Last week went down as one of the worst computer security weeks ever, as a spate of new worms crippled corporate and government networks that rely on Microsoft software.The attacks, which came a week after the damaging Blaster (or LovSan) worm struck, included a variant on that intruder and with another worm designed to save users from Blaster but instead wound up clogging networks (see graphic).Meanwhile, a spinoff of the SoBig mass-mailer worm, tricked victims into opening attachments to so that it could grab their Outlook address book to mail itself again. VeriSign reported that SoBigF, programmed to send mail traffic through one of the company’s root DNS servers, caused a 20-fold spike in traffic between Tuesday and Wednesday. (Security watchers warned Friday, just before press time, that SoBig.F carries a Trojan it might use to attack an unknown target later that day.)Among those networks feeling the pain last week was the Navy Marine Corps Intranet (NMCI), used by about 100,000 personnel. It was saturated for three days with scanning caused by Welchia, a worm with a mission to use Blaster-like techniques to break into computers to disinfect machines hit by Blaster and then patch them. Welchia infected tens of thousands of NMCI computers. “It was pinging away, trying to grab a patch from Microsoft,” says Capt. Chris Christopher. “The traffic was getting too heavy, and it affected network performance.”NMCI desktop computers weren’t affected, but network capacity wasn’t restored in large part until last Thursday. The massive cleanup effort involved patching machines for the Microsoft vulnerabilities Welchia exploited, as well as ensuring anti-virus signatures were place. The NMCI uses Symantec’s anti-virus products, but Symantec didn’t have the signature update for Welchia ready until several hours after it hit, Christopher says.Blaster hits airline systemSeparately, a variant on the Blaster virus affected about half of Air Canada’s phone-reservation system and some airport check-in operations last Tuesday, even causing some flights to be delayed or canceled. CSX, the third largest railroad company in North America, also blamed worms for creating transportation delays.According to CSX, the worm outbreaks mainly hit its network-supporting applications used for dispatch and signal systems operated by the CSX Transportation division. The network saturation caused CSX to halt passenger and train traffic, including morning commuter service into the Washington, D.C., area.In light of the new attacks and the Blaster infections, Microsoft has started a fresh dialogue about how it might change its patching strategy, at least when it comes to home computers outfitted with XP (see related story). That operating system has a feature to automatically notify an end user that a software patch is needed and apply it.A Microsoft spokesman says the company is pondering whether to alter this feature in future releases so that it would work by default. The company says it believes this method would be more effective instead by applying the patch because warnings often are ignored. Microsoft was looking for feedback on that idea, which it acknowledged could affect the corporate world where XP also is increasingly used.In terms of the Blaster worm, which was programmed to continuously launch a denial-of-service attack against the Microsoft windowsupdate.com URL on Aug. 16, the company disabled the targeted link to preserve the main portion of the site. However, that URL won’t be available for the foreseeable future.As to the question of Dumaru – a worm launched last week that pretended to be from Microsoft but carried a dangerous Trojan as an attachment – Microsoft says it never sends out attachments in any official e-mail in a public mass mailing. Under attack Four new worms and viruses created havoc on computer networks last week. Virus/worm Description Lovsan.D Variant of LovSan (also known as Blaster, MSBlast, LoveSAN) with an attachment called mspatch.exe instead of msblast.exe. This worm exploits the same Microsoft remote procedure call (RPC) vulnerability; its scanning causes network congestion. Welchia (also known as Nachi) Uses RPC hole to infect unpatched machines running Microsoft software by exploiting the WebDAV vulnerability, with the intent of killing Blaster worm infestations and downloading the Microsoft patch. But it causes network congestion through scanning. SoBig.F Fifth variant of the SoBig.A worm first spotted in January, SoBig.F is a mass mailer that tricks victims into opening attachments, such as “Wicked Screensaver,” then installs a backdoor, while grabbing directory addresses to mail itself to new victims. It clogs mail servers and mailboxes. Dumaru A mass-mailer worm that fakes its way into a user’s trust as spoofed mail from support@microsoft.com, but when the attachment is opened, installs a backdoor that lets the virus writer control the machine. Related content news analysis Western Digital keeps HDDs relevant with major capacity boost Western Digital and rival Seagate are finding new ways to pack data onto disk platters, keeping them relevant in the age of solid-state drives (SSD). By Andy Patrizio Dec 06, 2023 4 mins Enterprise Storage Data Center news analysis Global network outage report and internet health check Cisco subsidiary ThousandEyes, which tracks internet and cloud traffic, provides Network World with weekly updates on the performance of ISPs, cloud service providers, and UCaaS providers. By Ann Bednarz and Tim Greene Dec 06, 2023 286 mins Networking news analysis Cisco uncorks AI-based security assistant to streamline enterprise protection With Cisco AI Assistant for Security, enterprises can use natural language to discover policies and get rule recommendations, identify misconfigured policies, and simplify complex workflows. By Michael Cooney Dec 06, 2023 3 mins Firewalls Generative AI Network Security news Nvidia’s new chips for China to be compliant with US curbs: Jensen Huang Nvidia’s AI-focused H20 GPUs bypass US restrictions on China’s silicon access, including limits on-chip performance and density. By Anirban Ghoshal Dec 06, 2023 3 mins CPUs and Processors Technology Industry Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe