Downadup worm - part 2

What does the worm do?

Downadup uses several different methods to spread. These include using the recently patched vulnerability in Windows Server Service, guessing network passwords and infecting USB sticks. As an end result, once the malware gains access to the inside of a corporate network, it can be unusually hard to eradicate fully.

Typical problems generated by the worm include locking network users out of their accounts. This happens because the worm tries to guess (or brute-force) network passwords, tripping the automatic lock-out of a user who has too many password failures.

Once this worm infects a machine, it protects itself very aggressively. It does this by setting itself to restart very early in the boot-up process of the computer and by setting Access Rights to the files and registry keys of the worm so that the user can't remove or change them.

The worm downloads modified versions of itself from a long list of websites. The names of these websites are generated by an algorithm based on current date and time. As there are hundreds of different domain names that could be used by the malware, it is hard for security companies to locate and shut them all down in time.

F-Secure has released a free tool that can remove known versions of Downadup. The tool is also available for download from F-Secure's blog.

Labels:

> Downadup worm
> Advanced Firewall
> Oracle 41 security patches
> Project Management & Business Management Software
> keyboard/video/mouse
> Digital Display Technology
> Zombie Hordes : Microsoft and Silicon Valley
> The Server
> Top Oracle security headlines
> Database

> February 2008
> April 2008
> May 2008
> June 2008
> July 2008
> January 2009
> April 2009
> May 2009
> September 2009
> October 2009
> January 2010
> September 2010
> October 2010
> November 2010
> December 2010
> January 2011
> April 2011