Thursday, October 30, 2008


One day after Microsoft issued a rare emergency Windows security patch, the bad guys have a few new ways to take advantage of the bug.
By Friday, security researchers had identified a new worm, called Gimmiv, which exploited the vulnerability, and a hacker had posted an early sample of code that could be used to exploit the flaw on the Web.
Microsoft issued the patch more than two weeks ahead of its next security updates because the bug could be used to create an Internet worm attack and Microsoft had already seen a small number of attacks that exploited the flaw.
This vulnerability lies in the Windows Server service used to connect with other devices on networks. Although the firewall software that ships with Windows will block the worm from spreading, security experts are worried that the flaw could be used to spread infections between machines on a local area network, which are not typically protected by firewalls.
And that's exactly what the Gimmiv worm is designed to do, according to Ben Greenbaum, a senior research manager with Symantec. "It is downloaded onto a target machine via social engineering and then proceeds to scan and exploit machines on the same network, using this newly disclosed vulnerability in the Server service," he said.
The worm then loads software that steals passwords, security experts say.
Both Symantec and McAfee said Friday that they had seen only a very small number of attacks based on this exploit, but Symantec says that, starting Thursday evening, they found a 25 percent jump in network scans looking for potentially vulnerable machines. That could be a sign that more attacks are coming.
That scenario becomes more likely, too, as more tools that exploit the flaw are released to the public. On Friday, sample exploit code was posted to the hacker site, and over the next few days hackers are expected to move that code into attack tools that are easy to use.
Greenbaum predicted that the attack code will soon be used to build botnet networks of infected computers. "What we are going to see is this attack being added to the arsenal of botcode," he said.
"Once it evolves to the point where people really don't have to know much about the exploit ... those are the situations where people write the worms that do a lot of [damage]," said McAfee researcher Craig Schmugar.
Does he expect a damaging worm to emerge from this latest bug? "If history is a lesson, then yes," he said.

Robert McMillan, IDG News Service

Stumble Upon Toolbar


ditesco said...

In today's ever connected network of computers, security has become an issue which I myself am concerned as to whether we have enough measures to defend ourselves from such kind of attacks. It is scary that we are in fact vulnerable to all these and just cross our fingers and hope that we are not infected.

Ronald said...

Yes, I agree to ditesco, actually threats are really everywhere. It really depends on the programmer's ability and capability.
In addition, hackers are everywhere,I know a lot of them hehehe.

WARSHOCK said...

I agree with guyz.. everyone is vulnerable to those malwares, even Microsoft was not spared, but let me stress this, sometimes, we ourselves let those attackers in with our "Click On Everything" attitude/impulse, and get so easily duped by those malware lures, click this e-mail attachment, tempting ads, click on gimmick images, videos, links, promos ...etc. Let's all be aware of this.

Search Engine Spider Simulator

Enter URL to Spider