On 7 Oct 2011 at 11:49, Micheal Espinola Jr wrote:
>
> No specific sites... well, actually I /can/ get the IP of one of the
> sites. The drive-by added bogus google and bing entries to the hosts
> file in an effort to have another vector on system [re]infection.
> Malwarebytes promptly blocks access to the Romainian IP in question.
>
> Not admin, not aware of any specific unpatched vulnerabilities - but its
> possible. I've seen the same set of infections on 4 systems in the past two
> weeks. These were all at different medical/dental clients.
Were their 3rd-party Internet-facing programs up to date? I'm thinking mostly
of Adobe Reader, Adobe Flash, and Java. In my experience users don't update
these and sysadmins for small clients often don't either.
99.8% of Commercial Exploits caused by a few unpatched apps
According to an article by Danish security company CSIS, most Windows
infections by commercial malware are the result of failure to patch a few
vulnerable apps: Java JRE (37%), Adobe Reader (and Acrobat) (32%), Adobe
Flash (16%), Internet Explorer (10%), Windows Help (3%), and Apple
Quicktime (2%). MSIE and Windows Help are patched automatically by Windows
Update (which home users should have enabled and which business sysadmins
should be managing), but the other four applications all need to be
updated separately.
http://www.dslreports.com/forum/r26386723-99.8-of-Commercial-Exploits-caused-by-a-few-unpatched-apps
--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin