Christopher Budd, security response communications lead for Microsoft, said that the company was glad that customers had moved as quickly as they had to download, test and deploy the update. He also urged customers who had not yet deployed the update to do so.
Budd claimed: “We have seen some new pieces of malware attempting to exploit this vulnerability this week. And while so far, none of these attacks are the broad, fast-moving, self-replicating attacks people usually think of when they hear the word ‘worm', they do underscore the importance of deploying this update if you haven't already.”
In response, the Microsoft Malware Protection Center has provided write-ups on the new pieces of malware it saw this week and has included signatures to help protect against these. Budd said these attacks are similar to the original attacks that were detected that focus on loading malware onto vulnerable systems.
Budd concluded by claiming that “the environment remains similar to what it was last Monday when we released Microsoft Security Advisory 958963. The publically available exploit code has resulted in limited malware attacks seeking to exploit the vulnerability.”
See original article on scmagazineuk.com