Protect your corporate IT network from hackers and other unwanted intruders with Proxy Sentinel™. Click here for all the details and get the peace of mind you deserve.
Back to our Homepage Proxy Sentinel™ high performance Internet proxy server and secure firewall solution Firewall Sentinel™ secure & powerful Internet firewall solution About Internet and GCIS Frequently Asked Questions on Internet security issues Internet Security Industry News - Stay informed of what's happening Contact Internet today and order your Proxy Sentinel™ or Firewall Sentinel™ server now!

Internet Security Industry News

Sobig Virus linked to the spam community?

Save your company's valuable data with Proxy Sentinel™ from Internet Security. Click here for all the details.

August 22, 2003

Researchers believe there is a link between Sobig author and spamming community. August saw four major worm infections alone, according to antivirus company Symantec, making it one of the busiest months for antivirus vendors in recent memory.

"Taken all together, this has been a more intense week, in terms of virus activity, than any we've seen".

That activity included the appearance of W32.Blaster on August 11, a virulent new internet worm that exploited a flaw in the Windows implementation of the RPC (Remote Procedure Call) protocol, which enables client and server applications to communicate across networks. The worm spread worldwide in a matter of hours, infecting hundreds of thousands of Windows machines before the outbreak began to wane, according to Internet Security Systems (ISS).

A survey of 1100 organizations by TruSecure found that almost 21% were infected by the worm, with 15% of corporations worldwide recording a "moderate" or "major" impact on operations by Blaster.

The impact among home users, who are generally less well-protected than organisations, is believed to be even greater, according to Marc Maiffret, chief hacking officer at eEye Digital Security.

As Blaster waned, new worms emerged that exploited the same vulnerability including W32.Welchia, also known as Nachi, which attempted to patch Windows systems with the RPC vulnerability. At the same time, a new version of the Sobig worm, Sobig.F, began bombarding email accounts around the world, prompting new infections, warnings from antivirus companies and hurried updates of antivirus software.

Email filtering company MessageLabs of New York City intercepted 10 times the normal number of email viruses in the 24 hours after Sobig.F appeared and has intercepted over three million copies of the virus so far, according to CTO Mark Sunner. But the recent spate of large outbreaks don't herald the arrival of a new and more dangerous generation of viruses, as did the appearance of the Code Red and NIMDA worms in 2001, or the SQL Slammer worm in January, according to Belthoff.

"I think it's an intersection of a couple things," Belthoff says. "Blaster and [Welchia/Nachi] -- those are all opportunistic worms. They're all based on this Windows [RPC] vulnerability. Blaster didn't take any in-depth skill to write." In the case of the new Sobig worm, improvements in that worm's ability to send out copies of itself in email messages meant that even a small number of infected machines could generate massive amounts of infected email traffic, according to Sunner.

MessageLabs researchers believe that there is a link between the Sobig author and the spamming community and that machines that are compromised by Sobig are being used as distribution stations for spam email, Sunner says. Sixty six percent of the email messages MessageLabs intercepts come from such machines, commonly referred to as "open proxies." And the increase in spam traffic corresponds closely to the appearance of worms like Sobig, Sunner says.

The intense media attention given to the worm outbreaks may have also stimulated virus and worm writers, according to Neel Mehta, a research engineer at ISS X-Force. "Virus writers get recognised and that encourages them and others to repeat their actions," he says.

While experts tend to agree on the myriad of causes for the new worms, there is less agreement about what to do to stop them in the future. Most agree that software companies such as Microsoft need to do a better job of weeding out glaring security holes like the RPC vulnerability while companies should be better about promptly applying software patches as they become available.

"You need balance with the [software] vendors. They need to build more stable code, but IT departments need to take patching more seriously and make it part of their overall security plan," Belthoff says. Corporate IT security personnel should also do a better job educating employees about proper etiquette for opening or forwarding suspicious e-mail messages.

"If your end-user population is educated in the work environment, [email worms] shouldn't be a problem at all," Belthoff says. But others disagree, saying that part of the blame lies with antivirus technology companies, which still require their customers to apply software patches and updates to be protected against new threats.

"Traditional antivirus protection is very reactive in nature. Antivirus vendors don't know about a new virus until their switchboards start to light up with calls from their customers, then it's a race against time," Sunner says. Virus writers like the author of Sobig are increasingly savvy and look to exploit that, he says.

"They're trying to get a virus out there for a short period of time and exploit that window of time using a mass propagation tool like email," Sunner says. More security vulnerabilities like the RPC vulnerability are inevitable, as are new worms to exploit them, according to experts.

Even more troubling, the window of time between when vulnerabilities are disclosed and when worms and viruses that exploit them appear is likely to close even more. It took six months for the SQL Server vulnerability to be turned into the SQL Slammer worm. The Windows RPC vulnerability was exploited in just three weeks.

"There is more awareness of vulnerabilities and more motivation to go ahead and write malicious code, because of the attention previous worms have gotten," Mehta says.

Source: Computerworld UK

Save Internet's URL to the list of your favorite web sites
in your Web browser by clicking here.

Back to the top of the page.         

You can link to the Internet Security web site as much as you like. Read our section on how your company can participate in our reciprocal link exchange program and increase your rankings in the major search engines such as
Google and all the others.

Click here to order your Proxy Sentinel™ Internet security server today!

Proxy Sentinel™ is the most secure Internet proxy server on the market today. Click here for more information.
Site optimized by Pagina+™
Powered by Sun Hosting
Search engine keywords by Rank for Sales
Development platform by My Web Services
Internet is listed in
Global Business Listing

| Home | Proxy Sentinel™ | Firewall Sentinel™ | FAQ | News | Sitemap | Contact |
Copyright © Internet 2003    Terms of use    Privacy agreement    Legal disclaimer