|
|
March 30, 2000 19:00 GMT Updated April 3, 2000 15:00 GMT to include 911 Worm *** Notes updates
PROBLEM: Malicious codes have become more mobile using e-mail to
automatically distribute themselves to people in your e-mail
address books. The first major outbreak of these was the
W97M.Melissa Word macro virus.
*** A recent worm, the 911 Worm, has been listed that scans
Windows systems for shared drives and attempts to install
itself in those shares. The current version only looks for
shared C: drives.
PLATFORM: Any system receiving e-mail with attachments. The most common
of theses viruses and worms use Microsoft Outlook, Outlook
Express, or Exchange to spread.
*** Windows 95/98 if file sharing is turned on.
DAMAGE: Damage ranges anywhere from simply re-mailing itself to
destroying data on infected systems. Special scripted commands
could send personal information about you to an unknown
address.
SOLUTION: Do not open attachments to e-mail messages that you are not
expecting, especially if they are executable files. If they are
Word documents, be sure to have macro protection turned on and
pay attention to it when the Macro Detected dialog box pops up.
Do not allow unexpected macros to run. Infection from
attachments can be avoided by not double-clicking on the
document or .exe file even if sent by a trusted source. Check
your mail program and web browser security setting to be sure
that hidden scripts or applets are not allowed to run
unnoticed. Keep patches up to date.
*** Share only individual folders. Never share the root system
directory (C:\ on most systems), or the system directory
(C:\WINDOWS on most systems).
VULNERABILITY Risk of infection is high. If you receive attachments by e-mail
ASSESSMENT: you have a good chance of receiving an infected document. The
code's use of 'Social Engineering' tricks to lead you to
believe that the infected document was sent from a
trusted/known source are very effective in getting a user to
open or execute the attached malicious code.
Introduction:
An unwelcome development in malicious code is the addition of self propagation
to computer viruses. These new viruses straddle the line between viruses and
worms. While all viruses propagate themselves by infecting new files, these
new viruses not only infect new files, they also transfer the newly infected
files to other systems. Because of this ability, they no longer have to wait
for a user to transfer the infected file for them. They still depend on a
user at the attacked system to run the infected file but use various forms of
social engineering and the user's lack of knowledge to get the user to do so.
The most well known of these mobile malicious codes is the Melissa virus that
appeared in March of 1999 (see CIAC Bulletin: J-037A: W97M.Melissa Word Macro
Virus). The Melissa virus is a standard Word macro virus (See CIAC bulletins:
G-10a: Winword Macro Viruses and I-023: Macro Virus Update) that runs when the
infected Word document is opened and infects all Word documents that are
subsequently edited on the infected system.
In addition to the standard file infection mechanism, the Melissa virus opens
a connection to the Outlook 98 e-mail program and begins sending e-mail
messages in your name to people in your address books. Attached to each e-
mail message is an infected Word document with the note: "Here is that
document you asked for ... don't show anyone else ;-)". Here it is using
social engineering by masquerading as you to get individuals in your address
book to execute the infected document. These codes typically use social
engineering to trick you into believing that the document or executable was
sent to you by a known or trusted source. Many people will execute files sent
by someone they know before checking to see if the files may be infected with
a virus or have malicious intent.
A second development in this arena is the inclusion of backdoor programs along
with the virus or worm code (see CIAC bulletin: J-032: Windows Backdoors
Update II). The backdoor programs are installed in a system by the virus or
worm and opens your system to hidden, remote logins by the intruder and his
friends.
Since the outbreak of the 'Melissa' virus in March of 1999, many variants or
copy-cat viruses have surfaced. Several have been classified as computer
worms because the code sends itself to other systems though most still require
a user's intervention to allow them to propagate. These files are being
distributed as attachments to e-mail messages with most designed to work with
different versions of Microsoft Outlook. Other e-mail programs, such as
Eudora, could also be used but the virus writers prefer Outlook because it is
usually automatically installed along with Microsoft Word. The attached files
include not only infected Microsoft Word documents but also executable (.exe)
variants of the viruses.
***
In April of 2000 a new worm, the 911 Worm, has surfaced that is capable of
scanning IP ranges in search of non-passworded, shared C drives on Windows 95
and 98 systems. If the shares on the target computer are writable, it will
proceed to copy files on the system that will be executed the next time
Windows starts up.
Damage:
The extent of the damage that these mobile malicious codes cause vary. Most
over utilize your mail server, causing it to freeze or crash. Others load
Trojan or backdoor programs that open your system to outside access without
your knowledge or control. Damage includes destroyed data, loss of e-mail
service, loss of e-mail messages, denial of service, or unauthorized access to
your system. The damage done depends on the particular virus or worm.
Solutions:
Check to see that your system is secure and that you don't allow attachments
to auto-execute. Never allow code to run on your computer that you have not
authorized.
Be sure that your anti-virus software is updated frequently so that it has the
latest virus definitions. As of this writing, Network Associates states that
there are currently over 50,000 malicious codes known.
If you receive an unexpected attachment from a known source, check with the
sender to insure that the attachment is OK.
