We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Worm:VBS/Slogod.F
Aliases: VBS/Solow.gen (AhnLab) VBS/Small (AVG) VBS/Slogod (CA) VBS/Butsur.R (ESET) Worm.VBS.Slogod (Ikarus) Worm.VBS.Autorun.fb (Kaspersky) VBS/IE-Title (McAfee) VBS/AutoRun.AP (Norman) VBS/Solow.CY (Panda) VBS/Sasan-N (Sophos) VBS.Solow.G (Symantec) VBS.Solow.gen (VirusBuster)
Summary
Recovering from recurring infections on a network
- Ensure that an antivirus product is installed on ALL machines connected to the network that can access or host shares (see above for further detail).
- Ensure that all available network shares are scanned with an up-to-date antivirus product.
- Restrict permissions as appropriate for network shares on your network. For more information on simple access control, please see: http://technet.microsoft.com/library/bb456977.aspx.
- Remove any unnecessary network shares or mapped drives.
- Restoring your System Registry:
- For Windows XP and Vista: http://support.microsoft.com/kb/322756/
- For Windows 2000: http://support.microsoft.com/kb/322755/
- For Windows XP, Vista and 7: http://support.microsoft.com/kb/322756