'Children Of Blaster'

As if last week weren't enough, nastier versions of the Blaster worm are likely to hit
Tech-security pros knew a worm was coming, once Microsoft announced in July a serious security vulnerability in the most-current versions of its Windows operating system. The worm arrived last week in the form of Blaster, or LoveSan, a virus that infected more than a million systems and clogged corporate networks.

Now they know what's likely to come next: New attacks and variants that use the Blaster worm's approach and create more-destructive strains. "I'm now more concerned about the children of Blaster," says Alfred Huger, senior director of engineering at security software maker Symantec Corp.


Here are the most-destructive worms to hit the Internet:

Nov. 2, 1988: Morris, the original worm, starts at MIT and infects most of the Internet, which then was mostly universities and government

July 16, 2001: Code Red II, three days after the original, infects 359,000 machines in 14 hours

Jan. 25, 2003: SQL Slammer infects 75,000 systems in 13 minutes

Aug. 11, 2003: Blaster Infects more than 1.4 million systems in four days

Blaster followed what's become a common pattern: a virus author builds a worm to exploit a known flaw, and it succeeds because many people never install the patch to eliminate the vulnerability. The worm targeted at-risk Windows operating systems used by both home users and businesses.

McAfee Security estimates 1.4 million systems were infected last week, but that tally may go much higher, especially if variants succeed. Millions of computer systems likely remain unpatched, says Dan Ingevaldson, engineering manager for the security research group X-Force at Internet Security Systems Inc. By late last week, variants of the worm, ranging from changes in its name to minor tweaks in its code, began to surface. "All it takes is someone to grab the code and tweak it to make it better, faster, and much more destructive," Ingevaldson says.

Remember Code Red, the worm that wreaked havoc on the Internet in the summer of 2001? The one that caused the damage was actually Code Red II. It was an optimized variant of the original that swept through hundreds of thousands of vulnerable systems running Microsoft's Internet Information Services in a matter of hours.

Blaster actually wasn't that destructive a worm, Ingevaldson says. It doesn't work every time, and it crashes many victim's systems, which limits how quickly and widely it spreads. Ingevaldson says a more dangerous version would spread faster, not crash infected systems, and contain means to steal or destroy data: "It doesn't take much to make these worms more destructive."

Editor's Choice
Brandon Taylor, Digital Editorial Program Manager
Jessica Davis, Senior Editor
Cynthia Harvey, Freelance Journalist, InformationWeek
Terry White, Associate Chief Analyst, Omdia
John Abel, Technical Director, Google Cloud
Richard Pallardy, Freelance Writer
Cynthia Harvey, Freelance Journalist, InformationWeek
Pam Baker, Contributing Writer