Feeds

Sasser kid blamed for viral plague

70 per cent of activity down to one teenager

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

A staggering 70 per cent of viral activity in the first half of this year can be linked to just one German teenager, according to anti-virus firm Sophos.

Sven Jaschan, 18, the self-confessed author of the NetSky and Sasser worms is blamed by Sophos for the vast majority of viral reports it recorded during the first six months of 2004. Just two of Jaschan's viruses - the infamous Sasser worm and NetSky-P - account for almost 50 per cent of all virus activity seen by Sophos up until the end of June. Counting Jaschan's other released variants of the NetSky worm, the total figure comes to over 70 per cent.

Jaschan was arrested at his home in the sleepy village of Waffensen, North Germany in early May following a tip-off from one of erstwhile mates (who have since become suspects themselves) to Microsoft. But for this arrest the situation could have been even worse, according to Sophos. The computer worm he created continues to spread despite the fact that their creator has been taken out of the equation. The Sasser worm hit home computer users worldwide, including the South African government, Taiwan's national post office, Sampo (Finland's third largest bank), RailCorp in Australia and the UK's coastguard service.

"It's like Pandora's box - once released viruses can carry on spreading even if the author has been caught or realises he has done something wrong," said Graham Cluley, senior technology consultant for Sophos. "However, because Jaschan was under 18 at the time he released the viruses it's possible he will escape a stiff sentence if found guilty."

Sophos identified and released protection for 4,677 new viruses in the first six months of 2004, up 21 per cent on the same period last year. "Reassuringly, virus writers haven't had it all their own way so far in 2004. Increased scrutiny from law enforcement agencies and Microsoft's bounty initiative to encourage people to snitch on virus writers and led to Jaschan's high profile arrest in Germany," Cluley added. ®

Virus charts from Sophos 1H04

  1. Sasser
  2. NetSky-P
  3. NetSky-B
  4. NetSky-D
  5. MyDoom-A
  6. Zafi-B
  7. NetSky-Z
  8. NetSky-C
  9. Sober-C
  10. Bagle-A

Related stories

German police arrest Sasser worm suspect
Sasser worm creates havoc
Sasser creates European pandemonium
Netsky tops virus charts by a country mile
We're all MyDoomed

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.