NT Authority/RPC VIRUS !!!!

  • Thread starter Thread starter Craig Farrel
  • Start date Start date
C

Craig Farrel

This is a virus!! You MUST remove it from your system.
Then you can get the microsoft patch, but you need to
remove the virus.

Goto mcAfee or symantec:

This worm spreads by exploiting a recent vulnerability in
Microsoft Windows. The worm scans random ranges of IP
addresses on port 135. Discovered systems are targeted.
Exploit code is sent to those systems, instructing them
to download and execute the file MSBLAST.EXE from a
remote system via TFTP.
 
* Craig Farrel said:
This is a virus!! You MUST remove it from your system.
Then you can get the microsoft patch, but you need to
remove the virus.

Goto mcAfee or symantec:

This worm spreads by exploiting a recent vulnerability in
Microsoft Windows. The worm scans random ranges of IP
addresses on port 135. Discovered systems are targeted.
Exploit code is sent to those systems, instructing them
to download and execute the file MSBLAST.EXE from a
remote system via TFTP.

And please for gods sake patch your crappy windows sytems people, my
poor 2g hd in my firewall is running out of room logging infected
machines knocking at my door.

Jason
 
How in the hell can I go to any antivirus sites if my
system keeps shutting down every 45 minutes? It wont let
me have enough time to go anywhere or download anything.
Any ideas anyone?

Joe
 
Firstly,

Whenever your computer attempts to shutdown or reboot,
quickly:
Click the Start Button and then click RUN and type in
shutdown -a
and hit enter.
This should halt the rebooting problem temporarily.

As I understand, you have received the following error
messages when using your computer:

"This system is shutting down. Please save all work in
progress and log off. This shutdown was initiated by NT
Authority/System."

"Windows must restart because the Remote Procedure Call
(RPC) service terminated unexpectedly."

This is a known security issue which was first found on
July 15. There is currently an Internet Worm that is
taking advantage of this security issue. Microsoft
published the patch to fix this issue on July 16 for all
of the affected systems on our web site. For more
information, please refer to the following page:

Microsoft's latest Information on the Blaster Worm
including links for other Windows Operating Systems
http://www.microsoft.com/security/incident/blast.asp

For the latest information on this security bulletin
http://www.microsoft.com/security/security_bulletins/ms03-
026.asp

______________________________________________________

The resolution to this issue is to clean the worm from
your system and install the patch mentioned above.

Do this In Order:
1) Turn on your Internet Connection Firewall (Windows XP)
2) Install the patch from Microsoft to remove the
vulnerability
3) Run a removal Tool from an Anti-Virus company to
remove all traces of the virus from your system
4) Go to Windows Update and get all other needed Critical
Updates
Alternate Download Sites are located at:
http://www.microsoft.com/downloads/details.aspx?
FamilyID=2354406c-c5b6-44ac-9532-
3de40f69c074&displaylang=en

http://download.windowsupdate.com/msdownload/updat
e/v3-19990518/cabpool/WindowsXP-KB823980-x86-
ENU_1d296adab6699e66210e5a350236381.exe



IMPORTANT
__________

Whenever your computer attempts to shutdown or reboot,
quickly:
Click the Start Button and then click RUN and type in
shutdown -a
and hit enter.
This should halt the rebooting problem temporarily.

You can also disconnect your computer from the internet
while you do the first step of turning on the Internet
Connection Firewall.


----------------------------------------------------

1)
Turn on the Internet Connection Firewall (Windows XP)
For XP Pro Users
http://www.microsoft.com/windowsxp/pro/using/howto/network
ing/icf.asp

For XP Home Users
http://www.microsoft.com/WindowsXP/home/using/howto/homene
t/icf.asp

Generic Instructions for XP Users:
1. In Control Panel, double-click "Networking and
Internet Connections", and then click Network Connections.
2. Right-click the connection (your internet connection)
on which you would like to enable ICF, and then click
Properties.
3. On the Advanced tab, click the box to select the
option to "Protect my computer or network".
4. If you want to enable the use of some applications and
services through the firewall, you need to enable them by
clicking the Settings button, and then selecting the
programs, protocols, and services to be enabled for the
ICF configuration.



2)
Install the Patch from Microsoft for your Operating System
Windows XP (32-bit)
http://download.microsoft.com/download/9/8/b/98bcfad8-
afbc-458f-aaee-b7a52a983f01/WindowsXP-KB823980-x86-ENU.exe


3)
Run a removal Tool from an Anti-Virus Company to get the
Virus off your system
Network Associates
http://vil.nai.com/vil/stinger/

Trend Micro
http://housecall.trendmicro.com/

Symantec
http://securityresponse.symantec.com/avcenter/venc/data/w3
2.blaster.worm.removal.tool.html

Computer Associates
http://www3.ca.com/virusinfo/virus.aspx?ID=36265


4)
When you get a chance after everything calms down, with
Internet Explorer up and running, go to the top menu and
click Tools and click Windows Update and install all the
latest Critical Updates.
http://v4.windowsupdate.microsoft.com/en/default.asp

You can also configure Automatic Updates to automatically
download updates for you. How to Configure and Use
Automatic Updates in Windows XP:
http://support.microsoft.com/default.aspx?scid=kb;en-
us;306525


Please note I cannot respond to e-mailed questions.
Please use respond to this thread to let me know if the
steps and suggestions helped you to resolve the issue.

Disclaimer:
This posting is provided "AS IS" with no warranties, and
confers no
rights.
 
Back
Top