The latest versions of the Netsky e-mail worm spreading on the internet may be the work of a different author,...
antivirus software companies believe.
Netsky.S appeared on Monday and Netsky.T was detected the following day. They are the 19th and 20th editions of an e-mail virus that first appeared in February.
Unlike earlier variants, the latest strains open "back doors" on machines they infect, prompting at least one antivirus expert to declare the worm the work of a different virus author.
Network Associates' McAfee Antivirus Emergency Response Team (Avert) rated Netsky.S a "medium" threat. The company has received around 300 samples from customers and from virus-infected machines, said Avert virus research manager Craig Schmugar, adding that company has received only a few copies of Netsky.T.
Sophos said it received just one copy of Netsky.T.
Like its predecessors, the variants target machines running versions of Microsoft Windows. The viruses arrive as files enclosed in e-mail messages that have faked or "spoofed" sender addresses and vague subjects such as "Re: My details", "Request" and "Thank You!" according to antivirus company Symantec.
Earlier versions of the Netsky variant abstained from opening communications ports that could be used as so-called "back doors" that remote attackers could use to access the compromised system. They removed copies of the Bagle e-mail worm from infected machines.
Some antivirus experts believe that Netsky's attack on Bagle installations is behind a war of words between the Netsky author or authors and the creators of the Bagle virus family in recent weeks. The two groups have used new worm variants as vehicles for barbs and retorts to previous insults.
In those exchanges, Netsky's author or authors positioned themselves as the "good guys" locked in a battle with online criminals and spammers. One recent variant, Netsky.Q, even contained an impassioned defence of the Netsky worms.
"We don't have any criminal inspirations (sic). Due to many reports, we do not have any backdoors included for spam relaying," read text hidden in Netsky.Q and transcribed by Sophos and other antivirus companies.
However, the latest variants abandon the high ground, opening a backdoor on TCP (Transmission Control Protocol) port 6789, which could be used to receive instructions or malicious code from the worm author.
A message in the new worm tries to make distinctions between opening a back door and installing a remote access Trojan, but does not contain any overt criticisms of the Bagle author.
"If you look at the 'purpose' behind Netsky, it was trying to uninstall other viruses. Now we're seeing behaviour in the new variants like remote access components and DoS attacks," said Schmugar.
New variants of Netsky could be linked to a promise by its author, buried in an earlier variant of the worm, that the worm's source code would be released on the internet.
Antivirus companies have noted differences in the worm's code with variants released since that promise was made in text hidden in the Netsky.K worm, though antivirus companies have not located a copy of the source code on the internet yet.
Still, despite new buried messages and slight variations in the worm's use of file attachments and subject lines, even the latest Netsky worm variants are very similar to previous versions of the worm.
E-mail users should make sure they have antivirus software installed on their computer and consider deploying an internet firewall if they have not already done so, Schmugar said.
Paul Roberts writes for IDG News Service