Posted on 01/20/2004 1:33:31 PM PST by neverdem
Special to CNET News.com
Computer security experts fear a new worm that began spreading rapidly across Australian e-mail networks on Sunday could be a rehearsal for a more concerted attack in coming weeks.
The worm--dubbed Bagle-A--carries an expiration date, possibly indicating that more robust versions of the worm could be slated for release soon, said Daniel Zatz, security director for Computer Associates Australia.
While Bagle-A is already successful--responsible for an 80 percent increase in queries to CA's help desk and in virus submissions to rival computer security company Sophos--the current version of the worm contains bugs, Zatz said.
Comparing Bagle to the infamous Sobig virus that flooded global e-mail networks last year, Zatz said he fears that a more virulent version of the new worm could appear soon.
"One of our biggest concern is that if we look back a year ago at the Sobig variants, they all had drop-dead dates, and every time one hit that drop-dead date a new variant came out--a new and improved variant of it," Zatz said.
Bagle-A is due to expire Jan. 28, suggesting that tuned variations of the worm could appear as early next week.
Bagle-A's creators, like authors of many previous successful worms, have relied on the ignorance and curiosity of e-mail users for the worm's success.
The worm arrives in e-mail in-boxes as a message containing few lines of text suggesting the e-mail may be from system administrator, as well as an executable attachment. When the attachment is activated by its receiver the worm then installs a program on the recipient computer that allows the worm to be e-mailed on to other users in the system's local address book.
The worm also attempts to install a backdoor or Trojan horse on infected machines, listening for activity on port on 6777.
Sean Richmond, support manager with antivirus software vendor Sophos Australia and New Zealand, said the company was still examining the Trojan horse to see what else it's capable of.
Given that most corporate e-mail servers block transmission of executable attachments, CA's Zatz believes that home and medium-size business users are responsible for spreading the new worm.
Another possible factor in the worm's success, Zatz said, was the fact the worm's creators programmed the worm to e-mail itself to handful of popular domains to evade swift detection by dominant Web enterprises such as Hotmail, MSN and a large Russian computer security agency.
Users who suspect their computers may be infected with the virus should look for a file called bbeagle.exe in their Windows System directory. The file disguises itself with Microsoft familiar calculator icon.
Andrew Colley of ZDNet Australia reported from Sydney.
A few minutes later I got a notice from the administrator indicating that a message I had sent had been contained a virus which it had cleaned.
I went to the McAffee site and looked up what this puppy does. It spoofs a sender's address. Apparently so successfully that the network at my company though I had sent the message.[I hadn't, I checked and my system wasn't infected.] What it apparently doesn't do in the spoofing process is to display the alias of the sender, just the address.
McAffee also notes: (1) that this thing has its own stmp engine so it doesn't need your email program to do its thing; and (2) that in addition to the potential for clogging up systems with bogus email payloads, it also creates a remote control feature that remains dormant awaiting a command.
Kind of hard for me to understand what sort of a weenie could get enjoyment out of writing viruses!!!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.