or the Financial Times, have joined those initially affected, like CNN, ABC, The New York Times, Caterpillar or the US Congress. The fact that the ABC TV network had to use electric typewriters to finish their World News Tonight news program shows the seriousness of these attacks.
In order to protect yourself against these new malware specimens, it is highly advisable to download and install the update released by Microsoft, at http://www.microsoft...n/ms05-039.mspx. To prevent these new variants of Zotob or IRCBot from affecting your computer, Panda Software recommends keeping antivirus software up-to-date. Panda Software clients can already access the updates to detect and disinfect these new malicious codes.
The above is from my daily antivius news mail. Keep your shit clean ladies and gentlemen.
attack of the WormsZotob and IRCBot removal/prevention
Page 1 of 1
1 Replies - 1695 Views - Last Post: 17 August 2005 - 11:57 AM
Replies To: attack of the Worms
#2
Re: attack of the Worms
Posted 17 August 2005 - 11:57 AM
Bwahahahah foolish windows users.
Here is what mcafee has to say about it
W32/IRCbot.worm!MS05-039
When a vulnerable system is found, it uses a buffer overflow to write the worm file to that machine via a TFTP upload on port 8594. Blocking this port via a Personal Firewall will prevent infection even if the buffer overflow is not prevented.
Here is what mcafee has to say about it
W32/IRCbot.worm!MS05-039
When a vulnerable system is found, it uses a buffer overflow to write the worm file to that machine via a TFTP upload on port 8594. Blocking this port via a Personal Firewall will prevent infection even if the buffer overflow is not prevented.
Page 1 of 1

New Topic/Question
This topic is locked



MultiQuote



|