Before Dasher.B launched a day, December 14, the Dasher.A worm, created based on the exploit code posted online two weeks ago, also appeared. However, the first version cannot go far due to programming errors and is placed on a server that no longer operates in China.
Two Dasher variants are not a big risk, but it shows that malicious program writers are still scouring around for Windows vulnerabilities.
At the end of November, Microsoft also acknowledged that the exploit code for MSDTC in MS05-051 has begun to be circulated on the network but confirmed that hackers could not control the system remotely.