Feeds

Nimda worm tails off

But virus still scanning systems

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

The spread of Nimda, the hybrid worm that affects both email users and Web sites, appears to be subsiding. But the effects of the most sophisticated virus yet unleashed are still been felt across the Internet.

Nimda (Admin spelled backwards) exhibits many of the traits of the Code Red worm combined with the email- spreading characteristics that make viruses like the Love Bug and SirCam such a pain.

The worm threatens Microsoft Internet Information Services Web servers and individual users running Microsoft Outlook or Outlook Express on any Windows platform.

A computer can become infected through a variety of means ranging from simply viewing an infected web page using a browser with no security enabled, to opening a malicious email attachment. It can also spread via network shares.

Infected email arrives with an attachment - readme.exe, which is not always visible and contains a randomly generated subject line and no body message. The worm uses its own SMTP engine to email itself out to all the addresses it collects by searching the user's incoming and outgoing email boxes.

The worm targets vulnerable IIS Web servers, using the Universal Web Traversal exploit, which is similar to the flaw used by the Code Red worm. When users visit a compromised Web site, the server will run a script attempting to download an Outlook file, which contains Nimda.

Nimda also has various side effects, such as increasing network traffic while searching for machines to infect, which may cause network bandwidth problems, particularly for those with low-speed connections.

Numerous Register readers have reported Nimda-generated scanning activity that is an order of magnitude greater that created by the Code Red worm.

Paul Rogers, a network security analyst at MIS Corporate Defence, said that networks attached to infected machines can become flooded with traffic and that this was a more serious than any noticeable slowdown to the Internet as a whole.

Rogers said the worm can create backdoors into systems but the exact effect of the worm was unclear because, as an exe file, it was more difficult to analyse the effect of its payload.

This view is backed up by Symantec, which believes that the worm is a file infector that overwrites .Exe files. It creates guest account with administrator privileges and creates open shares on an infected system. Nasty.

Perhaps the only positive news comes from MessageLabs, a managed service provider which scans its customers email for viruses, which reports that spread of Nimda has subsided. at the time of writing today, Messagelabs has blocked 383 copies of Nimda, down on the comparable period yesterday.

Symantec advises number of steps to block the virus, including updating virus definitions, updating IIS Web Server and client software against security vulnerabilities and filtering emails containing a "readme.exe" attachment. These are explained in much more detail here.

Perhaps the best advice is the simplest though: don't open suspicious emails, bin them instead. ®

External links

FBI advisory on Nimda with links to patches and more information

Related Stories

Teenage Mutant Nimda email rides the Code Red worm
Code Blue targets Red China
Code Red busting code gets cool reception
Son of Code Red is born
Users haven't learned any lessons from the Love Bug
SirCam tops Virus charts

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.