| Subject: Re: Calling networking specialists please... |
| From: "OldBoy" <boels069069@planet.nl> |
| Date: 31/08/2003, 08:52 |
"Dom " <dompqy@blueyonder.co.uk> wrote in message
news:p9g4b.718$Ok2.6940742@news-text.cableinet.net...
Gary Heston wrote:
In article <birofc$nak$2@hercules.btinternet.com>,
Nick M V Salmon <spam_dump@btinternet.com> wrote:
"BW" <noone@nowhere.com> wrote
Don't know if this is it, but I have seen "Pings" at about a 2 / min
rate
hitting my firewall in the same time frame. [ ... ]
Blaster worm, it figures, I'd thought it might be that because the
problem
started at roughly the same time that was set lose 'into the wild'. :-/
It's not MS Blaster, it's the SOBIG.F email worm. MS Blaster and Wachia
(the
anti-blaster disaster) target the RPC port instead of doing a ping.
The Welchia worm tries to use pings to locate other machines that
may be infected:
<http://securityresponse.symantec.com/avcenter/venc/data/w32.welchia.worm.ht
ml>
I have seen two cases of corporate networks infected with this one and
in both cases the networks were virtually unusable due to the number
of ICMP packets being sent.
I was lucky - I run W98 and Linux - neither of which can get infected
with these viruses.
That goes for the other Window variants when properly maintained.
MS published patches in mid-July!
[snip]
Gr. Jan