Feeds

Bot spreads through anti-virus, Windows flaws

Universities and schools worst hit

Intelligent flash storage arrays

The Internet Storm Centre's assessment agreed that the bot software appears to only be spreading at a moderate pace and only among universities and colleges, with a few exceptions.

"The spam and the scanning seems to be widespread, while the reports of infection have come from edu's (educational institutions) and a few home users," Mike Poor, an incident handler at the Internet Storm Centre and a security analyst with Intelguardians, said in an email interview with SecurityFocus.

The slow infection speed surprised Scott Fendley, a security analyst with the University of Arkansas and an incident handler with the ISC. While Fendley estimated that thousands of the school's computers were vulnerable to the Symantec flaw, only about 30 systems were actually infected.

"We are currently attempting to understand why this did not propagate faster or infect other hosts on campus," he told SecurityFocus in an email interview.

The software does not appear to explicitly be targeting educational institutions, according to Symantec's Weafer (see correction). However, because schools have less strict policies regarding upgrading critical software, students and academic faculty may be the most vulnerable, Fendley said.

"As university environments are very decentralised, group policies and other mechanisms used to keep software up-to-date and well managed, may or may not exist," he said. "So one department may have completed the upgrades, when the office next door is still using a much older version."

Bots created with the the SpyBot software connect to Internet Relay Chat and await commands. The software attempts to detect if it's been quarantined in a honey pot by looking for the signs of a virtual machine and debugger software. The program uses the File Transfer Protocol to copy software onto compromised hosts.

Symantec recommended that users of its Client Security and Antivirus Corporate Edition update to the latest version of the software.

CORRECTION: The article attributed the assertion that the bot program was not explicitly targeting educational institutions to the wrong person. Vincent Weafer of Symantec stated that the attack did not seem to be targeted.

This article originally appeared in Security Focus.

Copyright © 2006, SecurityFocus

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.