A lot of money. Especially when you consider that their product was virtually undetected before this episode.
-ASB: http://xeesm.com/AndrewBaker Sent from my Verizon Smartphone -----Original Message----- From: Jonathan Link <[email protected]> Date: Wed, 17 Feb 2010 10:35:20 To: NT System Admin Issues<[email protected]> Subject: Re: MS10-015 on W2K3 systems? Downtime costs root kit authors money, too! On Wed, Feb 17, 2010 at 10:06 AM, Steven M. Caesare <[email protected]>wrote: > LOL…. > > > > Malware patches to restore functionality… awesome. > > > > -sc > > > > *From:* [email protected] [mailto:[email protected]] > *Sent:* Wednesday, February 17, 2010 9:02 AM > > *To:* NT System Admin Issues > *Subject:* Re: MS10-015 on W2K3 systems? > > > > > > http://blogs.pcmag.com/securitywatch/2010/02/rootkit_authors_issue_patch_fo.php > > Since late last week, it has been reported that the machines which > blue-screened after this MS update were found to have been infected with a > root kit called "TDSS". > > This morning, I see a report that the authors of this root kit have > developed a patch for it. So, rooted machines should all boot as "normal" > now. > -- > Richard D. McClary > Systems Administrator, Information Technology Group > *ASPCA®* > 1717 S. Philo Rd, Ste 36 > Urbana, IL 61802 > > [email protected] > > P: 217-337-9761 > C: 217-417-1182 > F: 217-337-9761 > www.aspca.org > > > The information contained in this e-mail, and any attachments hereto, is > from The American Society for the Prevention of Cruelty to Animals® (ASPCA > ®) and is intended only for use by the addressee(s) named herein and may > contain legally privileged and/or confidential information. If you are not > the intended recipient of this e-mail, you are hereby notified that any > dissemination, distribution, copying or use of the contents of this e-mail, > and any attachments hereto, is strictly prohibited. If you have received > this e-mail in error, please immediately notify me by reply email and > permanently delete the original and any copy of this e-mail and any printout > thereof. > > > "Christopher Bodnar" <[email protected]> wrote on 02/17/2010 > 07:52:41 AM: > > > > Just talking about server OS here, not XP. > > > > We deployed this to our test systems last week (about 150 systems), > > with no issues. Preparing for production this weekend, and with all > > the talk about this patch, I just wanted to see if anyone did run > > into issues with W2K3 systems. And if so, what was the scale? > > > > Thanks, > > > > > > > > Chris Bodnar, MCSE > > Systems Engineer > > Distributed Systems Service Delivery - Intel Services > > Guardian Life Insurance Company of America > > Email: [email protected] > > Phone: 610-807-6459 > > Fax: 610-807-6003 ----------------------------------------- This > > message, and any attachments to it, may contain information that is > > privileged, confidential, and exempt from disclosure under > > applicable law. If the reader of this message is not the intended > > recipient, you are notified that any use, dissemination, > > distribution, copying, or communication of this message is strictly > > prohibited. If you have received this message in error, please > > notify the sender immediately by return e-mail and delete the > > message and any attachments. Thank you. > > > > > > > > > > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
