A lot of money.  

Especially when you consider that their product was virtually undetected before 
this episode. 

 
-ASB: http://xeesm.com/AndrewBaker
 Sent from my Verizon Smartphone

-----Original Message-----
From: Jonathan Link <[email protected]>
Date: Wed, 17 Feb 2010 10:35:20 
To: NT System Admin Issues<[email protected]>
Subject: Re: MS10-015 on W2K3 systems?

Downtime costs root kit authors money, too!

On Wed, Feb 17, 2010 at 10:06 AM, Steven M. Caesare <[email protected]>wrote:

>  LOL….
>
>
>
> Malware patches to restore functionality… awesome.
>
>
>
> -sc
>
>
>
> *From:* [email protected] [mailto:[email protected]]
> *Sent:* Wednesday, February 17, 2010 9:02 AM
>
> *To:* NT System Admin Issues
> *Subject:* Re: MS10-015 on W2K3 systems?
>
>
>
>
>
> http://blogs.pcmag.com/securitywatch/2010/02/rootkit_authors_issue_patch_fo.php
>
> Since late last week, it has been reported that the machines which
> blue-screened after this MS update were found to have been infected with a
> root kit called "TDSS".
>
> This morning, I see a report that the authors of this root kit have
> developed a patch for it.  So, rooted machines should all boot as "normal"
> now.
> --
> Richard D. McClary
> Systems Administrator, Information Technology Group
> *ASPCA®*
> 1717 S. Philo Rd, Ste 36
> Urbana, IL  61802
>
> [email protected]
>
> P: 217-337-9761
> C: 217-417-1182
> F: 217-337-9761
> www.aspca.org
>
>
> The information contained in this e-mail, and any attachments hereto, is
> from The American Society for the Prevention of Cruelty to Animals® (ASPCA
> ®) and is intended only for use by the addressee(s) named herein and may
> contain legally privileged and/or confidential information. If you are not
> the intended recipient of this e-mail, you are hereby notified that any
> dissemination, distribution, copying or use of the contents of this e-mail,
> and any attachments hereto, is strictly prohibited. If you have received
> this e-mail in error, please immediately notify me by reply email and
> permanently delete the original and any copy of this e-mail and any printout
> thereof.
>
>
> "Christopher Bodnar" <[email protected]> wrote on 02/17/2010
> 07:52:41 AM:
>
>
> > Just talking about server OS here, not XP.
> >
> > We deployed this to our test systems last week (about 150 systems),
> > with no issues.  Preparing for production this weekend, and with all
> > the talk about this patch, I just wanted to see if anyone did run
> > into issues with W2K3 systems. And if so, what was the scale?
> >
> > Thanks,
> >
> >
> >
> > Chris Bodnar, MCSE
> > Systems Engineer
> > Distributed Systems Service Delivery - Intel Services
> > Guardian Life Insurance Company of America
> > Email: [email protected]
> > Phone: 610-807-6459
> > Fax: 610-807-6003 ----------------------------------------- This
> > message, and any attachments to it, may contain information that is
> > privileged, confidential, and exempt from disclosure under
> > applicable law. If the reader of this message is not the intended
> > recipient, you are notified that any use, dissemination,
> > distribution, copying, or communication of this message is strictly
> > prohibited. If you have received this message in error, please
> > notify the sender immediately by return e-mail and delete the
> > message and any attachments. Thank you.
>
> >
> >
>
>
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to