Feeds

Blueyonder suspends Code Red infected users

Tough but fair?

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

Updated Cable broadband outfit blueyonder is taking a tough line on dealing with the Code Red by suspending consumers found to have been infected by the worm.

In a notice to customers, blueyonder states that infection of some of its customer's machines "has at times resulted in poor performance for our users" and poses a "significant risk of failure of service".

Because of this the Telewest-owned outfit announced it will scan its cache log files to identify customers infected with Code Red, who will then find their service suspended in order to protect other users.

"Customers found to be infected with the Code Red virus will be suspended immediately and have their accounts suspended until they have patched their machines accordingly," the notice states.

The program was introduced yesterday and so far Telewest has identified 51 users who have been infected with Code Red whose machines have been "hammering Telewest's caches". These users have received an email informing them the plug has been pulled on them and telling them how to get their machines reconnected. They'll also receive a letter to the same effect.

Our first instincts are to support what Telewest has done as a matter of enforcing some measure of civic hygiene in Internet use by its customers. Though some might dislike the approach, if it works, so much the good.

The rider we'd put on this one is that Telewest's procedures in identifying infected machines need to be sound and the technical support it has offered helps users work through any snags. ®

Update

Many readers have pointed out that Telewest may have put users in a Catch 22 position by asking them to download the required patches, when their Internet service has been cut off.

We got through to a Telewest spokesman today who users whose service has been suspended can get themselves reconnected by phoning up Telewest technical support.

Tech support staff will open up a connection to the relevant Web sites and talk users through a procedure for fixing their systems.

Even while their connection is suspended, users can pick up their email remotely via blueyonder's Webmail interface or via remote access from another ISP or mail service.

Related Stories

Code Red busting code gets cool reception
Qwest tries to worm its way off hook for Code Red outages
MS internal network whacked by Code Red
Code Red and the Cisco Side Effect
Son of Code Red is born
Internet survives Code Red
FBI blows Code Red all-clear

External Links

CERT advisory with links to Microsoft's patches

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.