Worm-Shiv causes problems with denial of service

Powered by SC Magazine
 

A worm that prevents certain applications from working properly has been detected by Webroot.

Andrew Brandt, threat expert at Webroot, described the Worm-Shiv as ‘obnoxious', claiming that ‘there isn't anything especially technically avant-garde or advanced about the worm, nor was it especially difficult to detect or remove. It just exhibits behaviour that, to be blunt, is about as annoying as it possibly can be'.

 

Brandt explained that the infection process starts with a small self-extracting RAR archive executable that when run, drops and executes another .exe file, which in turn drops and executes yet another .exe file.

 

It then puts a copy of a file named wsock32.dll into every single folder on the hard drive and the code is designed to prevent certain applications from working properly.

 

“But even worse, the worm has been engineered to mess with the application window of many anti-virus products, including ours. Not only does the worm make the quarantine button disappear, but then the real shenanigans begin, when you move the mouse pointer anywhere within the program's active window, it immediately snaps the title bar over the mouse pointer, which then sticks to the pointer.

 

“If you move the mouse too quickly when it's “stuck” like that, the mouse pointer just slips off the title bar, leaving the window half off the screen.”


Webroot recommends using a keyboard shortcut for the quarantine feature, where you can just hit the Alt-Q keys instead of trying in vain, over and over, to click the button.

 

Brandt claimed that the creator ‘will think of something even more annoying in the future, but for now, we can all breathe a little easier knowing this Sisyphean nonsense is contained — at least, for the moment.'

See original article on scmagazineuk.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
Amazon forced to reboot EC2 to patch Xen bug
Rolling restarts over next week.
 
Vodafone reveals plans to store users' online activity
Says retrieval under Govt proposal will impose massive cost.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1355

Vote