Symantec waves red flag over 'Big Yellow'
Worm may affect users behind on product updates
Symantec Corp. customers who have not updated their antivirus software are being targeted by a self-propagating worm, the company said Friday.
The worm, dubbed "Big Yellow," by security vendor eEye Digital Security Inc. has been seen in a handful of attacks, and is not considered to be a serious threat to most users, security vendors say.
The worm exploits a flaw in Symantec's Client Security and AntiVirus Corporate Edition software, which was patched last May, so only out-of-date versions of the product are at risk.
The company's Norton products are not affected by the flaw.
Symantec first noticed some scanning activity on the Internet related to this attack, on Wednesday, said Vincent Weafer, senior director with Symantec Security Response. "Since then it's gone to a background level," he said. "We have had three submissions locally from our customers."
However, according to eEye, infections are much more widespread than Symantec's data suggests. Since Thursday morning, eEye has counted about 70,000 compromised systems, said Marc Maiffret, the company's chief technology officer.
Maiffret could not explain the discrepancy between eEye's and Symantec's data. "I don't know why they're saying that," he said.
The worm looks on port 2967 for unpatched clients. When it finds them, it installs its malicious software on the user's system, Weafer said.
A separate attack, which also exploited the same flaw, surfaced in late November, Weafer added. In that case, attackers focused on about a dozen educational institutions.
"It occurred over a two-day period and then died down. This time around, with this new bot worm, we're not even seeing that [level of] activity."
Though eEye put out a news release Friday warning of the worm, the malware has not caused much concern in the security community because it is not widespread, said Russ Cooper, a senior information security analyst at Cybertrust Inc. "This is [eEye] drumming up year-end press," he said.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts