Feeds

Netsky B is very pesky

Mutating worm

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

A new, more dangerous version of the Netsky worm is making the rounds on the Internet.

The bug, which goes by the name Netsky-b or Moodown-b, is a modified version of NetSky-a that surfaced earlier this week. Initial ratings from the likes of Symantec, Network Associates and F-Secure suggest that the malware is a medium- to high-grade threat; and early reports say that the worm is spreading quickly.

Though not nearly as virulent or destructive as the recent MyDoom bug, Netsky-b has infected hundreds of systems, including computers within some major corporations such as Lucent, according to reports.

Netsky-b is a self-propagating -mail worm, which is delivered in executable attachments in incoming e-mails. Once the infected attachment is opened, the bug copies itself to the computer and re-sends itself to all email addresses found on the hard drive of the contaminated PC.

Some interesting and nefarious aspects of the worm include innocuous-looking file extensions on some infected files, such as .doc, .txt or .rtf. These phoney extensions, which may be designed to fool users and anti-virus software, appear before actual file type extensions such as .pif, .scr, .exe or sometimes .zip.

Emails containing the bug are also delivered with subject lines such as "hi," "information" and "stolen,". Email body messages are simple and include lines such as: "here is the document." Netsky-b also spoofs email addresses so that incoming messages may appear to come from someone with whom the potential victim is familia.

The worm affects only versions of Windows later than Windows 95 and it has the capacity to spread via file-sharing networks like Kazaa, Bearshare and Limewire. Once installed, the malicious software launches a fake error message which reads: "The file could not be opened!"

The worm also attempts to make some registry-key changes, including changes that are capable of deactivating the Mydoom.a and Mydoom.b bugs, if they exist on the victim's computer.

Anti-virus vendors and e-security experts are, as always, urging users not to open suspicious e-mails and recommending that users upgrade their anti-virus software as soon as possible.

© ENN

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.