Close-up: Worms

Microsoft Corp., the Federal Computer Incident Response Center and many other organizations first put out alerts back in mid-July for the vulnerability used by the Blaster worm and the Welchia variant. Microsoft made the patch available at that time.

The original worm was easier to block because it only used one of the exploits for the vulnerability and did not spread rapidly. The variant, however, rooted quickly through networks, looking for Blaster by several means in order to remove it and automatically apply the Microsoft patch. "That generates a huge amount of traffic inside the organization...and it can take weeks to a month to roll out a patch," said Vincent Weafer, senior director of Symantec Corp.'s Security Response Center. There are still several other ways to exploit the vulnerability, so systems administrators and home users should continue working to apply the patch on any untouched systems, warned Scott Paisley, technology director for Internet Security Systems.

Featured

  • FCW Perspectives
    tech process (pkproject/Shutterstock.com)

    Understanding the obstacles to automation

    As RPA moves from buzzword to practical applications, agency leaders say it’s forcing broader discussions about business operations

  • Federal 100 Awards
    Federal 100 logo

    Fed 100 nominations are now open

    Help us identify this year's outstanding individuals in federal IT.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.