Feeds

Blueyonder suspends Code Red infected users

Tough but fair?

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Updated Cable broadband outfit blueyonder is taking a tough line on dealing with the Code Red by suspending consumers found to have been infected by the worm.

In a notice to customers, blueyonder states that infection of some of its customer's machines "has at times resulted in poor performance for our users" and poses a "significant risk of failure of service".

Because of this the Telewest-owned outfit announced it will scan its cache log files to identify customers infected with Code Red, who will then find their service suspended in order to protect other users.

"Customers found to be infected with the Code Red virus will be suspended immediately and have their accounts suspended until they have patched their machines accordingly," the notice states.

The program was introduced yesterday and so far Telewest has identified 51 users who have been infected with Code Red whose machines have been "hammering Telewest's caches". These users have received an email informing them the plug has been pulled on them and telling them how to get their machines reconnected. They'll also receive a letter to the same effect.

Our first instincts are to support what Telewest has done as a matter of enforcing some measure of civic hygiene in Internet use by its customers. Though some might dislike the approach, if it works, so much the good.

The rider we'd put on this one is that Telewest's procedures in identifying infected machines need to be sound and the technical support it has offered helps users work through any snags. ®

Update

Many readers have pointed out that Telewest may have put users in a Catch 22 position by asking them to download the required patches, when their Internet service has been cut off.

We got through to a Telewest spokesman today who users whose service has been suspended can get themselves reconnected by phoning up Telewest technical support.

Tech support staff will open up a connection to the relevant Web sites and talk users through a procedure for fixing their systems.

Even while their connection is suspended, users can pick up their email remotely via blueyonder's Webmail interface or via remote access from another ISP or mail service.

Related Stories

Code Red busting code gets cool reception
Qwest tries to worm its way off hook for Code Red outages
MS internal network whacked by Code Red
Code Red and the Cisco Side Effect
Son of Code Red is born
Internet survives Code Red
FBI blows Code Red all-clear

External Links

CERT advisory with links to Microsoft's patches

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.