Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

SYMANTEC PROVIDES COMPREHENSIVE PROTECTION AGAINST W32.NIMDA.A@MM

19.09.2001



New Analysis of Computer Worm Indicates Additional Destructive Payload

Symantec Corp. (Nasdaq: SYMC), a world leader in Internet security, today announced that new analysis of W32.Nimda.A@mm reveals that the worm contains an additional destructive payload that will not only require detection, but removal. The new analysis indicates that the worm is a file infector, overwriting .exe files.

W32.Nimda.A@mm is a mass-mailing worm that utilizes multiple methods to spread itself. The worm sends itself out by e-mail, infects machines over the network, and infects unpatched or already vulnerable Microsoft IIS Web servers. The worm also has various side effects, such as increasing network traffic while searching for machines to infect, which may cause network bandwidth problems. W32.Nimda.A@mm will also attempt to create security holes by creating a guest account with administrator privileges and create open shares on the infected system.

Symantec currently provides an integrated detection and repair solution against W32.Nimda.A@mm. In one step, users can download a cure that will simultaneously detect the worm and repair damaged files. The new definitions are available through Symantec’s LiveUpdate feature or from the Symantec Web site http://www.securityresponse.symantec.com/avcenter/download.html "Using blended Internet security threats - the combination of viruses, exploits, or vulnerabilities - to attack businesses and destroy assets, continue to rise," said Vincent Weafer, senior director of Symantec Security Response. "For the first time, to combat such a fast spreading threat, Symantec integrated its solution for W32.Nimda.A@mm to detect and repair in one seamless step. The integrated solution allows for quick clean up with little downtime, while preventing additional infections."

Symantec Security Response recommends that IT administrators implement the following to stop the propagation of W32.Nimda.A@mm:

  • Block e-mails containing a "readme.exe" attachment.

  • Update virus definitions and ensure that firewalls are correctly configured.

  • Download the latest security updates for Enterprise Security Manager and NetRecon.

  • Install the IIS Unicode Transversal security patch.

  • Install the malformed MIME header execution security patch.

  • Close network share drives.

Additionally, consumers can immediately protect themselves against the new worm by implementing the following:

  • Use Symantec’s LiveUpdate feature to obtain the latest virus definitions.

  • Use the Windows Update feature located on the "Start" menu on Window 95 and higher systems to download new security patches.

  • Disable the "File Download" feature in Internet Explorer to prevent compromise.

Both consumers and enterprises can be infected through a variety of methods.

  • E-mail - One of the methods the worm infects PCs though is e-mail. The e-mail arrives with an attachment - readme.exe that is not always visible and contains a randomly generated subject line and no body message. The worm uses its own SMTP engine to e-mail itself out to all the addresses it collects by searching the user’s incoming and outgoing e-mail boxes. Internet Explorer users v5.01 or v5.5 - (IE 5 with the Service Pak 2 or later installed or IE 6 are not affected) will receive a blank e-mail - no subject line, no body and a hidden attachment. Just opening the e-mail can infect user’s PCs. For the latest Microsoft security patch, visit http://www.microsoft.com/windows/ie/download/critical/q290108/default .asp.

  • Shared Drives - PC users with shared drives enabled are also at risk. The worm searches for open network shares and will attempt to copy itself to these systems and then execute. IT administrators should close all network shared drives.

  • Web sites -When users visit a compromised Web site, the server will run a script attempting to download an Outlook file, which contains the W32.Nimda.A@mm worm. The worm will create an open network share on the infected machine allowing access to the system. W32.Nimda.A@mm specifically targets versions of IIS servers, taking advantage of the known Universal Web Traversal exploit (MS Security Bulletin MS00-078), which is similar to the exploit used in the Code Red attack. Compromised servers will display a Web page and attempt to download an Outlook file that contains the worm as an attachment. IT Administrators should download the Microsoft security patch for IIS 4.0 athttp://www.microsoft.com/downloads/Release.asp?ReleaseID=32061 and for IIS v5.0 at http://www.microsoft.com/downloads/Release.asp?ReleaseID=32011.

Symantec provides additional protection against W32.Nimda.A@mm through the following solutions:

  • Enterprise Security Manager -Symantec’s policy compliance and vulnerability management system, helps manage security patch update functions. New patch templates are available that detect the underlying vulnerability on Windows NT 4.0 and Windows 2000 servers.

  • NetProwler - Symantec’s network-based intrusion detection tool, with Security Update 8 installed, is capable of detecting attempts to attack IIS 4.0 and 5.0 servers through this vulnerability.

  • NetRecon - Symantec’s network vulnerability assessment tool will be updated to detect if this vulnerability exists on a system and if so will provide recommendations on how to fix it.

  • Symantec Enterprise Firewall (Raptor Firewall) - Symantec’s application inspection firewall, by default, blocks suspect outbound data traffic from web servers, like IIS, when operating on the firewall’s service network, thereby stopping the propagation of this, as well as other types of attacks.

  • Symantec Security Check - This service, www.symantec.com/securitycheck, has been updated to scan if a system is vulnerable to this exploit.

