What does the Blaster virus do?
Blaster Worm was a virus program that mainly targeted Microsoft platforms in 2003. The worm attacked computers by exploiting a security flaw with Microsoft remote procedure call (RPC) process using Transmission Control Protocol (TCP) port number 135.
What type of virus is Blaster?
Blaster (also known as Lovsan, Lovesan, or MSBlast) was a computer worm that spread on computers running operating systems Windows XP and Windows 2000 during August 2003. The worm was first noticed and started spreading on August 11, 2003.
How do I get rid of Blaster virus?
- Download the tool, run the program and put the Virus Removal Tool on your desktop.
- Double click Sophos Virus Removal Tool and then click the Start scanning button.
- The tool scans your computer and removes any viruses it finds.
- You’re done.
Can worm be detected by antivirus?
Avast Free Antivirus will detect and block computer worms — and other malware as well — before they have a chance to infect your machine. Keep your PC safe from sneaky threats like worms with a top-tier cybersecurity solution that’s 100% free.
What port does w32 Blaster worm use?
Blaster Worm scans the Internet for computers that are vulnerable to its attack. Once found, it tries to enter the system through the port 135 to create a buffer overflow. One indication of infection is unusual activity on this port.
How a worm can disrupt a computer or a network?
Worms can modify and delete files, and they can even inject additional malicious software onto a computer. Sometimes a computer worm’s purpose is only to make copies of itself over and over — depleting system resources, such as hard drive space or bandwidth, by overloading a shared network.
What does the law say about worms?
It is illegal to make changes to any data stored on a computer when you do not have permission to do so. If you access and change the contents of someone’s files without their permission, you are breaking the law. This includes installing a virus or other malware which damages or changes the way the computer works.
Why computer virus is created?
Proving a point – Sometimes a computer expert will create a virus to prove that a certain process will work, or that a certain network can be penetrated, or that certain antivirus software is effective. This is often a reason given by academics who try to prove their points by actions instead of by theories.
What precautions are built into your computer?
Tips to protect your computer
- Use a firewall.
- Keep all software up to date.
- Use antivirus software and keep it current.
- Make sure your passwords are well-chosen and protected.
- Don’t open suspicious attachments or click unusual links in messages.
- Browse the web safely.
- Stay away from pirated material.
When did the MS Blaster worm come out?
That is, until the growing attack vector caused especially by millions more users of home and office computers was again proven vulnerable to malicious software. That year on August 11th the internet worm MS Blaster, aka W32 aka Lovesan, affected hundreds of thousands of Microsoft home and office computers worldwide.
What are the ports affected by the Blaster worm?
Blaster affected Transmission Control Protocol (TCP) ports 135 and 4444 as well the User Datagram Protocol (UDP) port 69. Indeed, an indication of a Blaster device or network infection is an inexplicable, unreasonable increase in network traffic through these ports.
What to do if you find a worm on your computer?
If you find any of these files, your computer may be infected with the worm. If you find one of these files, delete the file, and then follow the steps in the “Recovery” section of this article. To delete the file, type del %systemroot%\\system32\\filename.ext /a at the command prompt, and then press ENTER.