Attackers utilize known vulnerabilities in Internet Explorer for activating
malicious codes or gain unauthorized access. Microsoft has released patches
to eliminate the problems that Active-X controls can cause.
J-018: HTML Viruses
http://www.ciac.org/ciac/bulletins/j-018.shtml
J-064: ActiveX Controls, Scriptlet.typlib & Eyedog, Vulnerabilities
http://www.ciac.org/ciac/bulletins/j-064.shtml
J-011: Microsoft IE 4.01 Untrusted Scripted Paste
http://www.ciac.org/ciac/bulletins/j-011.shtml
There have been a number of advisories and bulletins on protections against
Macro Viruses. Note that Word 2000 has changed the mechanism for turning on
the macro protection. Instead of using the options dialog box as specified in
CIAC Bulleten J-037A "Melissa" Word 2000 uses security levels. Choose the
Tools, Macro, Security command to view the security dialog box. The setting
should be medium or high, never low. CIAC Bulletin J-037A included an auto
execute macro to insure that all the macro protections are in place. The
revised version of that macro is shown below. Install it as indicated in
J-037A on the "normal" template in a module named AutoExe. Note that in Word
2000 the Macro Security setting must be done by hand. It cannot be set with
code.
Protection Macro Code
Sub Main()
'
' AutoExec.Main Macro
' Macro created 03/30/99 by William J. Orvis
'
If Val(Application.Version) >= 9 Then
'This is Word 2000 or later.
'Macro protection cannot be read or changed with code.
Else 'Word 95, 97
If Options.VirusProtection = False Then
MsgBox "Warning! Virus protection was turned off. I will turn it
back on again.", , "WARNING!!"
End If
Options.VirusProtection = True
End If
If Options.ConfirmConversions = False Then
MsgBox "Warning! Confirm Conversions was turned off. I will turn it
back on again.", , "WARNING!!"
End If
If Options.SaveNormalPrompt = False Then
MsgBox "Warning! Save Normal Prompt was turned off. I will turn it
back on again.", , "WARNING!!"
End If
Options.ConfirmConversions = True
Options.SaveNormalPrompt = True
MsgBox "Security Options Set"
End Sub
J-037A: W97M.Melissa Word Macro Virus
http://www.ciac.org/ciac/bulletins/j-037.shtml
K-004: Microsoft "Excel SYLK" Vulnerability
http://www.ciac.org/ciac/bulletins/k-004.shtml
J-025: W97M.Footprint Macro Virus Detected
http://www.ciac.org/ciac/bulletins/j-025.shtml
I-023: Macro Virus Update
http://www.ciac.org/ciac/bulletins/i-023.shtml
G-10a: Winword Macro Viruses
http://www.ciac.org/ciac/bulletins/g-10a.shtml
Mobile Code Examples:
The following mobile code examples were chosen to give you an overview of the
operations and capabilities of mobile malicious codes and to not be an
inclusive list of these codes.
Mobile Codes using MS Outlook or Exchange
The following mobile codes are patterned after the W97M.Melissa Word macro
virus. 'Melissa' used the address books in Microsoft Outlook for distributing
infected documents.
ExploreZip Worm
J-047: The ExploreZip Worm
http://ciac.llnl.gov/ciac/bulletins/j-047.shtml
ExploreZip (packed) Worm
K-008: ExploreZip (packed) Worm
http://ciac.llnl.gov/ciac/bulletins/k-008.shtml
Papa Virus
X97M/Papa is an Excel 97 macro worm. It's quite similar to the
widespread W97M/Melissa virus. This one is listed by Datafellows at:
http://www.datafellows.com/v-descs/papa.htm
Melting Worm
This worm is an executable Visual Basic program that comes in an e-mail
message with the subject: 'Fantastic Screensaver'. The attachment to the e-
mail message is a copy of the virus named: 'MeltingScreen.exe'. When the
virus runs, it attempts to use Microsoft Outlook to send copies of itself to
all your friends. This particular worm has bugs and often freezes the
computer when run. It doesn't work if the Visual Basic run-time libraries are
not installed on the attacked system.
This worm is listed on the DataFellows website.
http://www.datafellows.com/v-descs/melting.htm
PrettyPark.Worm
The original version of 'PrettyPark', also known as 'Trojan.PSW.CHV', is an
Internet worm, a password stealing Trojan and a backdoor all in one. The file
has an icon showing a cartoon character from South Park.
Recently several facilities in the DOE complex have received copies of variant
D of the PrettyPark.Worm.
Variant D of the worm creates a file called files32.vxd in the Windows\System
directory and modifies the following registry entry value from "%1%* to
files32.vxd "%1%* without your knowledge:
HKEY_LOCAL_MACHINE\Software\Classes\exefile\shell\open\command
The file contains a copy of the worm and the registry change causes that file
to be run every time you run an executable program on your system.
After infecting your system, it uses the addresses in your Internet address
book, and tries to e-mail itself to all your addresses every 30 minutes. This
worm also tries to connect to a IRC server where it can retrieve other
commands to be run from a specific IRC channel.
The PrettyPark.Worm is listed by most anti-virus vendors.
