This will do not good.
Anyways, Morto, the "death" worm, can obtain these weak administrator passwords automatically, even on systems with all of the latest patches. Now once a system has been accessed the virus then deactivates the local security measures like anti-virus programs and firewalls in order to protect itself, then it checks for local network connections systems with the RDP enabled. It then starts creating new files..
\windows\system32\sens32.dll
\windows\Offline Web Pages\cache.txt
\windows\Offline Web Pages\1.40_Test Ddos
\windows\Offline Web Pages\<DATE>
..and many more. The systems can then be commanded remotely to launch strikes to targeted sites via Distributed Denial of Service invasions, flooding a network's service traffic with endless packets requesting information. This causes a slowdown as no genuine user inquiries to a service are able to process amongst all of the inordinate junk queries. It's kind of hard to defend against DDoS attacks because once an IP address is targeted it's kind of hard to defend against an attack. It'd be like trying to keep your mailbox from being repeatedly destroyed by teenagers with baseball bats by moving your mailing address. They won't know where to hit it again until they figure out where you moved it to, or figure out your P.O. Box number. That analogy is useless in trying to find a way to stop this kind of action because snail mail relies much less on seemingly instantaneous transmissions as the internet. Hopefully some day some creative individual, like whoever thought up this simplistic idea of spamming a website to shut it down, will think up a way to circumvent these sort of battles. Something like proxies that only reveal the correct direction to go when a captcha has been correctly entered, but then the attackers would most likely just go after the proxies.
Sources:
http://www.networkworld.com/community/blog/windows-servers-workstations-vulnerable-wicke
http://home.mcafee.com/virusinfo/virusprofile.aspx?key=573843
No comments:
Post a Comment