'Witty' worm exploits hole in BlackIce security product
ISS estimated that the worm infected about 12,000 IP addresses
IDG News Service - A new worm that exploited a hole in some of Internet Security Systems Inc.'s intrusion-protection products seems to be dying down after affecting thousands of IP addresses since Saturday.
The Witty worm, which has affected some versions of ISS's BlackIce and RealSecure intrusion-protection products, is "highly malicious" because it slowly destroys the systems it infects, according to an alert from Lurhq Corp., a managed security provider. "Rather than simply executing a 'format C:' or similar destructive command, the worm slowly corrupts the filesystem while it continues to spread," Lurhq's alert said.
The spread of the worm appeared to be slowing today, said Joe Stewart, senior security researcher at Myrtle Beach, Calif.-based Lurhq. "It was only a big deal for the people who had the ISS products' specific versions," he said. "It was not a threat for Windows users in general."
Atlanta-based ISS estimated that the worm infected about 12,000 IP addresses, although the exact number is difficult to determine, said Dan Ingevaldson, director of X-Force research and development at ISS. Early reports had the worm infecting up to 50,000 IP addresses, but Ingevaldson said the company's scans didn't find evidence of the worm being that widespread.
"We saw a spike in the first days of the infection, and it's been going down since then," he said.
The worm, which exploited an ICQ parsing vulnerability, affected non-updated versions of the BlackIce and RealSecure products. A complete list of affected versions is available at ISS's alert site online. An ISS update that fixes the vulnerability has been available since March 9.
In addition to the maliciousness of the worm, its timing is also significant, Stewart said. A vulnerability alert for the ISS products was released on March 18, and the worm began spreading March 20. The writer of the worm either knew of the vulnerability before the announcement or wrote and tested the worm in less than two days, he said.
"Usually, you have a week or two after the vulnerability was announced," Stewart said. "This was a substantial piece of work to be done in one day."
ISS counts about 1.6 million corporate installations of the BlackIce PC intrusion-detection software, and that number doesn't include home installations. The worm illustrates the importance of running updated intrusion-detection and firewall software, Ingevaldson added.
"Our customers know you have to apply the most recent updates," he said. "They know that for it to work, they need to have the most recent updates, and they would not be affected at all if they did."
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Malware and Vulnerabilities White Papers | Webcasts