Security Volunteers Reach Out To Kama Sutra-Infected PCs - InformationWeek
IoT
IoT
News
News
1/26/2006
06:50 PM
50%
50%
RELATED EVENTS
[Dark Reading Crash Course] Finding & Fixing Application Security Vulnerabilitie
Sep 14, 2017
Hear from a top applications security expert as he discusses key practices for scanning and securi ...Read More>>

Security Volunteers Reach Out To Kama Sutra-Infected PCs

The goal is to notify companies and anyone who might be infected--before the worm is due to start overwriting files on Feb. 3.

Security experts from a volunteer task force have collaborated with the Internet Storm Center and others to contact ISPs and companies whose computers have been infected with the Kama Sutra worm before the Feb. 3 trigger when the worm begins overwriting files.

Kama Sutra, which also goes by a bewildering range of names including Nyxem.e and Blackmal.e, has been spreading for less than two weeks, and probably has infected several hundred thousand PCs, say analysts. Its most distinguishing characteristic: it will overwrite the data in a long list of document formats -- primarily those of Microsoft Office, but also some of Adobe as well as a pair of popular compression formats -- with a text string, rendering the files useless.

The worm also trips a Web site counter each time a copy infects a computer. It's this counter that led the TISF BlackWorm task force, a loose group of volunteers, to a list of affected domains.

According to Randy Vaughn, a professor of information systems at Baylor University, and a member of the task force, the counting site's host ISP provided a log of the counter page that was invaluable.

"We took the IP addresses and time stamps," said Vaughn, "and matched those to our lists of autonomous systems. We already had an automatic notification [system] running, so we sent out 2,000 notifications."

Once the notifications are received by the ISPs or companies, it's up to them to decide how to alert their users.

The task force came out of the MWP (Malicious Websites and Phishing) and DA research groups, a loose confederation of security professionals who work for anti-spam/anti-virus vendors, various nations' CERTs, universities, and ISPs. The group last mobilized publicly in August 2005 when it put out an alert warning of growing scams after Hurricanes Katrina and Rita hit the Gulf Coast of the U.S.

Vaughn characterized the task force and the MWP/DA as a volunteer "civil defense system," but acknowledged less kind descriptions. "We really don't like the term 'security vigilantes,'" he said.

The task force split the list with the SANS Institute's Internet Storm Center to e-mail notifications to ISPs and other networks whose addresses appeared in the log. "We've had an excellent response," Vaughn said. "I've gotten hundreds of e-mails from the networks we notified.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll