» GC Stats |
Members: 331,060
Threads: 115,704
Posts: 2,207,365
|
Welcome to our newest member, elizabthshulze5 |
|
 |

03-31-2009, 04:32 PM
|
GreekChat Member
|
|
Join Date: Jan 2001
Location: Who you calling "boy"? The name's Hand Banana . . .
Posts: 6,984
|
|
Also, Conficker has been transmitting for months, and it's most likely just going to change parameters to start a new set of pop-ups or a DDoS attack . . . you should get checked, but it likely isn't the robot menace 60 Minutes indicated.
|

03-31-2009, 04:39 PM
|
GreekChat Member
|
|
Join Date: May 2002
Location: A dark and very expensive forest
Posts: 12,737
|
|
Quote:
Originally Posted by KSig RC
. . . but it likely isn't the robot menace 60 Minutes indicated.
|
Are you suggesting that 60 Minutes is being alarmist?! Perish the thought!
__________________
AMONG MEN HARMONY
18▲98
|

03-31-2009, 05:34 PM
|
GreekChat Member
|
|
Join Date: Jan 2001
Location: Who you calling "boy"? The name's Hand Banana . . .
Posts: 6,984
|
|
Quote:
Originally Posted by MysticCat
Are you suggesting that 60 Minutes is being alarmist?! Perish the thought!
|
I KNOW!
Plus, why would I listen to what 75 year olds have to say about modern computing technology? I mean, seriously . . .
|

03-31-2009, 09:38 PM
|
GreekChat Member
|
|
Join Date: Aug 2003
Location: Michigan
Posts: 15,845
|
|
The problem is, we really don't know what it's going to do. It may end up being no big deal at all, but better safe than sorry, right? The variants have become more and more complex. It's a pretty fascinating worm for us IT geeks. The theories are that it's likely to go after big corporate systems in search of mass numbers of credit card numbers, social security numbers, etc. for financial gain.
ETA: For all we know, it's going to send out a pop up that says "April Fools!"
Last edited by AGDee; 03-31-2009 at 09:41 PM.
|

04-01-2009, 01:15 AM
|
GreekChat Member
|
|
Join Date: Jan 2001
Location: Who you calling "boy"? The name's Hand Banana . . .
Posts: 6,984
|
|
Quote:
Originally Posted by AGDee
The problem is, we really don't know what it's going to do. It may end up being no big deal at all, but better safe than sorry, right? The variants have become more and more complex. It's a pretty fascinating worm for us IT geeks. The theories are that it's likely to go after big corporate systems in search of mass numbers of credit card numbers, social security numbers, etc. for financial gain.
|
Of course it's better to clean it than deal with the consequences, especially for someone like you who is responsible for many idiots' computers - however, the fact that the hole was so easily patched, plus the 'early' activation of signal/ping, indicates that while its delivery and ability to morph (plus the unprecedented ability to move 'laterally' across networked computers) are pretty incredible, the actual threat level is most likely moderate, right?
Besides, Russians are already stealing credit card information with more complex worms . . .
Quote:
Originally Posted by AGDee
ETA: For all we know, it's going to send out a pop up that says "April Fools!" 
|
This would absolutely be hilarious.
|

04-01-2009, 05:47 AM
|
GreekChat Member
|
|
Join Date: Aug 2003
Location: Michigan
Posts: 15,845
|
|
The latest version of this worm makes it look like a machine has been patched when a scan is run. One would think that Code Red, Blaster and Sasser would have everybody installing security patches regularly in some automated fashion. Microsoft provides free tools for admins to do this easily. There really is no excuse, yet networks like Southwest Airlines and CBS were infected anyway. It's the kind of thing that IT personnel should lose their jobs over because it's a very basic function of IT security and so easy to implement and FREE to implement as far as software solutions. Approving and applying security patches to all of our systems is simply a routine part of my job (including on our Ubuntu Linux and MAC systems because yes, there are security patches for Linux and MACs too!). While my department has a system down, I can't say that for all the departments in my system.
Another fairly unique attribute of this one is the ability to spread through USB flash drives. There are many that can spread through network drives easily, but generally, unless you transferred an infected file onto a USB drive unknowningly, you wouldn't have gotten a virus through the USB drive.
This whole thing has confirmed my decision to get my Masters in IT security. It was like a huge adrenalin rush for me yesterday to double check all of our systems through auditing our security logs to identify which of our systems weren't patched and why (mostly laptops that simply haven't been turned on in in months and months). I believe this is my next niche
|
 |
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is Off
|
|
|
|