Wscript.KakWorm
The Wscript.KakWorm utilizes a known vulnerability in older versions of
Microsoft Internet Explore (used to display mail in Outlook Express). This
vulnerability allows embedded code to run just by viewing the e-mail message.
The script is in a html scripted e-mail message itself, you don't need an
attachment to transmit the infection. Patches for this vulnerability have been
available for more than a year.
See the following CIAC Bulletin for more information about this vulnerability
and the location of patches.
J-064: ActiveX Controls, Scriptlet.typlib & Eyedog, Vulnerabilities
http://www.ciac.org/ciac/bulletins/j-064.shtml
photos17.exe
This e-mail message is an example of Social Engineering to trick the
recipient into executing the malicious code.
This appears to be a renamed version of the program "ie0199.exe". It
is similar to the Trojan Horse described in CIAC Bulletin I-085.
I-085: Microsoft IE Upgrade Trojan Horse Program
http://ciac.llnl.gov/ciac/bulletins/i-085.shtml
This Trojan appeared in the United States after the mail server at a
major university was spammed with messages containing the trojaned program.
The program was sent as an attachment to a message that read:
*****
Subject: photos
Hi,
I'm sending you the photos that we have told you about!
many kisses,
Viki!
*****
There is no physical damage or lost data. The damage here is to the
reputation of the victim due to spam mail sent from users machine and clogged
e-mail servers.
When the user restarts the computer with the Trojaned program installed an
Internet connection is made to multiple remote locations and Spam e-mail is
sent.
When the e-mail attachment is executed it installs shell32.exe into the
Windows %system root% directory (usually c:\winnt for Windows NT and
c:\windows for Windows 95/98) and adds a reference to that program to the
following Window's registry key
(hkey_local_machine/software/microsoft/windows/currentversion/run/default).
The modification causes the Trojaned shell32.exe to execute each time the
machine is restarted.
BubbleBoy worm
BubbleBoy is a worm that spreads using email by implementing the same old
Internet Explore hole as the Kak worm. It is able to replicate without the
user being required to open/run any mail attachments. In case of BubbleBoy,
the worm activates the moment the email is opened in Outlook. BubbleBoy
infects Windows 98 and Windows 2000 computers. It will also work under Windows
95 if Windows Scripting Host is installed. On all these platforms, BubbleBoy
will function only if an unprotected version of Internet Explorer 5.0 is
installed. BubbleBoy does not run under Windows NT. The worm does not work
when the Internet Zone security settings of IE 5 are set to "High" level.
The worm comes as an email. The subject of the email is "BubbleBoy is back".
The worm code is in the message itself and not as an attachment. When the
email message is opened, the worm using a security loophole creates a file
called "UPDATE.HTA". The worm tries to put this files in the "C:\WINDOWS\START
MENU\PROGRAMS\STARTUP" and "C:\WINDOWS\MENU INICIO\PROGRAMAS\INICIO"
directories. The presence of the UPDATE.HTA file in the startup directory
causes the file to be executed without any security controls the next time the
computer is re-started. As the startup directory names are hardcoded, the worm
infects only the English and Spanish versions of Windows.
J-064: ActiveX Controls, Scriptlet.typlib & Eyedog, Vulnerabilities
http://www.ciac.org/ciac/bulletins/j-064.shtml
***
BAT.Chode.Worm
Aliases: Chode, Foreskin, BAT911
In April of 2000, a new worm has surfaced that is capable of scanning IP
ranges in search of shared C drives that are not password protected. If the
target computer is non-passworded and writable, it will proceed to copy multiple
BAT files that will be executed the next time Windows starts up. This worm is
only able to spread itself if the target computer has the directory C:\WINDOWS\
non-passworded, writable. The main startup component (a PIF, Program
Information File) is installed in the Windows startup folder.
The current variants of this worm are programmed to scan for specific subnets.
Verify that file sharing is turned off.
Windows 95/98 - select My Computer, Control Panel, Networks, and click on
the File and Print Sharing button.
Windows NT - check Control Panel, Server, Shares.
Share only those directories or files that are needed by others and require good
passwords. This does not require making the entire drive sharable.
Alert: 911 Worm (Alias: bat.chode)
http://www.sans.org/newlook/alerts/911worm.htm
NATIONAL INFRASTRUCTURE PROTECTION CENTER INFORMATION SYSTEM ADVISORY (NIPC
ADVISORY 00-038); SELF-PROPAGATING 911 SCRIPT
http://www.nipc.gov/nipc/advis00-038.htm
CIAC services are available to DOE, DOE Contractors, and the NIH. CIAC
can be contacted at:
Voice: +1 925-422-8193 (7 x 24)
FAX: +1 925-423-8002
STU-III: +1 925-423-2604
E-mail: ciac@llnl.gov
World Wide Web: http://www.ciac.org/
http://ciac.llnl.gov
(same machine -- either one will work)
Anonymous FTP: ftp.ciac.org
ciac.llnl.gov
(same machine -- either one will work)
This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.
UCRL-MI-119788
[Privacy and Legal Notice]
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH
