Feeds

Microsoft releases Blaster clean-up tool

De-worming

  • alert
  • submit to reddit

The essential guide to IT transformation

Microsoft this week released a tool to clean up systems infected by the infamous Blaster worm and its sundry variants.

The software should eradicate the worm from infected Windows XP and Windows 2000 machines. However, users will still have to apply the original patch to prevent re-infection.

Normally, such clean-up technology is left to AV firms. But this isn't a normal viral epidemic: ISPs say the worm is still generating malicious traffic, months after its first appearance.

Having bought into the AV market last summer, Microsoft can no longer say the issue is somebody else's problem.

Blast off

As explained here, Microsoft's Windows Blaster Worm Removal Tool will disinfect machines infected with either the Blaster or Nachi worms. Nachi, released shortly after the first appearance of Blaster in August, was designed to patch vulnerable systems. Rather than help out, Nachi has instead become a serious nuisance. Its aggressive scanning behaviour blighted the operation of many networks - hence the need to kill the "cure", along with the original Blaster worm.

Pox-ridden PCs have a disproportionately large effect in generating malicious traffic - so anything that might result in fewer infected systems is to be welcomed. But let's not get ahead of ourselves: Microsoft's tool will not eradicate Blaster.

High-profile worms fade away but rarely die - as evidenced by continued sightings of the infamous Nimda worm, which is now well over two years old. ®

External Links

Blaster Worm Removal Tool for Windows XP and Windows 2000

Related Stories

Blaster rewrites Windows worm rules
Nachi worm infected Diebold ATMs
Telia blocks spam-sending Zombie PCs
The trouble with anti-virus

Next gen security for virtualised datacentres

More from The Register

next story
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.