Feeds

Disabling Windows Autorun - there's a right way and a wrong way

Redmond's Downadup protection

Top 5 reasons to deploy VMware with Tegile

After some confusion about exactly how Windows users can protect themselves against a prolific computer worm called Downadup, Microsoft security watchers are once again reiterating the steps for disabling the Autorun feature.

Downadup has managed to infect an estimated 9 million machines at last count using multiple attack vectors. Two of those vectors are USB flash drives and mapped network drives, which are booby-trapped with files that compromise machines that are configured to automatically connect to CD and DVD drives and other types of media.

Disabling the feature has long been a good idea, as the 2005 fiasco involving the Sony rootkit made clear. Those unfortunate enough to have Autorun configured - and the feature is turned on by default - found their machines were secretly infected by digital rights management software after playing certain Sony BMG CDs on their PCs. With Downadup spreading like wildfire, disabling Autorun is an even better idea than ever.

For the low-down on exactly how that's done, head over Microsoft Knowledge Base article 953252. The May 2008 article revises an earlier Knowledge Base item that didn't completely remove the dangers inherent in Autorun.

It would appear that the US Computer Emergency Readiness Team referred to that older article when it warned the world on Wednesday that Microsoft's instructions "are not fully effective" and "could be considered a vulnerability."

The group went on to give labored instructions for changing registry settings that disable all Autorun features. We're sure they work, but we can't imagine Aunt Mildred having the slightest clue how to pull them off. ®

Beginner's guide to SSL certificates

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?