|i-Bulletin - Ensure You're Protected Against the Current Windows Worm Threat|
It's already believed to have infected nearly 9 million machines across the world and this number is rising at an alarming rate. The virus targets the Windows operating system only and Microsoft have released a patch, MS08-067, to combat this virus (please see link below).
What's also concerning is that the Virus has the ability to break weak passwords that are commonly used - 12345, PASSWORD, QWERTY, etc. which then exposes your network to greater threats.
The virus can also be spread with USB memory sticks, putting those that work from home & office or for different firms, at greater risk.
We recommend that all users ensure their anti-virus products are up-to-date and install Microsoft's MS08-067 patch. We would also highly recommend that all home PC's are patched and have up-to-date anti-virus software.
Below is a more detailed explanation of how the virus actually works. If you require any further information related to this threat or any other aspect of network security, please don't hesitate to contact us and one of our technical advisors will be pleased to help.
The Technical Bit
The worm searches for a Windows file called "services.exe", and then embeds itself as part of that code. From there, it is able to burrow deep into the operating system, even changing the System Registry, which stores settings and options for Windows, to trick the machine into running the infected program.
Once the worm has taken hold of the computer, it makes it very hard for users to restore their machine to a safe point before their operating system was infected, and automatically starts to download more malicious programs, that further compromise the PC, from hackers' websites.
MS08-067 for Windows XP SP1 & SP2. - This patch is not required if you have Windows Vista
If you have concerns about your current security procedures or would be interested in discussing our fully managed IT services then please contact us for a FREE, no obligation consultation.