{"id":6278,"date":"2016-06-02T00:00:00","date_gmt":"2016-06-01T22:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=6278"},"modified":"2019-04-01T10:15:27","modified_gmt":"2019-04-01T08:15:27","slug":"you-are-vaccinated-and-your-calculator","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/you-are-vaccinated-and-your-calculator\/","title":{"rendered":"You are already vaccinated? And your computer?"},"content":{"rendered":"<p>Infections (in the form of malware or \"exploits\") are also wreaking havoc in the IT sector. And here, too, there is an equivalent to vaccination in the form of applying patches.<\/p>\n<p>As with real-life diseases, however, there are also \"vaccination muffleers\" in the IT world - with fatal consequences for themselves and others. Conficker (also known as Downup, Downadup, kido and Worm.Win32\/Conficker) can be described as the \"flu of IT\".<\/p><div id=\"great-1727832360\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>The computer worm has been around since 2008. To do so, it uses a gap in Windows (MS08-067), with which it spreads via the network. Microsoft closed this gap very quickly for all affected operating systems and provided corresponding patches.<\/p>\n<p>This should make Conficker history. Actually.<\/p>\n<p>... but unfortunately this is not the case. On the contrary, we are by no means talking about \"trifles\" here.<\/p>\n<p>The Conficker Working Group continues to track the infection landscape to this day: according to them, the number of infections is still in the two- to three-digit thousands, depending on how they are counted, even today, eight years later.<\/p>\n<p>Eight (!) years in which the vaccine medicine, i.e. the patch, is already available! As with diseases, there are cases in the IT world that cannot or must not be addressed simply with patches (medicine).<\/p>\n<p>Accordingly, however, the vaccination of the others is all the more important! After all, this reduces the risk of infection for unpatched (unvaccinated) systems above a certain threshold to practically zero.<\/p>\n<p>Unfortunately, the number of unpatched systems is alarmingly high. This means that they represent gateways for attacks. In other words, Conficker turns these unpatched systems into a kind of \"bridgehead\" from which attackers can attack other systems within the infrastructure at their leisure.<\/p>\n<p>And eight years after Conficker, that's bordering on intentional, to say the least - if not beyond ...<\/p>\n<p>Unfortunately, this is not the only case that suggests widespread negligence in patching.<\/p>\n<p>A more recent example is Stuxnet. While most associate it exclusively with attacks on industrial controllers, Stuxnet exploited a whole bouquet of vulnerabilities, including CVE-2010-2568 - a vulnerability that allows arbitrary code execution using shortcut files.<\/p>\n<p>Although the coverage of Stuxnet was massive, this also shows that it does not necessarily lead to greater security awareness. Even today - \"only\" six years after Stuxnet - this gap is one of the primary attack weapons on the Internet.<\/p>\n<p>Many exploit kits, e.g. the widely used \"Angler Exploit Kit\", still use this loophole today. This fact clearly shows that \"enough\" PCs can be infected even with these old exploits.<\/p>\n<p>These two examples clearly show that there are unfortunately still (too) many \"patch muffleurs\". And the argument of lack of time really doesn't hold water after six and eight years, respectively... Unpatched systems not only pose a danger to themselves - they also endanger others by serving as a bridgehead.<\/p>\n<p>Therefore, here's an appeal: Applying patches (in a timely manner) is more important today than ever. Please do it! Today there are hardly any reasons not to patch! Thanks to virtual shielding, for example, it is now possible to provide adequate protection for critical systems immediately. This means that while the patch is being tested in peace, you are safe from the attack for the time being.<\/p>\n<p>After a successful test, the patch is installed via patch management and the virtual shield is removed. For systems that cannot be patched, virtual patching may even be a permanent measure.<\/p>\n<p>This means that there is no longer any reason to operate (Internet-accessible!) systems with these gaps.<\/p>\n<p>Ultimately, it is like the flu and measles. One hundred percent coverage is not even necessary - if a threshold value is not reached, de facto protection is statistically given for all.<\/p>\n<p>Unfortunately, we are a long way from that, both in the case of diseases and in the IT world. And specious arguments unfortunately only help the disease or the \"pathogens\" here: the cybercriminals.<\/p>","protected":false},"excerpt":{"rendered":"<p>With the summer, the summer flu season is also just around the corner and with it the vaccination discussion. We are also seeing a similar development in the IT sector.<\/p>","protected":false},"author":52,"featured_media":21074,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[21,7,1608],"tags":[],"coauthors":[24313],"class_list":["post-6278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-meinung","category-mag1606","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",1000,425,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",400,170,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-768x326.jpg",768,326,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",1000,425,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-480x204.jpg",480,204,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-640x272.jpg",640,272,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-720x306.jpg",720,306,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-960x408.jpg",960,408,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",1000,425,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",1000,425,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",1000,425,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",1000,425,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",1000,425,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",1000,425,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",1000,425,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",1000,425,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",600,255,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security.jpg",600,255,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/04\/Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Mit dem Sommer steht auch die Sommergrippesaison vor der T\u00fcr und mit ihr die Impfdiskussion. Eine \u00e4hnliche Entwicklung finden wir auch im IT-Bereich.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag1606\/\" rel=\"category tag\">MAG 16-06<\/a>","author_info_v2":{"name":"Raimund Genes, Trend Micro","url":"https:\/\/e3mag.com\/en\/author\/raimund-genes\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/6278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=6278"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/6278\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/21074"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=6278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=6278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=6278"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=6278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}