New worm's got sass, but not much else

Published: 3 May 2004 y., Monday
The company, which found the flaws that were exploited by both the MSBlast worm and the Witty worm, on Saturday started analyzing the latest piece of attack code that takes advantage of a Microsoft Windows vulnerability discovered by its researchers. So far, eEye's analysts are surprised that the worm has spread so far. The Sasser worm started spreading late Friday, and so far has not racked up the crowd of compromised computers that its predecessors have been able to claim. Such a limited spread could indicate that computer users are becoming more diligent about heeding warnings and patching their systems, but security researchers believe that the worm's poor programming has given network administrators a break. "If this virus was better written, you would have seen more impact," said Alfred Huger, senior director of security firm Symantec's response center. The Sasser worm spreads from infected computer to vulnerable computer with no user interaction required. The worm exploits a recent vulnerability in a component of Microsoft Windows known as the Local Security Authority Subsystem Service, or LSASS. After scanning for vulnerable Windows XP and Windows 2000 systems, the worm creates a remote connection to the system, installs a file transfer protocol (FTP) server and then downloads itself to the new host.
Šaltinis: CNET News.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

E-Mail Virus Slams Muslim Group

Executives at the American Muslim Council are mad as hell. more »

Intel's accidental revolution

The foundation of modern computing was something of an accident. more »

New Nokia Phone Takes AIM

America Online's popular AIM instant messaging application has found a home on cell phone service offered by VoiceStream Wireless. more »

ICANN: To Serve and Protect

The deadly attacks of September 11 didn't just give us tighter airport checkpoints, new wiretapping and surveillance laws, and countless metric tons of explosives air-lifted to Afghanistan. more »

Osama Family's Suspicious Site

For the price of registering a domain name, a 30-year-old Web designer from Los Angeles has bought a bizarre piece of Internet history. more »

NTT DoCoMo Steps Up War Against Wireless Spam

Japan's NTT DoCoMo has unveiled new weapons in its war against junk e-mail more »

Telephony Speech Recognition Coming Of Age - Datamonitor

The use of speech recognition technology in telephone call centers is about to enter the mainstream more »

University Error Exposes Kids' Psychological Info Online

The information breach exposed the names and diagnoses of children and teenagers being treated for such conditions as schizophrenia, retardation and depression. more »

Wearable Computers in Fashion

Smart shirts embedded with optic fibers can monitor wearer's condition and transmit data wirelessly. more »

Hacker 'Doctor Nuker' Claims FBI Fingered Wrong Person

A computer hacker who vandalized a pro-Israeli group's Web site said law enforcement officials have issued an arrest warrant for the wrong person. more »