Feeds

Code Blue targets Red China

Running worm lackey of capitalism

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Stand by for Code Blue, a cunning new worm which seeks out systems infected by Code Red and reprogrammes them to launch against targets based in mainland China.

Code Blue exploits a Web traversal vulnerability in Microsoft's IIS Web server first discovered in October 2000, and has infected several systems in China, according to reports.

The infection mechanism for the worm, whose active parts pose as normal Windows files, involves disinfecting remnants of Code Red from targeted systems.

In particular, Code Blue changes the processing of specialised HTTP-requests to make it impossible for Code Red to reinfect an IIS server in the future, according to an analysis of the worm by Kaspersky Labs.

The worm, which could potentially infect systems untouched by Code Red, has a payload which attempts to perform a denial of service attack on www.nsfocus.com, the Web site of a Beijing-based security consultancy. ®

Related stories

Code Red busting code gets cool reception
Qwest tries to worm its way off hook for Code Red outages
MS internal network whacked by Code Red
Code Red and the Cisco Side Effect
Son of Code Red is born
Internet survives Code Red
FBI blows Code Red all-clear

External Links

Link to MS patch for IIS "Web Server Folder Traversal" Vulnerability

Next gen security for virtualised datacentres

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.