BOXBOROUGH, Mass. – A new network worm that targets a well-publicized vulnerability in Windows servers and workstations has infected hundreds of thousands of computers worldwide and even shut down Maryland's Department of Motor Vehicles for an afternoon. But the Internet traffic jam caused by the so-called Lovsan or MSblast worm can be avoided. "Remember, Microsoft had the patch for this particular worm released almost two weeks ago," said Dan Sheehan, senior security consultant for Vibren Technologies, a Massachusetts-based provider of IT security for several Fortune 100 clients, including financial institutions, as well as several credit unions. Quietly spreading without the benefit of e-mail, the worm attempts to enter a specific port in Windows systems to download and run a file called msblast.exe. Credit Union Times contacts were reporting at press time computer problems that they suspected were related to the worm. Its other name comes from some dialogue that often accompanies its trail: "I just want to say LOVE YOU SAN!! billy gates why do you make this possible ? Stop making money and fix your software!!" (SAN is a possible reference to the SANS (SysAdmin, Audit, Network, Security) Institute, a well-respected cooperative research and education organization.) The security community had been anticipating the outbreak since the well-publicized vulnerability was announced a couple weeks ago and Microsoft made available a patch. The worm scans Internet addresses to locate vulnerable Windows machines. It then copies itself over and modifies the system so the worm will be executed every time the machine is started. It also restarts infected machines; on some occasions, the worm restarts the machine repeatedly, as often as once a minute. The result can be server and workstation shutdowns and Web site downtime. "I've heard that it has affected several financial institutions," Sheehan said Aug. 13. Niels Taylor of CU Defense, the security arm of Internet banking vendor PM Systems Corp. in Chapin, S.C., said there had been no inquiries about the Blaster worm from his firm's clients. "Most credit unions that we deal with have well-configured firewalls, which will not allow these ports," he said. "We sent an e-mail to customers advising them of this when Microsoft issued a security bulletin. We also encourage all our customers to sign up for the MS Security Bulletin Service," Taylor said. Sheehan, meanwhile, said he is advising any affected users to update their anti-virus platforms and "push down the updates to the client machines. They then need to remove the worm and patch the infected systems." He also would advise reviewing "firewall rules sets to ensure that they don't allow the ports mentioned into the network," he said. "Unfortunately, the worm can get into the enterprise via VPN (virtual private networks), laptops, unsecured remote access and multitude of other avenues. "This comes down to security policies and procedures and how they are enforced and practiced within the client's network, said Sheehan. -

Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.

Your access to unlimited CUTimes.com content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking credit union news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Shared Accounts podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical coverage of the commercial real estate and financial advisory markets on our other ALM sites, GlobeSt.com and ThinkAdvisor.com
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.