
Turns out the worm provided the incorrect domain address for the target. So Microsoft merely delisted the windowsupdate.com domain name, and the worm, not knowing where to go, didn’t go anywhere. Doesn’t help those of you infected, but most of you seem to be cleaning yourselves up:
The number of Blaster infections is also down more than 80 percent since the worm’s peak on Monday, indicating that vulnerable computers are being cleaned and patched by their owners, IDG says.