Tuesday, August 12th
Day Two of 'MSBLAST', the Widespread Windows DCOM/RPC Internet Worm
More than 100,000 Windows systems infected worldwide. Internet usage being hampered by worm activity. Infected machines will begin a concerted distributed denial of service attack (DDoS) on the domain "windowsupdate.com" this coming Saturday the 16th.
However, since the correct domain name used by Windows systems is "windowsupdate.microsoft.com", Microsoft will be able to dodge this bullet simply by changing the IP address for "windowsupdate.com" to something benign, such as "127.0.0.1". Since this is equivalent to every machine's own local IP, the DDoS attack will go nowhere.
Our ShieldsUP Port Probe test will quickly
confirm that your port 135 is blocked from
remote access and possible exploitation.
We will soon have a new tool and tests to properly and fully address this new threat â Microsoft has not. Until then you are invited to send the following link to your friends and colleagues to have them use our free service to quickly check that their port 135 is NOT OPEN to the world's malicious hackers:
https://grc.com/x/portprobe=135
This link will instantly and easily test anyone's Internet-connected PC. "Open" is BAD, "Closed" or "Stealth" is safe.
http://grc.com/default.htm