A real Virus warning - not messing about...

The virus will try to connect on 443 to online-upd.at (87.117.205.62) to obtain mutations. It is advisable to block/blacklist this as an extra precaution.
 
You only need one rogue PC which is behind the curve on AV updates (and a dumb user) and it can get in. Trouble is if that one PC has access to a share it will change files for malicious shortcuts. Assuming all other PCs are up-to-date, they will now start throwing virus alerts when users try to access their files. Cue lots of calls to the help desk and a repair job on the file share.
 
You only need one rogue PC which is behind the curve on AV updates (and a dumb user) and it can get in. Trouble is if that one PC has access to a share it will change files for malicious shortcuts. Assuming all other PCs are up-to-date, they will now start throwing virus alerts when users try to access their files. Cue lots of calls to the help desk and a repair job on the file share.

all our machines were up to date. in this case it was symantec who was behind the curve on updates. We have pretty good spam protection, but of course you can't stop them all. We have plenty of dumb users...

But I suppose someone has to get it first...

their rapid release highlighted thumbs and the variants but the release as of this morning is now picking up the shylock trojan. it seems that shylock might be distributing the thumbs.db2 - file im guessing of course, just seems like quite the coincidence.
 
this thread has much more detail;

https://community.mcafee.com/thread/47666?start=0&tstart=0

We appear to be over the worst. the AV blocking did the trick. We're currently updating all AV clients to the newer version, but still keeping a close eye on the AV reports and web access logs, just in case.

If anyone gets stuck with this, trust me an email and I'll offer some advice first hand.
 
The AV finally squashed it. I had to do a deep level scan on our terminal servers and manually remove some string entries in the common load points manually as our sep power remover tool couldn't detect it.

all good now.
 
Far from 0day.

Oracle Java SE Rhino Script Engine Remote Code Execution Vulnerability (CVE-2011-3544) Patched by Oracle in October 2011.
Oracle Java SE Remote Java Runtime Environment Code Execution Vulnerability (CVE-2012-0507): Patched by Oracle in February 2012.

Why doesn't anyone take patching seriously? :(

vJcOi.png
 
Maybe if Java Patches weren't so obtrusive and disruptive, Patch Adoption wouldn't be such an issue :(
 
Java doesn't even get on my machines these days. Anything that requires it for installation ... doesn't get installed.

I note Oracle have finally got off their backsides and provided a patch today though.
 
Maybe if Java Patches weren't so obtrusive and disruptive, Patch Adoption wouldn't be such an issue :(

This is the problem. They should silently update.

Adobe Flash/Reader and Java are the main security holes on machines these days
 
Back
Top Bottom