Security Firms Raise Threat Assessment Of New Worm - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Security Firms Raise Threat Assessment Of New Worm

The worm, known as Mimail.C, is a variation of similar malicious code that was launched in August.

A self-mailing worm spread at such a rapid clip Friday that several security firms raised their threat assessments to alert users of the danger.

The worm, pegged as Mimail.C by most antivirus vendors, was discovered just after midnight Friday and is a variation of similar malicious code launched in August. That trend--one successful worm tweaked to create another--is nothing new; the most notable example has been a series of worms dubbed as Sobig, whose latest incarnation last struck in August and September.

Like its predecessor, Mimail.C attempts to steal confidential information from compromised machines and send the harvested data to predetermined E-mail addresses. The actual Windows applications it pickpockets are still under investigation, says Craig Schmugar, a virus research engineer at Network Associates Inc.

The worm is also coded to perform denial-of-service attacks against a pair of Web sites, Darkprofits.com and Darkprofits.net.

Mimail.C disguises its worm payload in a .zip file labeled as PHOTOS.ZIP and tries to trick users into opening the message and launching the file by spoofing the sender address as originating from the user's own domain and using a subject heading of "Re: our private photos."

Because it's a mass-mailed worm--and collects E-mail addresses from infected Windows systems to propagate--Mimail may clog mail servers or degrade network performance, Symantec Corp. said in an E-mailed alert.

But "it's nowhere near as effective in mailing itself as was Sobig," Schmugar says. Although there could be a spike in propagation, and thus E-mail traffic, as workers leave work and fire up their home PCs, Schmugar doesn't expect the worm to reach the rate of multiplication that Sobig achieved.

Nonetheless, antivirus organizations raised their alert levels to account for the pace of Mimail's spread. Network Associates, for instance, tagged the worm as a "medium" threat, while Symantec upped its assessment from a 2 to a 3 on its 1-to-5 system to designate virus danger.

Antivirus vendors such as Network Associates and Symantec have already refreshed their virus definitions to account for Mimail, and urge their users to update.

Other tactics to stymie Mimail include filtering for the .zip extension at the E-mail gateway and configuring antivirus software to sniff for malware embedded inside compressed files, says Ken Dunham, an analyst with iDefense, a security intelligence firm.

"Many corporations allow for .zip files to be transferred to others through E-mail," Dunham said in an E-mailed statement. "As a result, Mimail.C has the upper hand when infiltrating networks configured to allow .zip attachments."

The .zip attachment also gets by Microsoft's Outlook E-mail client, which automatically blocks a number of file types--ranging from .exe to .pif--but not .zip.

Infected PCs can be cleaned using an automated removal tool posted at BitDefender Inc.'s Web site. Additionally, Network Associates has listed instructions for manually eliminating Mimail on its site.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
Register for InformationWeek Newsletters
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll