Feeds

Kournikova worm marks 10th anniversary

Game, set and match

Intelligent flash storage arrays

Friday, 11 February, marks the 10th anniversary of the outbreak of the Anna Kournikova worm.

The malware spread by tricking users into opening a mail message that supposedly contained a picture of the famous Russian tennis beauty. In reality, the malware harvested a victim's Outlook address book, forwarding fresh copies of itself to every contact it found there.

The worm, written in Visual Basic Script (VBS), wasn't sophisticated but still managed to spread extremely widely, twice as fast as the infamous Love Bug released a year previously.

The worm was one of the first written using a virus toolkit called VBSWG, and one of the first scripting toolkits to be programmed in Visual Basic. The toolkit was created by an Argentinian coder before being infamously abused by young Dutch man, later identified as Jan De Wit, to create the Anna Kournikova virus.

De Wit was tried in his native Netherlands and eventually received a 150-hour community service order. His lawyers unsuccessfully appealed this modest sentence.

Anna Kournikova was the last of the mass mailers. Fast forward 10 years and the malware landscape is dominated by stealthier threats, such as those created by the Zeus of SpyEye cybercrime tools.

The Kournikova worm was the first to be created by someone with a toolkit and little technical knowledge, setting the pattern for the relatively unskilled to use toolkits to create cybcebcrime Trojan variants that has become the dominant pattern of malware abuse today.

More reflection on the history and legacy of the Kournikova malware can be found in blog posts by Sophos here and Symantec here. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.