  • Norton Internet Security - Symantec’s integrated security and privacy suite for consumers can be updated to ensure only trusted programs access the Internet.

Über Symantec Symantec ist weltweit marktführend auf dem Gebiet der Internet-Sicherheit. Die umfangreiche Palette an Lösungen in den Bereichen Content und Network Security für Privatanwender und Unternehmen umfasst Virenschutz, Firewalls und Virtual Private Networks ebenso wie Vulnerability Management, Intrusion Detection, Internet- und E-Mail-Filter sowie Technologien für die Remote-Verwaltung und Sicherheitsservices für Unternehmen weltweit. Die Consumermarke für Sicherheitsprodukte Norton ist weltweit marktführend im Einzelhandel und hat zahlreiche Auszeichnungen der Branche bekommen. Das im Jahr 1982 gegründete Unternehmen ist in Cupertino, Kalifornien, beheimatet und vertreibt seine Produkte in 37 Ländern. Für mehr Informationen besuchen Sie uns unter

Andrea Wolf | ots
Further information:
http://www.symantec.com/securitycheck,
http://www.microsoft.com/downloads/Release.asp?ReleaseID=32061
http://www.microsoft.com/downloads/Release.asp?ReleaseID=32011

More articles from Communications Media:

nachricht Tile Based DASH Streaming for Virtual Reality with HEVC from Fraunhofer HHI
03.01.2017 | Fraunhofer-Institut für Nachrichtentechnik Heinrich-Hertz-Institut

nachricht Product placement: Only brands placed very prominently benefit from 3D technology
07.07.2016 | Alpen-Adria-Universität Klagenfurt

All articles from Communications Media >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: Interfacial Superconductivity: Magnetic and superconducting order revealed simultaneously

Researchers from the University of Hamburg in Germany, in collaboration with colleagues from the University of Aarhus in Denmark, have synthesized a new superconducting material by growing a few layers of an antiferromagnetic transition-metal chalcogenide on a bismuth-based topological insulator, both being non-superconducting materials.

While superconductivity and magnetism are generally believed to be mutually exclusive, surprisingly, in this new material, superconducting correlations...

Im Focus: Studying fundamental particles in materials

Laser-driving of semimetals allows creating novel quasiparticle states within condensed matter systems and switching between different states on ultrafast time scales

Studying properties of fundamental particles in condensed matter systems is a promising approach to quantum field theory. Quasiparticles offer the opportunity...

Im Focus: Designing Architecture with Solar Building Envelopes

Among the general public, solar thermal energy is currently associated with dark blue, rectangular collectors on building roofs. Technologies are needed for aesthetically high quality architecture which offer the architect more room for manoeuvre when it comes to low- and plus-energy buildings. With the “ArKol” project, researchers at Fraunhofer ISE together with partners are currently developing two façade collectors for solar thermal energy generation, which permit a high degree of design flexibility: a strip collector for opaque façade sections and a solar thermal blind for transparent sections. The current state of the two developments will be presented at the BAU 2017 trade fair.

As part of the “ArKol – development of architecturally highly integrated façade collectors with heat pipes” project, Fraunhofer ISE together with its partners...

Im Focus: How to inflate a hardened concrete shell with a weight of 80 t

At TU Wien, an alternative for resource intensive formwork for the construction of concrete domes was developed. It is now used in a test dome for the Austrian Federal Railways Infrastructure (ÖBB Infrastruktur).

Concrete shells are efficient structures, but not very resource efficient. The formwork for the construction of concrete domes alone requires a high amount of...

Im Focus: Bacterial Pac Man molecule snaps at sugar

Many pathogens use certain sugar compounds from their host to help conceal themselves against the immune system. Scientists at the University of Bonn have now, in cooperation with researchers at the University of York in the United Kingdom, analyzed the dynamics of a bacterial molecule that is involved in this process. They demonstrate that the protein grabs onto the sugar molecule with a Pac Man-like chewing motion and holds it until it can be used. Their results could help design therapeutics that could make the protein poorer at grabbing and holding and hence compromise the pathogen in the host. The study has now been published in “Biophysical Journal”.

The cells of the mouth, nose and intestinal mucosa produce large quantities of a chemical called sialic acid. Many bacteria possess a special transport system...

All Focus news of the innovation-report >>>

Anzeige

Anzeige

Event News

12V, 48V, high-voltage – trends in E/E automotive architecture

10.01.2017 | Event News

2nd Conference on Non-Textual Information on 10 and 11 May 2017 in Hannover

09.01.2017 | Event News

Nothing will happen without batteries making it happen!

05.01.2017 | Event News

 
Latest News

Water - as the underlying driver of the Earth’s carbon cycle

17.01.2017 | Earth Sciences

Interfacial Superconductivity: Magnetic and superconducting order revealed simultaneously

17.01.2017 | Materials Sciences

Smart homes will “LISTEN” to your voice

17.01.2017 | Architecture and Construction

VideoLinks
B2B-VideoLinks
More VideoLinks >>>