The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Windows Worm hits and estimated 8.9m users.

    Discussion in 'Windows OS and Software' started by Full-English, Jan 19, 2009.

  1. Full-English

    Full-English Notebook Deity

    Reputations:
    1,227
    Messages:
    1,512
    Likes Received:
    8
    Trophy Points:
    56
    From the BBC:

    Microsoft information and patches regarding this:

    http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx
     
  2. DetlevCM

    DetlevCM Notebook Nobel Laureate

    Reputations:
    4,843
    Messages:
    8,389
    Likes Received:
    1
    Trophy Points:
    205
    I'm just thinking...
    Here the law becomes a bit of a farce.

    The security software companies can't disinfect infected computers they identify as that would be unauthorized use.
    But the "programmer" who programmed the worm most likely wont be caught...
    His worm is unauthorized use too...
     
  3. Wishmaker

    Wishmaker BBQ Expert

    Reputations:
    379
    Messages:
    1,848
    Likes Received:
    35
    Trophy Points:
    66
    Thanks for the heads up ;).
     
  4. WILLY S

    WILLY S I was saying boo-urns

    Reputations:
    478
    Messages:
    1,784
    Likes Received:
    0
    Trophy Points:
    55
    So what can these "hackers actually do? I guess they'd be able to bring sites down etc. but what do you think their goal would be in doing what their doing?
     
  5. Baserk

    Baserk Notebook user

    Reputations:
    2,503
    Messages:
    1,794
    Likes Received:
    1
    Trophy Points:
    56
    Making money.
    These guys aren't interested in fame or some l33t acknowledgement.
    At this moment zombies from this botnet haven't received 'instructions' yet but the possibilities are ranging from stealing passwords, credit card information, personal information or the proliferation of rogue software like AntiVirus2009 (and more of course).
     
  6. HerrKaputt

    HerrKaputt Elite Notebook User

    Reputations:
    444
    Messages:
    2,510
    Likes Received:
    0
    Trophy Points:
    55
    That's not very precise. The programmer, if caught, would likely be punished. The company, if it took those actions and got caught doing them, would also be punished. So the law is equal for both. The nuance here is that the company is way easier to catch than the programmer.
     
  7. DetlevCM

    DetlevCM Notebook Nobel Laureate

    Reputations:
    4,843
    Messages:
    8,389
    Likes Received:
    1
    Trophy Points:
    205
    Yes, if, if the programmer were caught.
    And what is the chance of that happening?
    Greater than zero but still low.
     
  8. Full-English

    Full-English Notebook Deity

    Reputations:
    1,227
    Messages:
    1,512
    Likes Received:
    8
    Trophy Points:
    56
    As Baserk says, money. As that is the reason most criminals commit crimes, to make money.

    I had a problem a couple of days ago, where someone hacked into my hotmail account, whether it was a trojan/virus/spambot or someone got lucky I don't know, but they sent emails from my account trying to sell electricals.
     
  9. Nocturnal310

    Nocturnal310 Notebook Virtuoso

    Reputations:
    792
    Messages:
    2,708
    Likes Received:
    0
    Trophy Points:
    0
    The only reason they dont disinfect the machines is because they wanna make money over the threat.

    they are worse than the Hackers.

    so how can i get infected by this worm over the internet?

    what domains to avoid?

    what precautions can i take?
     
  10. Baserk

    Baserk Notebook user

    Reputations:
    2,503
    Messages:
    1,794
    Likes Received:
    1
    Trophy Points:
    56
    Naturally most security software vendors are in it to make money.
    The fact that they don't disinfect affected computers by using the botnet infrastructure, is NOT because they want to make money but because they would have to take illegal action.
    No software vendor, in his right mind, would go to the dark side to do 'good'.

    You can take precautions as explained in one of my previous posts.
    Check the links on how infections occur.
    Cheers.
     
  11. Nocturnal310

    Nocturnal310 Notebook Virtuoso

    Reputations:
    792
    Messages:
    2,708
    Likes Received:
    0
    Trophy Points:
    0
    and i tried to install that MS patch for Vista SP1 but it says update is not for my system.
     
  12. Full-English

    Full-English Notebook Deity

    Reputations:
    1,227
    Messages:
    1,512
    Likes Received:
    8
    Trophy Points:
    56
    It doesn't specify in the article where it originates from or which sites so avoid, it sets up many sites with many names like mphtfrxs.net, imctaef.cc, and hcweu.org.

    Basically, you need to make sure your computer has the latest updates, and there is a specific patch (linked in the first post), and your anti-virus is up to date.
     
  13. Full-English

    Full-English Notebook Deity

    Reputations:
    1,227
    Messages:
    1,512
    Likes Received:
    8
    Trophy Points:
    56
    You've probably already got it on your system KB958644, was released 22/10/08.
     
  14. Shyster1

    Shyster1 Notebook Nobel Laureate

    Reputations:
    6,926
    Messages:
    8,178
    Likes Received:
    0
    Trophy Points:
    205
    That is demonstrably not true. The fact of the matter is, even absent any law to the contrary, affirmatively executing code on someone else's computer without that person's knowledge would be considered a violation of privacy that many well-meaning people would avoid; however, the fact remains that, as the law is written, going after malware by attempting to exterminate it on someone else's machine without that person's knowledge is, as others have pointed out, "unauthorized access" that is punishable.