http://blogs.pcmag.com/securitywatch/2010/02/rootkit_authors_issue_patch_fo.php

Since late last week, it has been reported that the machines which 
blue-screened after this MS update were found to have been infected with a 
root kit called "TDSS".

This morning, I see a report that the authors of this root kit have 
developed a patch for it.  So, rooted machines should all boot as "normal" 
now.
--
Richard D. McClary
Systems Administrator, Information Technology Group 
ASPCA®
1717 S. Philo Rd, Ste 36
Urbana, IL  61802
 
[email protected]
 
P: 217-337-9761
C: 217-417-1182
F: 217-337-9761
www.aspca.org
 
The information contained in this e-mail, and any attachments hereto, is 
from The American Society for the Prevention of Cruelty to Animals® (ASPCA
®) and is intended only for use by the addressee(s) named herein and may 
contain legally privileged and/or confidential information. If you are not 
the intended recipient of this e-mail, you are hereby notified that any 
dissemination, distribution, copying or use of the contents of this 
e-mail, and any attachments hereto, is strictly prohibited. If you have 
received this e-mail in error, please immediately notify me by reply email 
and permanently delete the original and any copy of this e-mail and any 
printout thereof.
 

"Christopher Bodnar" <[email protected]> wrote on 02/17/2010 
07:52:41 AM:

> Just talking about server OS here, not XP. 
> 
> We deployed this to our test systems last week (about 150 systems), 
> with no issues.  Preparing for production this weekend, and with all
> the talk about this patch, I just wanted to see if anyone did run 
> into issues with W2K3 systems. And if so, what was the scale? 
> 
> Thanks, 
> 
> 
> 
> Chris Bodnar, MCSE
> Systems Engineer
> Distributed Systems Service Delivery - Intel Services
> Guardian Life Insurance Company of America
> Email: [email protected]
> Phone: 610-807-6459
> Fax: 610-807-6003 ----------------------------------------- This 
> message, and any attachments to it, may contain information that is 
> privileged, confidential, and exempt from disclosure under 
> applicable law. If the reader of this message is not the intended 
> recipient, you are notified that any use, dissemination, 
> distribution, copying, or communication of this message is strictly 
> prohibited. If you have received this message in error, please 
> notify the sender immediately by return e-mail and delete the 
> message and any attachments. Thank you. 
> 
> 
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to