Protect your corporate IT network from hackers and other unwanted intruders with Proxy Sentinel™. Click here for all the details and get the peace of mind you deserve.
Back to our Homepage Proxy Sentinel™ high performance Internet proxy server and secure firewall solution Firewall Sentinel™ secure & powerful Internet firewall solution About Internet Security.ca and GCIS Frequently Asked Questions on Internet security issues Internet Security Industry News - Stay informed of what's happening Contact Internet Security.ca today and order your Proxy Sentinel™ or Firewall Sentinel™ server now!


Sasser worm spreading rapidly

Save your company's valuable data with Proxy Sentinel™ from Internet Security. Click here for all the details.

May 4, 2004

eEye Digital Security, which found the flaws that were exploited by both the MSBlast worm and the Witty worm, on Saturday started analyzing the latest piece of attack code that takes advantage of a Microsoft Windows vulnerability discovered by its researchers. So far, eEye's analysts are surprised that the worm has spread so far.

"It's so poorly written," said Marc Maiffret, chief hacking officer for the Aliso Viejo, Calif.-based company. "This could still have a lot of impact, but it's written by someone that could barely get the code working."

Alfred Huger, senior director of security firm Symantec's response center, agreed. "If this virus was better written, you would have seen more impact," he said.

Still, some companies were beginning to report problems from the worm Monday morning. Finnish financial group Sampo said Monday it had temporarily closed all of its branch offices, some 130 in all, as a precaution against Sasser. And in Australia, the worm forced Westpac Banking to turn customers from its branches.

The Sasser worm started spreading late Friday. As of Saturday afternoon, it had not racked up the crowd of compromised computers that its predecessors have been able to claim. If it weren't for the worm's poor programming, such a limited spread could have indicated that computer users are becoming more diligent about heeding warnings and patching their systems.

The Sasser worm spreads from infected computer to vulnerable computer with no user interaction required.

The worm exploits a recent vulnerability in a component of Microsoft Windows known as Local Security Authority Subsystem Service, (LSASS). After scanning for vulnerable Windows XP and Windows 2000 systems, the worm creates a remote connection to the system, installs a file transfer protocol (FTP) server and then downloads itself to the new host.

Early on, the worm was spreading at a moderate to slow pace, antivirus experts said.

By Saturday afternoon, Symantec had received about 100 reports, but only 20 from companies. Network Associates had alerts of the worm from 25 to 50 companies, with some of them reporting hundreds of infections. Still, that's small compared wtih the nearly 10 million computers infected by the MSBlast, or Blaster, worm.

Huger said he was concerned that the number of infections might jump on Monday when people take compromised laptops to work.

"It still remains to be seen whether--when people take this to work--we will see a faster spread," he said.

Over the weekend, infection rates seemed to be climbing steadily, said Johannes Ullrich, chief technology officer for the Internet Storm Center, which monitors network attacks.

"It spreads like most of the other worms," he said. "It prefers local networks and it has the usual semi-random spread."

Code in the worm will cause it to spread randomly half the time; to the same A-class network as the infected host a quarter of the time; and to the same B-class network the remaining time. There are about 65,000 address in a B-class network and about 16.8 million addresses in an A-class network.

Ullrich added that the worm is not able to infect 100 percent of the time, perhaps indicating that Sasser itself has a bug.

That's par for the course for worms, eEye's Maiffret said.

"It just goes to show that the people who are smart enough to create a good worm are either too responsible to do it, or they are the bad guys and they know that worms highlight vulnerabilities and make it more likely that people patch holes," he said.

For the "bad guys," a worm only draws attention to flaws that they want to exploit, he said.

Source: C-Net News


Save Internet Security.ca's URL to the list of your favorite web sites in your Web browser by clicking here.

Become an authorized reseller of Proxy Sentinel™ and Firewall Sentinel™. Do like the rest of our authorized resellers and have your clients benefit the important security features of our products and solutions, while increasing your sales at the same time. Click here for all the details.


Back to the top of the page.         

You can link to the Internet Security web site as much as you like. Read our section on how your company can participate in our reciprocal link exchange program and increase your rankings in the major search engines such as
Google and all the others.

Click here to order your Proxy Sentinel™ Internet security server today!

Proxy Sentinel™ is the most secure Internet proxy server on the market today. Click here for more information.
Site optimized by Pagina+™
Powered by Sun Hosting
Search engine keywords by Rank for Sales
Development platform by My Web Services
Internet Security.ca is listed in
Global Business Listing

| Home | Proxy Sentinel™ | Firewall Sentinel™ | FAQ | News | Sitemap | Contact |
Copyright © Internet Security.ca 2003    Terms of use    Privacy agreement    Legal disclaimer