We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
 
74,953 News Articles

New worm targets old Windows flaws

Plexus harvests e-mail addresses and uses Kazaa network to spread itself

Antivirus software companies are warning customers about a new e-mail worm that targets unpatched Microsoft Windows machines with either of two recently disclosed software vulnerabilities.

The new worm, known as both "Plexus" and "Explet.A," was first detected on Wednesday and spreads by exploiting Windows machines with vulnerabilities used by two recent worms, Sasser and Blaster, according to alerts.

Network Associates' McAfee Antivirus Emergency Response Team and Symantec both say the new worm does not pose a serious threat, but issued software updates to detect it.

Like Sasser, Plexus can exploit the recently disclosed hole in the Windows component called Local Security Authority Subsystem Service, or LSASS, which Microsoft patched in April.

And, like the Blaster worm that appeared in August 2003, Plexus can also crawl through a hole in a Windows component called the DCOM (Distributed Component Object Model) interface, which handles messages sent using the RPC (remote procedure call) protocol.

Plexus spreads in files attached to e-mail messages with faked sender addresses and vague subjects such as "RE: order," "For you," and "Good offer." When users open the virus file, the worm is launched and alters the configuration of Windows so that the worm program runs each time Windows starts.

It also scans the hard drive of infected computers, harvesting e-mail addresses from a variety of files, including stored Web pages written in Hypertext Markup Language.

The worm then uses those e-mail addresses to target other users, sending out a flood of messages using a built-in SMTP engine. It is also able to spread to other computers on a network using shared folders and the copies itself to the shared folder file on the Kazaa peer-to-peer network using a variety of file names, including Shrek_2.exe, playing on the popularity of the recently released animated film.

Antivirus companies recommend that Windows users who have not done so already apply software patches for the LSASS and DCOM and update their antivirus software to spot Plexus.


IDG UK Sites

Samsung Gear 2 review: Classy Tizen smartwatch is too expensive

IDG UK Sites

Eight possible names for the next version of Mac OS X: What will Apple call the follow-up to Maveri?......

IDG UK Sites

Why our gadgets will kill us all: bleating notifications, too many chargers and the proliferation...

IDG UK Sites

Inside Twitter's new design and ad offerings