News

Opinion: Dog Days of September?

It's looking like September may be a replay of August, with nearly identical threats ready to swamp IT. Hopefully this time, the painful experiences of last month will help us avoid another IT catastrophe.

The new threats are variations on the same ones that the U.K.-based digital risk firm mi2g says made August the most costly month ever for malware damage. The combination of the DCOM RPC flaw in Windows exploited by MS Blast and the mass-mailing worm Sobig.F combined for an estimated $32.8 billion in economic damages, according to mi2g. The firm attributed most of that, $29.7 billion, to Sobig, which flooded corporate e-mail systems and user inboxes with spam-like, virus-bearing messages.

While the MS Blaster worm prodded most organizations into getting up to date on the MS03-026 patch that protects Windows against the DCOM RPC flaw, that patch no longer provides enough protection. Microsoft revealed last week that the flaw is much broader than its security team originally thought. A new security bulletin, MS03-039, patches several additional avenues for worm writers to automatically take control of remote systems. If you haven't already jumped on this patch, I can't urge you strongly enough to drop whatever you're doing and start testing it.

One significant thing to note is a new tool with MS03-039 for scanning networks to make sure all the computers on it have the patch. In some cases, the scanning tool Microsoft prepared for MS03-026 lists computers patched with the more recent MS03-039 patch as still vulnerable. Be sure to replace the new scanner for the old one, so you're not rejecting systems that are actually safer than what you're checking for.

We had 25 or 26 days between the availability of MS03-026 and the emergence of the Blaster worm, an unusually long time considering the juiciness of the vulnerability. We're currently on day five for the availability of this new patch for an equally juicy problem. This is a race that you have to win.

Microsoft's new patch can be found here:
www.microsoft.com/technet/security/bulletin/MS03-039.asp.

Sept. 10 was a good day for most e-mail administrators and many of us with highly public e-mail addresses. The intolerable flood of Sobig.F e-mails finally tapered off last week as the mass-mailing worm hit its automatic shut-off date for seeking out new victim systems. But it's an ominous break. All year, a new Sobig variant has quickly followed the suicide date of the last variant. You'll probably get news of the next Sobig variant when your e-mail server spikes, but keep updating your anti-virus software anyway just in case your vendor gives you half a step this time. We can always hope.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • First Chromium-Based Edge Browser Beta Release Now Available

    Microsoft Edge Insider Program participants now have access to the Beta Channel release of Microsoft's Chromium-based Edge Web browser on the Windows and Mac platforms.

  • Microsoft Planning To Answer Windows Virtual Desktop Questions Next Week

    Microsoft has set aside time to answer questions about its emerging Windows Virtual Desktop service on Wednesday of next week, according to an announcement.

  • With EPYC Rome Chips, AMD Could Eclipse Intel in Datacenter

    AMD's high-profile EPYC 7002 launch has datacenter analysts wondering if the end of Intel's long reign is nigh.

  • Microsoft Buys jClarity for Azure-Based Java Workloads

    In a bid to support its "continued contributions to open source while driving increased performance for Java workloads on Azure," Microsoft on Monday announced its acquisition of jClarity.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.