Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Security Experts Warn of Kama Sutra Worm (Feb. 3rd WormWatch)
NewsFactor on Yahoo ^ | 1/25/06 | Walaika K. Haskins

Posted on 01/25/2006 4:55:53 PM PST by NormsRevenge

Security analysts are warning computer users about a new and potentially destructive Internet worm that can obliterate important documents. The worm, called Kama Sutra, is making the rounds now, but is scheduled to execute its first massive attack on February 3.

Detected last week, the malicious worm targets computers running Windows and spreads primarily by copying itself to shared network locations and then sending itself to e-mail addresses found on afflicted computers. With subject lines that read "the best videoclip ever," "give me a kiss," and "school girl fantasies gone bad," the worm entices computer users to open the attached file.

"This worm feeds on people's willingness to receive salacious content on their desktop computer, but they could be putting their entire company's data at risk," said Graham Cluley, senior technology consultant at Sophos.

According to Sophos, on the third of each month, the worm will attempt to disable existing antivirus and firewall software and also will delete specific files, such as Microsoft Office documents.

Waxing or Waning Threat

The worm -- also known as Blackworm, Nyxem-D, and W32.Blackmail.E, among others -- was said by Sophos to be the most frequently sighted e-mail worm last week. Sophos statistics indicate that, within the last 24 hours alone, the worm has accounted for some 23 percent of all virus reports.

There are disagreements in the security industry about the severity of the worm, with Symantec and F-Secure taking different positions on the issue. Controversy stems from interpreting one of the worm's most intriguing features: a Web counter. Once the worm infects a new computer, it accesses a Web page on which there is a counter. The counter number increases whenever the Web page is accessed.

Andrew Jaquith, a Yankee Group senior analyst, said that most reports indicate that the counter had risen already to 700,000, which could indicate that nearly a million computers are infected.

Much of the speculation in the industry about the potential for damage done by the Kama Sutra worm centers on the counter number -- which might represent unique machines or accesses to the counter page by the same machine more than once. One of the things that is "sorely lacking" with mass outbreak malware like the Kama Sutra worm, Jaquith said, is any real sense of how many machines are compromised.

"We still don't know, for example, how many machines were really affected by the WMF vulnerability," he explained. "The antivirus vendors don't seem to know either, or are unwilling to divulge much -- possibly because it would expose gaps in their signature coverage."

Back to Old-School

To address what is so far the most expansive malware attack in 2006, speculation among security vendors and researchers has focused on the destructive nature of the worm. Unlike most viruses currently in the wild, the Kama Sutra code is not intended to reap the code writer a windfall of ill-gotten gains. The hacker designed the worm to create mayhem by destroying documents.

"The reason why experts at Sophos believe the worm is likely to have been written by an old-school hacker rather than an organized criminal is its destructive payload," Cluley explained. "That kind of destructive behavior is not typical of financially motivated worms because the damage is too obvious to the end user."

Frost & Sullivan analyst Rob Ayoub said he is not convinced that the worm represents the work of an old-school hacker. This worm is something that the industry has not seen in about a year. "This is just something we haven't seen in a while. It's not a botnet or a zombie. It's a throwback to malware that only seeks to create havoc."

ActiveX Controls

Of greater concern, said Ayoub, is the worm's ability to deceive Windows into receiving a malicious ActiveX control by providing a phony digital signature. Discovered originally by Fortinet, the worm apparently adds some 18 entries to the Windows Registry, allowing it to insert an ActiveX control that can circumvent Windows' defense mechanisms.

The development is interesting, Ayoub said, because, heretofore, the assumption has been that if a piece of software has a digital signature, then it is safe. Ayoub said Microsoft will need to take a serious look at digital-signature technologies.

"In the past, it has always been if the company signs it, then it must be authentic," Ayoub said. "Microsoft needs to look at the digital signing process or else we will see more things like this and that is pretty dangerous because that gets around some of the safeguards that are supposed to keep these things out."

Analysts are urging computer users, especially home users, to make sure that they have up-to-date antivirus software installed on their machines. "There should be no excuse for any data being lost on February 3 by this worm, but there is always the danger that some home users will not have heard that warning," Cluley said.


TOPICS: Business/Economy; Crime/Corruption; Culture/Society; News/Current Events
KEYWORDS: activex; blackworm; kamasutra; nyxemd; securityexperts; virus; warn; worm

1 posted on 01/25/2006 4:55:54 PM PST by NormsRevenge
[ Post Reply | Private Reply | View Replies]

To: NormsRevenge

I'm a little inclined to say that anyone who opens an email attachment that reads "school girl fantasies gone bad" deserves whatever he gets.


2 posted on 01/25/2006 5:00:00 PM PST by Cicero (Marcus Tullius)
[ Post Reply | Private Reply | To 1 | View Replies]

To: NormsRevenge

What else can we do to prepare besides having our virus defs updated?


3 posted on 01/25/2006 5:03:02 PM PST by Maximus_Ridiculousness (Chloe O'Brian ROCKS!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Maximus_Ridiculousness

Remove Windows/....


4 posted on 01/25/2006 5:04:59 PM PST by Ernest_at_the_Beach (History is soon Forgotten,)
[ Post Reply | Private Reply | To 3 | View Replies]

To: NormsRevenge

"Once the worm infects a new computer, it accesses a Web page on which there is a counter. The counter number increases whenever the Web page is accessed. "

this sounds so much more like an organization wanting feedback on effectiveness versus a kid wanting kicks/ego stuff.


5 posted on 01/25/2006 5:06:26 PM PST by WoofDog123
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

Har har.


6 posted on 01/25/2006 5:06:58 PM PST by Maximus_Ridiculousness (Chloe O'Brian ROCKS!!!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ShadowAce

Ping...


7 posted on 01/25/2006 5:08:45 PM PST by tubebender (Always remember that you're unique. Just like everyone else...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Maximus_Ridiculousness

Sit tight and enjoy the ride.

If your stuffs up to date and be alert for suspicious emails.


8 posted on 01/25/2006 5:11:23 PM PST by NormsRevenge (Semper Fi ... Monthly Donor spoken Here. Go to ... https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Ernest_at_the_Beach
Burn the BAD OS!

Windows Sucks More!

OpenBSD!
9 posted on 01/25/2006 5:16:42 PM PST by hiredhand (My kitty disappeared. NOT the rifle!)
[ Post Reply | Private Reply | To 4 | View Replies]

Comment #10 Removed by Moderator

To: Certain_Doom

I think "kama sutra worm" sounds a bit painful to me.


11 posted on 01/25/2006 5:56:28 PM PST by SampleMan
[ Post Reply | Private Reply | To 10 | View Replies]

To: NormsRevenge

BTTT

Midnight tonight.

Can we just set our computer clock 6 months back?


12 posted on 02/02/2006 2:53:19 PM PST by WestCoastGal (-Flank2 - Wake up guys!! US may be in flank2 position)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson