iTnews
  • Home
  • News
  • Technology
  • Security

Windows vulnerability sparks viral warfare

By David Quainton on Aug 18, 2005 10:38AM

The Zotob worm and its Windows hitting counterpart, Ircbot, are waged in viral warfare. Ircbots and a similar virus group known as Bozori are actively deleting Zotob viruses, the first to attack a newly announced Windows vulnerability.

"For the last four days we got 11 different samples of malware using this vulnerability," said Mikko Hypponen, director of antivirus research at F-Secure. "Currently there are three Zotob variants (A, B and C), one Rbot (ADB), one Sdbot (YN), one CodBot, three IRCbots (ES, ET and EX) and two variants of Bozori (A and B)."

According to Hypponen virus writers are trying to gain kudos by deleting each others creations – F-Secure's weblog has a diagram of how it works.

The viruses have been particularly successful at attacking unpatched Windows 2000 systems, even hitting some media organisations.

Security company Computer Associates has suggested as many a 250,000 systems have been affected globally and security body SANS has raised its threat status to yellow following the increased probability of infection through the swathe of network worms.

The Zotob worms have been followed by an almost unheralded amount of virus writing activity as hackers try to make use of vulnerable systems. Most viral creations have trojan capabilities so that infected computers can be used for more nefarious means, such as sending spam.

www.f-secure.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
securitysparksviralvulnerabilitywarfarewindows

Partner Content

"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By David Quainton
Aug 18 2005
10:38AM
0 Comments

Related Articles

  • Critical Splunk bug propagates code execution
  • Don't remove PowerShell: US, UK and NZ security agencies
  • Cisco security appliances have critical vulnerabilities
  • Microsoft patched Azure bugs without notifying users, Tenable claims
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

The security threat of quantum computing
The security threat of quantum computing
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.