Feeds

Sasser kid blamed for viral plague

70 per cent of activity down to one teenager

  • alert
  • submit to reddit

Build a business case: developing custom apps

A staggering 70 per cent of viral activity in the first half of this year can be linked to just one German teenager, according to anti-virus firm Sophos.

Sven Jaschan, 18, the self-confessed author of the NetSky and Sasser worms is blamed by Sophos for the vast majority of viral reports it recorded during the first six months of 2004. Just two of Jaschan's viruses - the infamous Sasser worm and NetSky-P - account for almost 50 per cent of all virus activity seen by Sophos up until the end of June. Counting Jaschan's other released variants of the NetSky worm, the total figure comes to over 70 per cent.

Jaschan was arrested at his home in the sleepy village of Waffensen, North Germany in early May following a tip-off from one of erstwhile mates (who have since become suspects themselves) to Microsoft. But for this arrest the situation could have been even worse, according to Sophos. The computer worm he created continues to spread despite the fact that their creator has been taken out of the equation. The Sasser worm hit home computer users worldwide, including the South African government, Taiwan's national post office, Sampo (Finland's third largest bank), RailCorp in Australia and the UK's coastguard service.

"It's like Pandora's box - once released viruses can carry on spreading even if the author has been caught or realises he has done something wrong," said Graham Cluley, senior technology consultant for Sophos. "However, because Jaschan was under 18 at the time he released the viruses it's possible he will escape a stiff sentence if found guilty."

Sophos identified and released protection for 4,677 new viruses in the first six months of 2004, up 21 per cent on the same period last year. "Reassuringly, virus writers haven't had it all their own way so far in 2004. Increased scrutiny from law enforcement agencies and Microsoft's bounty initiative to encourage people to snitch on virus writers and led to Jaschan's high profile arrest in Germany," Cluley added. ®

Virus charts from Sophos 1H04

  1. Sasser
  2. NetSky-P
  3. NetSky-B
  4. NetSky-D
  5. MyDoom-A
  6. Zafi-B
  7. NetSky-Z
  8. NetSky-C
  9. Sober-C
  10. Bagle-A

Related stories

German police arrest Sasser worm suspect
Sasser worm creates havoc
Sasser creates European pandemonium
Netsky tops virus charts by a country mile
We're all MyDoomed

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?