New worm exploits critical Windows bug

Attacks PCs vulnerable to flaw Microsoft fixed with emergency patch

A worm that exploits the bug Microsoft Corp. patched in an emergency update 11 days ago is actively attacking systems, several security companies and researchers said today.

The worm, which Symantec Corp. called Wecorl but was dubbed MS08-067.yard by Kaspersky Lab and Microsoft itself, likely originated in China, said Kevin Haley, director of Symantec's security response squad. It appears to target Chinese-language versions of Windows 2000, he noted.

Haley confirmed that the worm, which is different from the information-stealing Trojan horse that prompted Microsoft to event the out-of-cycle patch on October. 23, is circulating in the wild.

Other researchers echoed Symantec's accept that the worm installs multiple components on victimized PCs, including a Trojan downloader and rootkit code to mask information technology from security software. Helsinki-based F-Secure Corp., for example, identified the old as "Trojan-Dropper.Win32.Agent.yhi" and the rootkit bits as "Rootkit.Win32.KernelBot.dg."

According to Haley, if the worm manages to infect a Windows PC, it also tries to attack all the machines on the same subnet. "If it can go behind the [firewall], then it tin infect other systems," Haley said.

"That circumvents the firewall mitigation that Microsoft noted," said Andrew Storms, manager of security operations at nCircle Network Security Inc. "Enterprises typically have laptops configured to be location-aware so when they're on the company network, parts of the firewall are disabled, or Port 139 is allowed from known IP addresses."

In the security bulletin it released two weeks agone, Microsoft said that "standard default firewall configurations can assist protect network resources from attacks that originate outside the enterprise perimeter."

Within days of the emergency patch, hackers had published working assail code on the Cyberspace.

F-Secure said that the just-released worm is based on the exploit code that had been posted online last calendar week. NCircle's Storms agreed that that's likely the case.

Symantec assessed the worm as a "very low" risk, although the company kept its ThreatCon global threat rating at Level two, because Microsoft issued an emergency patch. "It doesn't appear to be very widespread, although that could change, of course," said Haley.

As counterintuitive as it sounds, Storms said that the appearance of a worm is actually a good thing. "Evidence that nosotros're finding and detecting it means nosotros're in a ameliorate state of affairs than we were earlier," he argued. "If information technology had gone undetected and unfound [the would have meant] that enterprises didn't have any defense in depth. Merely because we're finding it, that ways we have signatures for it."

Storms urged users who had not installed the MS08-067 update to do and so immediately. "The worm may not have many legs, just you should get ahead of the game and deploy now," he said.

Copyright © 2008 IDG Communications, Inc.