Feeds

Homepage Net worm spreading like wildfire

Uses same tricks as Kournikova virus

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

A virus that uses the same tricks as the Anna Kournikova worm is spreading like wildfire.

Homepage-mm, an Internet worm written using Microsoft Visual Basic scripting language, and possibly based on the same toolkit as the Anna worm, is assaulting to email servers of European firms this afternoon.

Alex Shipp, an antivirus technologist at managed services firm MessageLabs, which scans its customers email for viruses, said that at least two firms have decided to shut off their email servers in order to contain the spread of the worm.

He said the Homepage worm, which appears to have been produced using the same toolkit as the Anna worm, was unleashed into the wild in Asia overnight and having gained a foothold there is spreading at rates slightly higher than the Anna bug. So far MessageLabs has intercepted 9,000 copies of the Homepage worm, a run-rate slightly higher the Anna outbreak.

The worm arrives at a user's machine via email with the subject line "Homepage" and a text message that states "Hi! You've got to see this page! It's really cool ;O)". If a user click on the attachment to the message "homepage.HTML.vbs" their machine becomes infected.

Homepage then emails a copy of itself to everyone in a user's Outlook address book and set the home page of a user's Web page to one of four randomly selected porn sites.

MessageLabs' Shipp said we are lucky the virus does not contain a malicious payload. He said users might be tempted to open the attachment because it would come from someone they know and because it was "so simple it's believable".

Bruce Walton, UK managing director of antivirus vendor Command Software, said that AV vendors had updated their virus definitions overnight and urged users to update their software to protect themselves from the virus. ®

External links:
Homepage worm write-up from Command Software
MessageLab stats on the virus outbreak

Related stories:
Reports of death of email viruses greatly exaggerated?
No more I Love You viruses
Rise in viruses within emails outpacing growth of email
Anna Kournikova bug drops harmlessly onto the Net
Users haven't learned any lessons from the Love Bug
Microsoft security fixes infected with FunLove virus
Virus plague causes charity to consider Linux

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.