Researchers have discovered a third vector to the Nimda worm, which is set to propagate again through email at 1:00 a.m. Eastern Standard Time (EST) Friday.
“We rechecked the code base to Nimda, and we found a code set that is supposed to re-spread Nimda through email systems starting 10 days after machines were first infected,” said Oliver Friedrichs, director of engineering at the Attack Registry and Intelligence Service. The service is sponsored by SecurityFocus Inc., a business security firm in San Mateo, Calif.
Ten days after first infecting machines, the worm will attempt to spread itself again through readme.exe attachments, with the same payload as its original mail-based infection.
The impact could be significant or minute, depending on how well the IT community has cleaned systems and patched Microsoft Corp. Internet Information Server and Outlook programs. The 10-day vector will likely be less severe than Nimda was the first time because more systems have been patched against the vulnerabilities, Friedrichs said.
But because Nimda has spread itself to so many places on computers, networked systems may not have been cleaned enough to prevent widespread mailings of the virus. Therefore, Friedrichs advised IT managers to do the following:
– Double-check their patches.
– Make sure their antivirus software blocks Nimda.
– Block executables files at the email gateway.
– Alert users not to preview or open any attachments that say readme.exe.