Windows worm beginning to spread

A worm targeting Microsoft's Windows 2000 operating system is beginning to spread.

A variety of worms that exploit a Windows vulnerability disclosed last week are hitting many systems worldwide, reportedly including some at cable network Cable News Network (CNN), and could reach critical mass in the next several hours, according to antivirus vendor Trend Micro.

"The next twelve hours will tell us, is this going to be big, or is it just going to go away in the next couple of hours?" said Joe Hartmann, director of antivirus research at Trend Micro, in California.

In the worst case, the worms could spread as fast and wide as Code Red or Nimda, he said. Like those worms, they are designed to seek out all vulnerable systems on a network once they get onto one computer.

It's not clear exactly what worms are involved in the attacks now or what effect they ultimately will have on the systems they infect, according to Hartmann. Trend Micro has received reports of many attacks, some involving variants of the Zotob worm and others involving the Rbot worm. It has received reports of systems being shut down and restarted repeatedly.

The worms spread using the TCP/IP (Transmission Control Protocol/Internet Protocol) port 445, which is associated with Windows file sharing, and take advantage of the Plug and Play system bug to seize control of the operating system. Infected computers are then told to await further instructions on an IRC (Internet Relay Chat) channel, meaning that they could then be used to attack other systems, according to Johannes Ullrich, chief research officer at The SANS Institute, a security training company in Bethesda, Maryland.

Limiting the danger is the fact that the worms can only effectively attack Windows NT and Windows 2000 systems, according to Hartmann. A patch for the vulnerability was released by Microsoft last Tuesday.

Judging from reports to SANS Institute from users who monitor attempted attacks against their firewalls, this is not a particularly widespread attack, according to Ullrich.

Many enterprises don't apply patches immediately for fear of crippling custom software, Ullrich explained. Microsoft can test a patch against all its products but not against an individual company's special applications.

"More often than not, a patch will actually do more damage than good if you roll it out too quickly without testing it first," Ullrich said.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about Cable News NetworkCNNMicrosoftSANS InstituteThe SANS InstituteTrend Micro Australia

Show Comments
[]