New Dasher worm targets Windows 2000

A new worm has emerged, which targets Windows 2000 systems. It is based on an exploit for a recently patched bug in Microsoft Distributed Transaction Coordinator.

A new worm has emerged, which targets Windows 2000 systems. It is based on an exploit for a recently patched bug in Microsoft Distributed Transaction Coordinator.

 

The co-ordinator is essentially a component of the operating system that is used by database software to help manage transactions. The worm, dubbed Dasher, already has three variants, and Microsoft has rated the bug as ‘critical’ for Windows 2000 systems.

 

Proof-of-concept code that could be used to make a worm like Dasher first began circulating after Microsoft issued a patch in early October. Security specialists speculated that it could be used to create a worm similar to Zotob, which brought down hundreds of thousands of systems worldwide in August.

 

The variants of Dasher install software that then tries to infect other vulnerable systems and can also be used to log keystrokes and turn the computer into a remotely controlled bot system.

 

The three versions of Dasher have so far infected around 3,000 systems worldwide. There are also fears that a patch issued in October may be ineffective.

 

You can bet that with the demands of the Christmas season upon us, it is only a matter of time before the wiles of social engineering create a message with that ‘must-click’ seasonal attachment that spells ‘headache’ for IT staff.

Read more on Antivirus, firewall and IDS products

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close