Update: Sasser worm could hit hard today
Experts warned it could spread quickly today as workers returned to the office with infected laptops
Computerworld - Microsoft Corp. issued an unusual weekend security warning Saturday that a worm has been unleashed on the Internet taking advantage of a security hole announced publicly last month (see story). Microsoft once again urged users to install its most recent critical Windows updates.
The worm's impact is expected to peak today as millions of workers bring their laptops back to their offices after using them over the weekend to access the Internet from relatively unsecured home locations.
Microsoft rated the vulnerability exploited by the W32/Sasser A and Sasser B worms as critical, and security experts urged all users of vulnerable system to apply patches immediately.
"Microsoft has verified that the worm exploits the Local Security Authority Subsystem Service (LSASS) issue addressed in Microsoft Security Update MS04-011 on April 13, 2004," the company said in an announcement posted yesterday and updated yesterday morning. In its security update, Microsoft included a tool that checks for system infection by the Sasser worm.
Versions of Windows XP and 2000 are vulnerable, although not XP 64-Bit Edition Version 2003, Microsoft said.
The worm has positioned itself as one of the quickest-spreading and most virulent ones around, suggesting that the number of incidents will soar at the beginning of the week, according to Luis Corrons, director of security vendor Panda Software SL's PandaLabs unit.
The Sasser worm works in a similar way to last year's Blaster worm, but has not yet spread so quickly, according to Graham Cluley, senior technology consultant at security vendor Sophos PLC.
Despite the Microsoft warning, some users may be reluctant to apply the needed patches, however, since there have been reports that the fixes create new system problems, such as causing some systems to slow down or stop responding (see story).
Both Symantec Corp. and Network Associates Inc.'s McAfee antivirus unit rated Sasser as medium risk, while Computer Associates International Inc. rated it low risk. Trend Micro Inc. said it issued a yellow alert to its customers.
Later yesterday, Symantec upgraded the Sasser threat to 4 on its scale of 1 (very low) to 5 (very severe) because of the rising number of infections.
Sasser spreads by scanning IP addresses for access via TCP Port 445 looking for vulnerable systems, according to Symantec. When it finds an unpatched Windows XP or Windows 2000 computer, Sasser.A adds the file "avserve2.exe"="%Windir%\avserve2.exe" in the registry, tries to block attempts to shut down or reboot the infected computer (by using the AbortSystemShutdown application programming interface) and then begins scanning other systems via an FTP server on TCP Port 5554 seeking to spread itself, Symantec said.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts