- Blaster (computer worm)
The Blaster Worm (also known as Lovsan or Lovesan) was a
computer worm that spread on computers running theMicrosoft operating systems :Windows XP andWindows 2000 , duringAugust 2003 .The worm was first noticed and started spreading on
August 11 ,2003 . The rate that it spread increased until the number of infections peaked onAugust 13 ,2003 . Filtering by ISPs and widespread publicity about the worm curved the spread of Blaster.On
August 29 ,2003 , Jeffrey Lee Parson, an 18-year-old fromHopkins, Minnesota was arrested for creating the B variant of the Blaster worm; he admitted responsibility and was sentenced to an 18-month prison term in January 2005.Effects
The worm was programmed to start a
SYN flood onAugust 15 ,2003 against port 80 of windowsupdate.com, thereby creating adistributed denial of service attack (DDoS) against the site. The damage to Microsoft was minimal as the site targeted was windowsupdate.com instead of windowsupdate.microsoft.com to which it was redirected. Microsoft temporarily shut down the targeted site to minimize potential effects from the worm.The worm spread by exploiting a
buffer overflow in the DCOM RPC service on the affected operating systems, for which a patch had been released one month earlier in [http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx MS03-026] and later in [http://www.microsoft.com/technet/security/bulletin/MS03-039.mspx MS03-039] .The worm contains two messages hidden in strings. The first:
"I just want to say LOVE YOU SAN!!"
is why the worm is sometimes called the Lovesan worm.The second:"billy gates why do you make this possible ? Stop making money"
is a message to
"and fix your software!!"Bill Gates , the co-founder of Microsoft and the target of the worm.ide effects
Although the worm can only spread on systems running Windows 2000 or Windows XP (32 bit) it can cause instability in the RPC service on systems running
Windows NT , Windows XP (64 bit), andWindows Server 2003 . In particular, the worm does not spread in Windows Server 2003 because it was compiled with the /GS switch, which detected the buffer overflow and shut the RPCSS process down. [http://blogs.msdn.com/michael_howard/archive/2004/05/23/139987.aspx] If the worm detects a connection to the Internet (regardless of dial-up or broadband), this can even lead to the system becoming so unstable that it displays the following message and then restarts (usually after 60 seconds):cquote|1=System Shutdown:
This system is shutting down. Please save all work in progress and log off. Any unsaved changes will be lost. This shutdown was initiated by NT AUTHORITYSYSTEM
Time before shutdown: hh:mm:ss
Message:
Windows must now restart because the Remote Procedure Call(RPC) Service terminated unexpectedly.
This was the first indication many users had an infection; it often occurred a few minutes after every startup on compromised machines. A simple resolution to stop countdown is to run "shutdown -a" command.
ee also
*
Timeline of notable computer viruses and worms
*List of convicted computer criminals
*SpamExternal links
* [http://www.cert.org/advisories/CA-2003-20.html CERT Advisory CA-2003-20]
* [http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html Security Response site from Symantec]
* [http://www.vnunet.com/vnunet/news/2123165/fbi-arrests-stupid-blaster-b-suspect Article from Vnunet]
* [http://www.microsoft.com/security/incident/blast.mspx What You Should Know About Blaster]
* [http://www.eweek.com/article2/0,1895,1896373,00.asp Two Years Later, Blaster Worm Still Squirming]
* [http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_security_notice09186a00801aedd6.html More information for IT pros about Blaster Worm Virus from the Cisco Systems web site]
* [http://healyourchurchwebsite.com/2003/08/18/linux-based-approach-to-fixing-msblaster-worm-infection/ Linux-based approach to fixing MSBlaster Worm infection]
Wikimedia Foundation. 2010.