system
1
I’d just like to express how impressed myself and my company are, for the incredible support given in dealing with our recent KIDO-C outbreak.
Without their skillful analysis and handling of this virus we would have been crippled.
Right now we are in the process of mopping up the virus.
Our confidence in Avast! has been further bolstered by the professionalism and care given to us during this incident.
Well done Avast!, long may you continue to provide a first class product and service to your clients.
A big thank you to JN, an equally top fellow and rock in a storm.
hi… nice to read that… if i can advise you (or others) a bit more, the method to get rid of it should be (for each single machine):
- update Avast to the latest verison and update the virus database
- download the proper MS patch for the vulnerability (is this patch available already?)
- physically unplug the LAN cable (the computers are reinfected from other machines in the network)
- schedule the boot time scan
- delete or chest found infections
- install the MS patch against the vulnerability
- do this for other machines in the network
- plug the LAN cables back, everything should be ok
system
3
For further information about this one, look for references to conficker.
It’s a variant of that.
system
4
Its a pleasure Nick and thanks for the acknowledgement.
See you again in a couple weeks with both appliances.
Regards
JN
AVOSEC