New worm targets two MS vulnerabilities

Antivirus software companies are warning customers about a new e-mail worm that targets unpatched Microsoft Corp. Windows machines with either of two recently disclosed software vulnerabilities.

The new worm, known as both “Plexus” and “Explet.A,” was first detected on Wednesday and spreads by exploiting Windows machines with vulnerabilities used by two recent worms, Sasser and Blaster, according to alerts. Network Associates Inc.’s McAfee Antivirus Emergency Response Team and Symantec Corp. both said the new worm does not pose a serious threat, but issued software updates on Thursday to detect it.

Like Sasser, Plexus can exploit the recently disclosed hole in the Windows component called Local Security Authority Subsystem Service, or LSASS, which Microsoft patched in April. Like the Blaster worm that appeared in August, 2003, Plexus can also crawl through a hole in a Windows component called the Distributed Component Object Model (DCOM) interface, which handles messages sent using the remote procedure call (RPC) protocol.

Plexus spreads in files attached to e-mail messages with faked sender addresses and vague subjects such as “RE: order,” “For you” and “Good offer.” When users open the virus file, the worm is launched and alters the configuration of Windows so that the worm program runs each time Windows starts. It also scans the hard drive of infected computers, harvesting e-mail addresses from a variety of files, including stored Web pages written in Hypertext Markup Language.

The worm then uses those e-mail addresses to target other users, sending out a flood of messages using a built-in Simple Mail Transfer Protocol (SMTP) engine. It is also able to spread to other computers on a network using shared folders and the copies itself to the shared folder file on the KaZaa peer-to-peer network using a variety of file names, including Shrek_2.exe, playing on the popularity of the recently released animated film.

Antivirus companies recommended that Windows users who have not done so already apply software patches for the LSASS and DCOM and update their antivirus software to spot Plexus.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now