• May 28, 2003: Microsoft releases a
patch that would protect users from an exploit in WebDAV that
Welchia used. (Welchia used the same exploit as MSBlast but had an additional method of propagation that was fixed in this patch. This method was only used after 200,000 RPC DCOM attacks - the form that MSBlast used.) • July 5, 2003: Timestamp for the patch that Microsoft releases on the 16th. • Around July 16, 2003: White hat hackers create proof-of-concept code verifying that the unpatched systems are vulnerable. The code was not released. • July 21, 2003: CERT/CC suggests also blocking ports 139 and 445. • August 1, 2003: The U.S. issues an alert to be on the lookout for malware exploiting the RPC bug. • August 11, 2003: Symantec Antivirus releases a rapid release protection update. • August 15, 2003: The number of infected systems is reported at 423,000. • August 16, 2003: DDoS attack against windowsupdate.com starts. (Largely unsuccessful because that URL is merely a redirect to the real site, windowsupdate.microsoft.com.) • August 18, 2003: The related
helpful worm,
Welchia, appears on the internet. • August 19, 2003: Symantec upgrades their risk assessment of Welchia to "high" (category 4). • August 25, 2003: McAfee lowers their risk assessment to "Medium". • August 27, 2003: A potential DDoS attack against HP is discovered in one variant of the worm. • February 15, 2004: A variant of the related worm Welchia is discovered on the internet. • February 26, 2004: Symantec lowers their risk assessment of the Welchia worm to "Low" (category 2). == Side effects ==