Gokar worm spreads by e-mail, Web, chat
IDG News Service - A new worm called Gokar began to spread across the Internet today via e-mail, the chat program mIRC and the Web, according to a trio of antivirus firms.
The worm isn't destructive and hasn't yet infected many systems, but as with any mass-mailer worm, it could become a nuisance as unsuspecting users spread it. Like other mass-mailing worms such as Anna Kournikova or Badtrans, Gokar spreads through Microsoft Corp.'s Outlook and Outlook Express e-mail clients when a user clicks on an attachment sent with the infected message, according to antivirus firms Symantec Corp., F-Secure Corp. and Trend Micro Inc.
Infected e-mail arrives in user in-boxes with dozens of combinations of different subject lines, body messages and file names, though attachments will end with a .pif, .scr, .exe, .com or .bat extension, the companies said.
When the attachment is double-clicked, the worm installs a file called Karen.exe on the infected system and mails itself to all addresses listed in the computer's address book. The worm then runs every time the infected computer is booted up. Users can determine whether a system is infected or not by searching for the Karen.exe file.
The worm also uses the Internet Relay Chat program mIRC, the companies said. Gokar searches the infected PC for the mIRC application. If it finds it, it attempts to infect IRC users in the same discussion, or channel, as the infected system whenever the application is started, according to Tokyo-based Trend Micro.
Finally, if an infected system is running Microsoft's Internet Information Server (IIS) Web server software, the worm will modify the default Web page on the system and offer users visiting the site a chance to download the worm, according to Helsinki, Finland-based F-Secure. An infected Web site will be changed to display the text "We are Forever" and point users to a link to download a file called Web.exe, which contains the Gokar worm, according to Cupertino, Calif.-based Symantec.
The Nimda worm also defaced Web sites and downloaded files to the computers of users viewing the defaced sites. Unlike Nimda, which automatically downloaded a file through the browser, Gokar requires that the user click a link to download the worm.
Nimda and the Code Red worm both also exploited IIS.
Users should check with their antivirus companies for software updates. Companies are urged to block attachments, especially .exe, .scr or .pif files, at their mail gateways to avoid infection.
- Brief: Israeli youths admit to creating 'Goner' worm, Dec. 10, 2001
- CERT advisory covers printer vulnerabilities, Nov. 5, 2001
- Nimda variant makes headway, author sends message, Oct. 31, 2001
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts