New Worm Masquerades As Security Update - InformationWeek
03:33 PM
Moving UEBA Beyond the Ground Floor
Sep 20, 2017
This webinar will provide the details you need about UEBA so you can make the decisions on how bes ...Read More>>

New Worm Masquerades As Security Update

The worm poses as an E-mail from Microsoft and contains a bogus security update as an attachment.

A new worm that tries to take advantage of Windows users anxious to get their hands on security updates began making the rounds on Thursday, several antivirus firms confirmed.

The worm, which goes by a variety of names, including Swen, W32/Swen@MM, Gibe, and W32/Gibe-F, can pose as an E-mail from Microsoft bearing a bogus security update as a file attachment.

It spreads in several ways, including the traditional mass-mailing method of stealing addresses from Outlook address books on compromised machines, but also propagates over Internet Relay Chat and peer-to-peer networks such as Kazaa. Successful infections attempt to steal account information, including usernames and passwords.

The worm also exploits a 2-year-old vulnerability in Windows--for which a fix is available from Microsoft--that allows it to auto-execute on unpatched PCs. In those situations, the receiving system is infected even if its user doesn't open the attached file.

Most anti-virus vendors have tagged Swen as a relatively low risk. Symantec rates it as only a 2 on its 1-through-5 scale, while both Trend Micro and Network Associates list it as "low," although Network Associates ranks it as a "medium" threat to home users.

"Swen preys upon the good nature of individuals who want to patch their computer in the wake of new vulnerability and virus announcements," said Ken Dunham, the malicious code intelligence manager at security firm iDefense.

Antivirus software suppliers have already posted updates to their products' definition files to detect Swen.

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll