New worm attacks attack dangerous Windows errors

In the end, a security vulnerability worm that Microsoft had blocked with an emergency update 11 days ago appeared on the Internet.

Security company Symantec named this computer worm Wecorl. Meanwhile Kaspersky Lab and Microsoft used the same name MS08-067.g.

Kevin Haley - Team Manager responds quickly to Symantec's security situations - said it looks like the target of this worm's Windows 2000 operating system attack. This is also understandable because China is also the source of this worm.

New worm attacks attack dangerous Windows errors Picture 1 Haley also confirmed that the Wecorl worm, which is completely different from the stealing Trojan code, also took advantage of the security flaw to distribute it that was discovered by Microsoft before issuing an emergency update.

The Wecorl worm also automatically attacks every other PC on the same network as the infected PC. ' If Wecorl can bypass the firewall, it will be able to attack every other PC in the same network ,' Haley said.

In the security warning message released two weeks ago Microsoft has confirmed that just a standard-level firewall is enough to resist the spread of worms capable of attacking potentially dangerous errors. by patch MS08-067.

Some other security researchers also said that after infecting PC Wecorl worm will download more of a variety of other malicious code such as Trojan and Rootkit to help it avoid the eyes of security software monitoring. Security firm F-Secure has identified the additional downloadable Wecorl code for Trojan-Dropper.Win32.Agent.yhi and Rootkit.Win32.KernelBot.dg.

F-Secure also said the Wecorl worm, which was developed based on the source code of the bug, was released last week.

Users are advised to quickly install updates to fix MS08-067 as soon as possible. The best way is to turn on Automatic Updates feature so that the operating system can automatically update the fully released fixes.

3.5 ★ | 2 Vote

May be interested

  • Facebook is a new trend in cyber attacksFacebook is a new trend in cyber attacks
    attack through mxh, specifically facebook is becoming a new trend, very dangerous in the current cyber attack, mr. vu quoc thanh, vice president and secretary general of vnisa said at the information security day 2014 held yesterday (november 4).
  • OpenOffice worm attacks the operating systemOpenOffice worm attacks the operating system
    security firm symantec warned a malicious code to attack openoffice.org could infect many different operating systems and be hacked to the internet.
  • Iran: The Stuxnet 'total attack' of industrial systemsIran: The Stuxnet 'total attack' of industrial systems
    iranian officials confirmed that the stuxnet worm infested at least 30,000 pcs running windows in the country ...
  • Israel tested the Stuxnet computer worm to attack IranIsrael tested the Stuxnet computer worm to attack Iran
    the new york times reported yesterday that the us and israel have cooperated to develop a computer worm that undermined iran's nuclear bomb efforts.
  • What is a Deface attack? How to prevent Deface attacksWhat is a Deface attack?  How to prevent Deface attacks
    deface attacks are attacks that change the visual appearance of a website. this is often the action of hackers who specialize in hacking systems. they break into a web server and replace the hosted website with their own website.
  • AIM worm is more dangerous than anticipatedAIM worm is more dangerous than anticipated
    facetime security firm warns that the w32 / sdbot-add type of worm is spreading rapidly among aol's im users and is far more dangerous than previous comments.
  • MySpace was attacked violentlyMySpace was attacked violently
    the virtual social network myspace is suffering from an attack that the security community must call 'astonishingly dangerous'. the culprit is a worm that steals user login information and distributes spam.
  • Google Chrome has a function to warn users about MitM attacksGoogle Chrome has a function to warn users about MitM attacks
    the new version of google chrome 63 contains a new security feature that will detect third-party software that performs mitm (man-in-the-middle) attacks - one of the network attack techniques that allows hackers to connect to the internet by user and collect personal information.
  • What is Salami Attack?What is Salami Attack?
    a salami attack can wreak havoc on individuals and organizations. this is a stealthy method to steal small amounts of money or data from many people or businesses, often without the victim knowing about the theft.
  • Will the Kama Sutra worm come back next week?Will the Kama Sutra worm come back next week?
    security experts are now warning users around the world to protect themselves from the ability to return to the new dangerous computer worm kama sutra next week. kama sutra worm - also known as nyxe worm