Home page logo

basics logo Security Basics mailing list archives

Protecting Home Machines
From: Sys Sec <syssec () sysigsa com>
Date: Fri, 21 Nov 2003 08:08:22 +0100

Hi Cherian

The NACHI.A worm usually arrives as DLLHOST.EXE (~10,240 bytes) on target
systems. It also opens ports between port 666 to port 765 for its malicious


Similar to the earlier MSBLAST worm variants, this malware also exploits the
RPC DCOM Buffer Overflow

Please visit

You can download a microsoft scan to view if your system is vulnerable:
(You can test it after you patch)

When you patch the system I recommend that you install a firewall in your
I recommend Sygate Personal Firewall


-----Mensaje original-----
De: Cherian M. Palayoor [mailto:cpalayoor () cwalkergroup com]
Enviado el: jueves 20 de noviembre de 2003 20:23
Para: security-basics () securityfocus com
Asunto: Protecting Home Machines

I have a remote user whose laptop was severely infected by the trojans

I reinstalled the OS on the machine following a complete reformat, and
installed an anti-virus with the latest update. I ran a complete scan on the
machine prior to shipping the machine back to the user.

However as soon as the user took back the machine home, he was infected by
another worm (NACHI.A) within a few minutes of connecting to the internet
through his high speed cable modem. He swears that he had not downloaded
anything nor tried any removable media on this machine.

Following a bit of research on the matter, I am now aware that it is
for machines to get infected on the fly especially through unprotected home
internet connections.

The question is, "What do I do to prevent such occurrences which have
increased of late."

My thanks in advance for any thoughts or words of advise. 




  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]