Malicious Worms Still Probing Microsoft VulnerabilityMalicious Worms Still Probing Microsoft Vulnerability

Three versions of the Korgo worm have appeared this week, taking advantage of a month-old vulnerability.

information Staff, Contributor

May 27, 2004

2 Min Read
information logo in a gray background | information

A trio of malicious worms is taking advantage of a month-old vulnerability in Microsoft Windows operating systems, evidence that not all systems have been patched, security firms said Thursday.

Three versions of the Korgo worm have appeared this week, all exploiting the LSASS flaw within Windows that was disclosed and patched in mid-April.

Korgo.a, Korgo.b, and Korgo.c all scan for unpatched systems--like Sasser, the first worm to use this hole in Windows, Korgo doesn't arrive via E-mail--and when one is detected, open a back door and upload their payload.

Also known as Padobot, Korgo "chooses the IP-addresses of random machines to infect and attack, similar to other worms which exploit the same LSASS vulnerability," Finnish security firm F-Secure said in an advisory.

The worms open a variety of TCP ports, including 113, 445, 2041, 3067, and 6667 as a back door, then communicate with a variety of Internet Relay Channel servers for further commands and to receive data. Once compromised, the worms may let attackers gain full control of the system.

Although the Korgo line has been dubbed a minor threat by virtually all anti-virus firms—Symantec Corp, ranked the three as a "2" in its 1-through-5 assessment scale--F-Secure noted that Korgo "seems to be stealing user information very aggressively through keylogging techniques."

F-Secure's analysis points to a Russian hacker group, dubbed the "Hangup Team," as the probable creator of Korgo.

Even though this new mini-wave of worms is not spreading particularly fast, security firms again urged users to make sure that their Windows NT, 2000, XP, and Windows Server 2003 systems are patched against the LSASS vulnerability.

The patch can be downloaded from Microsoft's Windows Update Web site, (http://v4.windowsupdate.microsoft.com/en/default.asp) or directly from here (http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx).

Read more about:

20042004
Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights