Worms


Dorkbot Now Worming Its Way through Skype

The Dorkbot worm that fooled many a Facebook and Twitter user is now socially engineering Skype users into downloading the malware, whose payload now includes a mechanism to lock down machines.Various antivirus and security companies are reporting the latest iteration rummages through an infected Skype user’s contact list and sends the message “Lol is this your new profile pic?” in English. It sends a similar message in German, too.


Mozilla announced this week that it plans to integrate a silent updater in the next build of its flagship browser, Firefox, allowing future patches for Firefox 12 to be downloaded and installed in the background while the browser is running, according to a blog post by Robert Nyman, Mozilla’s Technical Evangelist on hacks.mozilla.org on Wednesday.

The security community might understand what the Stuxnet worm did. Now the war is over what the worm means – Stuxnet’s legacy, if you will. The latest to weigh in on that question is Steve Croft, of the CBS news magazine 60 Minutes.

Zimuse-A and its variant, Zimuse-B, overwrite MBR (Master Boot Record)
files on infected drives with their own data, either 40 days or 20 days
respectively after infection. This malicious behavior corrupts records
and makes data recovery difficult if not impossible, researchers report. Read the full article. [The Register]

Citing a rising tide of complaints from people
who unknowingly bought counterfeit software infected with malware,
Microsoft announced the launch of educational initiatives
and enforcement actions in over 70 countries to raise awareness of
counterfeit software and to protect consumers. Read the full article. [Dark Reading]

Researchers expect Conficker to get worse in the coming year in a number of specific ways including the corruption on defensive systems, keylogging, DDoS, mass identity theft, and more. Read the full article. [Help Net Security]

Robert Tappan Morris was the first person convicted by a jury
under the Computer Fraud and Abuse Act of 1986. The story of the
worm he created and what happened to him after it was released
is a tale of mistakes, infamy, and ultimately the financial and
professional success of its author.  Read the full story [Mark Menninger/transmeet.com]

In the never-ending battle to protect computer networks from intruders, security experts are deploying a new defense modeled after one of nature’s hardiest creatures — the ant.
Unlike traditional security devices, which are static, these “digital ants” wander through computer networks looking for threats, such as “computer worms”  — self-replicating programs designed to steal information or facilitate unauthorized use of machines. When a digital ant detects a threat, it doesn’t take long for an army of ants to converge at that location, drawing the attention of human operators who step in to investigate.  Read the full story [wfu.edu]

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.