Feeds

Sasser suspect walks free

Probation and no fine for 'world's worst' VXer

  • alert
  • submit to reddit

High performance access to file storage

The teenage author of the infamous Sasser worm has been sentenced to one year and nine months probation following his conviction for computer sabotage offences. Sven Jaschan, 19, escaped a prison sentence after confessing to computer sabotage and illegally altering data at the beginning of his trial in the German town of Verden this week. Jaschan will also have to serve 30 hours community service at the local hospital but he escaped any fine.

The teenager was tried behind closed doors in a juvenile court because he was 17 at the time the worm was created, a mitigating factor that went a long way to ensuring Jaschan escaped a more severe punishment for the havoc he wrought.

Sasser is a network aware worm that exploited a well-known Microsoft vulnerability (in Windows Local Security Authority Subsystem Service - MS04-011) to infect thousands of systems in May 2004. German prosecutors picked three German city governments and a broadcaster whose systems were disrupted by Sasser as specimen victims in the prosecution against Jaschan. These organisations were selected from the 143 plaintiffs with estimated damages of $157,000 who have contacted the authorities. All indications are that this is the tip of a very large iceberg. Anti-virus firm Sophos reckons Jaschan was responsible for more than 55 per cent of the viruses reported it last year, thanks to his role in creating bot the Sasser and NetSky worms.

"Jaschan's worms caused considerable damage, but was committed when he was still a junior. Some who have to defend computer systems against worms may feel frustrated that the sentence isn't stronger, but it has to be remembered that he was a young kid who did something immensely dumb rather than one of the organised crime gangs intent on stealing money via viruses that we are now commonly encountering," said Graham Cluley, senior technology consultant at anti-virus firm Sophos.

"It is, however, surprising that there doesn't appear to any fine attached to his sentence. From the sound of things Jaschan will go into work at the security firm that employs him [Securepoint] just as normal tomorrow morning."

Jaschan was arrested in the village of Waffensen near Rotenburg, in northern Germany, on suspicion of writing and distributing the Sasser worm in May 2004. The teenager later confessed to police that he was both the author of Sasser and the original creator of the NetSky worm.

He was arrested after a tip-off to Microsoft from individuals (Jaschan's erstwhile friends) hoping to cash in through Microsoft's Anti-Virus Reward Program. Investigators questioned Jaschan's mates on suspicion of assisting his virus writing activities but none have been charged. ®

Related links

Sasser author sentencing report, by German daily Der Spiegel

Related stories

German police arrest Sasser worm suspect
Police probe Sasser informant
German police raid five homes in Sasser case
Sasser author gets IT security job
Sasser kid blamed for viral plague

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.