[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-Disclosure] New Worm Discovery - Potential Korgo Variant



Hello,

we also came across a system with a variant of Korgo/Padobot that was NOT
infected with sasser before!
Infection possibly took place via HTTP, a file containing the virus was
found in the temporary internet files.
Looks like this new padobot is also able to spread via Internet Expolrer
vulnerabilities .

Regards, Oliver Heinz

  -------------------------------------------------------------------------
 | arago,                     |  Oliver Heinz                              |
 | Institut fuer komplexes    |  Bereichsleiter Systembetrieb & Security   |
 | Datenmanagement AG         |  eMail: heinz@xxxxxxxx                     |
 | Am Niddatal 3              |                                            |
 | 60488 Frankfurt am Main    |  http://www.arago.de/                      |
 | Tel: +49-69-40568-401      |  PGP-Fingerprint: a5de d4b4 46b3 4d8b 2646 |
 | Fax: +49-69-40568-111      |                   d4d0 e5fd d842 cc4e 7315 |
  -------------------------------------------------------------------------

  Testen Sie jetzt Ihre IT-Sicherheit: http://portscan.netlimes.de/

On Thu, 24 Jun 2004, Cedric Blancher wrote:

> Date: Thu, 24 Jun 2004 16:03:47 +0200
> From: Cedric Blancher <blancher@xxxxxxxxxxxxxxxxxx>
> To: Michael Young <mikeyoung@xxxxxxxxxxxxxxxxxxxxx>
> Cc: full-disclosure@xxxxxxxxxxxxxxxx
> Subject: Re: [Full-Disclosure] New Worm Discovery - Potential Korgo
>     Variant
>
> Le jeu 24/06/2004 à 14:57, Michael Young a écrit :
> > Yesterday a large client of ours was taken down by what appears to be
> > a Korgo variant, but I have been unable to locate any information on
> > this worm.  From what we have discovered, the main process is
> > â??VDisp.exeâ??.  It is spreading through unpatched systems vulnerable to
> > the LSASS exploit, and propagates itself through a serious of randomly
> > chosen ports.
>
> Korgo exploits a buffer overflow within FTP daemon installed by Sasser.
> That would mean your client systems were previously infected by
> Sasser...
>
> --
> http://www.netexit.com/~sid/
> PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE
> >> Hi! I'm your friendly neighbourhood signature virus.
> >> Copy me to your signature file and help me spread!
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html