New User? Click here to register! Feel free to read this for beginners help.

Computer Cops
image image image image image image image image
Prime Choice
· Dnld of the Week!
· Yahoo & CCSP!
· Find a Cure!

· Ian T's (Article 10)
· Marcia's (Op5)
· Paul's (Article 3)

· Ian T's Archive
· Marcia's Archive
· Paul's Archive
· Dnload Archive!
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Security Central
· Home
· Wireless
· Bookmarks
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search
· Sections
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
Donations
image
Search

image
Survey
Which Anti-Virus product do you use?

Computer Associates
Eset (NOD32)
F-Secure
Frisk (F-Prot)
Grisoft (AVG)
Kaspersky
Network Associates (McAfee)
Panda
Sophos
Symantec (NAV)
Trend Micro
Other



Results
Polls

Votes: 6127
Comments: 53
image
image worm: Commentaries: Worms Are for Suckers image
Worms


Worms Are for Suckers
By Larry Seltzer

I must confess that for the most part I find mail worms boring. With few exceptions they all seem the same to me.

Several worms and trojans and all that sort of attack are released every day, although you don't hear much about most of them. The news about the famous ones is usually so routine that I've thought about writing a program to generate a news story about them.

Sort of like MadLibs, the program would generate a story that says the new worm, named W32.[WORM_NAME].D (although also known as [ALT_WORM_NAME.D] by some vendors), spreads through e-mail, network shares and peer-to-peer services such as KaZaA. After the victim launches it, the program sets itself to run at boot time by setting a key in the Windows registry. Etc., etc., and so on and so forth.

You get the point, I'm sure. These worms all have far more in common than not. The next news story will be a simple matter of filling in a form and letting the software generate the copy. It's a publisher's dream.

The latest big deal worms, the dueling pair of NetSky and Bagle, illustrate the absurdity of the situation to me. Bagle adds the only clever advance I've seen in months, although it's an idea I heard discussed many months ago: It sends itself out as a password-protected ZIP file. The body of the message has a message, generally from the IT department, including the password to the file. The worm sends out files with a variety of potential passwords, so the contents of the file will differ, and scanners can't easily detect it. NetSky.D, on the other hand, is the same stupid stuff that every other worm has foisted on the world for years now, and every vendor I check with says that it's the major threat out there, spreading rapidly.


Full coverage @ eWeek
Posted on Monday, 08 March 2004 @ 11:08:46 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· HotScripts
· W3 Consortium
· More about Worms
· News by phoenix22


Most read story about Worms:
W32.Welchia.Worm-L4*

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 0 comments
Threshold
  
The comments are owned by the poster. We aren't responsible for their content.