Kaspersky Labs, an international data-security software developer, informs users about the discovery of a new worm generation that is capable of Internet functioning absolutely sans using files. This type of malicious program conducts all operations-including spreading and perpetrating DDoS...
Kaspersky Lab, an international data-security software developer, informs users about the discovery of a new worm generation that is capable of Internet functioning absolutely sans using files. This type of malicious program conducts all operations-including spreading and perpetrating DDoS attacks-exclusively via a computer's system memory or TPC-IP packets; therefore, greatly complicating detection and neutralization.
The first family member of this network worm, known as "Bady" (a.k.a. "Code Red"), according to ZDNet, has already infected almost 12,000 servers around the world, and also has administered large-scale DDoS attacks on the White House, Washington, D.C. (http://www.whitehouse.gov), disrupting the sites regular operations. "Bady" infects only those computers operating on Windows 2000 (without any Service Packs installed) and Microsoft Internet Information Server (IIS) with the Indexing Service switched on. Namely because this software is widely used on the commercial Web, FTP, and e-mail servers, the worm has spread widely. The scale of the epidemic could have been far worse and devastating had it infected other Windows versions, such as Windows NT and XP; however, the worm's creator specifically targeted his "parasite" at Windows 2000. In order to penetrate remote computers, Bady exploits a security breach in IIS that was detected in June of this year that allows a malefactor to run arbitrary code without a user's knowledge. This is accomplished by Bady sending a special request to a randomly selected server to run the worm itself on an indicated computer. The worm, in turn, attempts to penetrate other servers. Hundreds of the worm's active processes, simultaneously in the computer memory, jam the server's operation. On June 18 of this year, Microsoft released a patch remedying this breach, however, most computer users to this point have ignored the warning and have yet to install the necessary software. "Bady once again proves the need to timely install software updates. Currently, this is one of the most important security measures for both individual home users and corporate users alike," commented Denis Zenkin, Head of Corporate Communications for Kaspersky Lab. "The current worm clearly demonstrates that a hacker only requires several days in order to unleash malicious code through the use of a security breach." The most important feature of Bady is that it does not use any files. "This worm is absolutely unique: it is either present in the system memory of the infected computer, or in the TCP/IP packet being transferred to a remote computer," elucidated Eugene Kaspersky, Head of Anti-Virus Research for Kaspersky Lab. "Such a 'fileless' worm presents a serious threat for server defense, inasmuch as it demands the installation of a special anti-virus module for modern firewalls." In addition to jamming the operation of an infected computer, Bady has other side effects. Firstly, the worm intercepts the user requests for viewing the infected Web-sites' content and replaces the original pages with the following message: