I bet some smart antivirus company (*COUGH* Sunbelt) will probably reverse engineer the malware patch to help detect the rootkit now. J
John-AldrichTile-Tools From: Andrew S. Baker [mailto:[email protected]] Sent: Wednesday, February 17, 2010 11:18 AM To: NT System Admin Issues Subject: Re: MS10-015 on W2K3 systems? A lot of money. Especially when you consider that their product was virtually undetected before this episode. -ASB: http://xeesm.com/AndrewBaker Sent from my Verizon Smartphone _____ From: Jonathan Link <[email protected]> Date: Wed, 17 Feb 2010 10:35:20 -0500 To: NT System Admin Issues<[email protected]> Subject: Re: MS10-015 on W2K3 systems? Downtime costs root kit authors money, too! On Wed, Feb 17, 2010 at 10:06 AM, Steven M. Caesare <[email protected]> wrote: LOL.. Malware patches to restore functionality. awesome. -sc From: [email protected] [mailto:[email protected]] Sent: Wednesday, February 17, 2010 9:02 AM To: NT System Admin Issues Subject: Re: MS10-015 on W2K3 systems? http://blogs.pcmag.com/securitywatch/2010/02/rootkit_authors_issue_patch_fo. php Since late last week, it has been reported that the machines which blue-screened after this MS update were found to have been infected with a root kit called "TDSS". This morning, I see a report that the authors of this root kit have developed a patch for it. So, rooted machines should all boot as "normal" now. -- Richard D. McClary Systems Administrator, Information Technology Group ASPCAR 1717 S. Philo Rd, Ste 36 Urbana, IL 61802 [email protected] P: 217-337-9761 C: 217-417-1182 F: 217-337-9761 <http://www.aspca.org/> www.aspca.org The information contained in this e-mail, and any attachments hereto, is from The American Society for the Prevention of Cruelty to AnimalsR (ASPCAR) and is intended only for use by the addressee(s) named herein and may contain legally privileged and/or confidential information. If you are not the intended recipient of this e-mail, you are hereby notified that any dissemination, distribution, copying or use of the contents of this e-mail, and any attachments hereto, is strictly prohibited. If you have received this e-mail in error, please immediately notify me by reply email and permanently delete the original and any copy of this e-mail and any printout thereof. "Christopher Bodnar" <[email protected]> wrote on 02/17/2010 07:52:41 AM: > Just talking about server OS here, not XP. > > We deployed this to our test systems last week (about 150 systems), > with no issues. Preparing for production this weekend, and with all > the talk about this patch, I just wanted to see if anyone did run > into issues with W2K3 systems. And if so, what was the scale? > > Thanks, > > > > Chris Bodnar, MCSE > Systems Engineer > Distributed Systems Service Delivery - Intel Services > Guardian Life Insurance Company of America > Email: [email protected] > Phone: 610-807-6459 > Fax: 610-807-6003 ----------------------------------------- This > message, and any attachments to it, may contain information that is > privileged, confidential, and exempt from disclosure under > applicable law. If the reader of this message is not the intended > recipient, you are notified that any use, dissemination, > distribution, copying, or communication of this message is strictly > prohibited. If you have received this message in error, please > notify the sender immediately by return e-mail and delete the > message and any attachments. Thank you. > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
<<image001.jpg>>
<<image002.jpg>>
