Internet Security Industry News
Police computers brought down by good worm
August 28, 2003
Sussex Police has been hit by a worm that has knocked out its office computers and forced workers to switch to back-up systems. Emergency calls are not being affected.
The organisation confirmed to ZDNet UK that it has been hit by the W32/Nachi worm, which is a variant of the MSBlast worm that started spreading around the globe early last week. Nachi was dubbed the 'good' worm because it seeks out PCs that are vulnerable to the MSBlast worm and then downloads the appropriate patch from Microsoft's website to fix them. Additionally, it will delete itself from an infected machine the first time it is booted up in 2004.
A spokeswoman for Sussex Police told silicon.com's sister site ZDNet UK that computers used for administrative and general office work have been worst hit. "Our control rooms are running either using normal or established back-up methods, which they switch to during maintenance work. Our engineers are working to eliminate it," she said. However, the worm is not a good idea, said Joe Hartmann, North American director for antivirus research at security software firm Trend Micro.
"This is just a regular worm like anything else," he said. "In the end, it is going to do more trouble than good." The problem is that although Nachi has good intentions, it sends a great deal of unwanted traffic over a network as it tries to spread to other computers. In addition, if several computers download the patch from Microsoft at the same time, it could slow network performance, Hartmann said.
Computer administrators have had a tough fortnight because the Nachi worm was released a few days after the MSBlast worm and around the same time as the latest variant of the Sobig email virus. Although occurrences of Nachi and MSBlast have started dying down, Sobig.F is still causing problems. Email security firm MessageLabs last week found that one in every 17 email going through its systems contained Sobif.F - a 'regular' virus manages to infect one in 275 emails and a relatively prevalent virus, such as Klez H, managed to infect one in 138 emails.
The Sobig.F virus is activated when a user clicks on an infected email attachment. Once released, Sobig.F grabs email addresses from different locations on a computer and sends them infected emails. The virus also forges the source of the message using a randomly selected email address, so that the infected message appears to come from someone else.
You can link to the
Internet Security web site as
much as you like. Read our section on how your company can participate in our
reciprocal link exchange program
and increase your rankings
in the major search engines such as
Site optimized by Pagina+™
Powered by Sun Hosting
Search engine keywords by Rank for Sales
Development platform by My Web Services
Internet Security.ca is listed in
Global Business Listing