Friday, April 13, 2007
Storm Worm strikes again
A new variant of the Storm Worm (aka Snow Worm) is slamming into e-mail inboxes worldwide as an apparent patch or fix for a recent worm attack.
The latest variant appears to ride on the coattails of worm that Trend Micro calls Nuwar.AOP.The Trojan part of this worm is known as Small (Kaspersky and Trend Micro), Downloader (McAfee), Peacomm (Symantec), and officially by the designation CME (Common Malware Enumeration) 711.
According to Ken Dunham of iDefense, this new variant worm includes anti-security measures to hinder analysis, and sends out copies of itself inside of a password protected ZIP file to evade anti-virus detection. Unfortunately, to further evade detection the e-mails sent are randomized with different filenames, different passwords, and different binaries within the ZIP file.
According to one source, the subject lines include:
"Worm Alert!"
"Worm Detected"
"Virus Alert"
"ATTN!"
"Trojan Detected!"
"Worm Activity Detected!"
"Spyware Detected!"
"Virus Activity Detected!"
According to SANS Internet Storm Center, the zip files appear to be named:
"patch-(random 4 or 5 digit number).zip"
"bugfix-(random 4 or 5 digit number).zip"
"hotfix-(random 4 or 5 digit number).zip"
"removal-(random 4 or 5 digit number).zip"
Once executed the new variant worm installs a rootkit on the infected system and communicates over a private peer-to-peer (P2P) network to update itself. This latest variation may be laying the groundwork for even more attacks in the near future, launching future releases from those machines already infected.
Additional Resources
Trend Micro: Nuwar.AOP
Mitre.org Common Malware Enumeration: CME-711
Quick facts
Name: Storm worm (also known as Small (Kaspersky and Trend Micro), Downloader (McAfee), Peacomm (Symantec))
Date first reported: 04/12/07
CME Number: CME-711
Software vulnerable: Microsoft Windows
What it does: Installs a rootkit and communicates updates via peer-to-peer connections
Recommendations: Avoid opening e-mail attachments without first scanning them for viruses.
Exploit code available: NA
Vendor patch available:: NA
http://news.zdnet.com/2100-1009_22-6175775.html
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment