Witty worm exploits hole in BlackIce security product

A new worm that exploited a hole in some of Internet Security Systems Inc.'s (ISS') intrusion protection products seems to be dying down after affecting thousands of IP (Internet Protocol) addresses since Saturday.

The so-called Witty worm, affecting some versions of ISS' BlackIce and RealSecure intrusion protection products, is "highly malicious" because it slowly destroys the system it infects, according to an alert from Lurhq Corp., a managed security provider. "Rather than simply executing a 'format C:' or similar destructive command, the worm slowly corrupts the filesystem while it continues to spread," Lurhq's alert said.

The spread of the worm appeared to be slowing down Monday, said Joe Stewart, senior security researcher at Lurhq. "It was only a big deal for the people who had the ISS products' specific versions," Stewart added. "It was not a threat for Windows users in general."

ISS estimated the worm infected about 12,000 IP addresses, although the exact number is difficult to determine, said Dan Ingevaldson, director of X-Force research and development at ISS. Early reports had the worm infecting up to 50,000 IP addresses, but Ingevaldson said ISS' scans didn't find evidence of the worm being that widespread.

"We saw a spike in the first days of the infection, and it's been going down since then," Ingevaldson said.

The worm, which exploited an ICQ parsing vulnerability, affected non-updated versions of ISS' BlackIce and RealSecure products. A complete list of affected versions is available at ISS' alert site: http://xforce.iss.net/xforce/alerts/id/167. An ISS update that fixes the vulnerability has been available since March 9.

In addition to the maliciousness of the worm, its timing is also significant, Stewart said. A vulnerability alert for the ISS products was released on March 18, and the worm began spreading March 20. The writer of the worm either new of the vulnerability before the announcement or wrote and tested the worm in less than two days, Stewart said.

"Usually, you have a week or two after the vulnerability was announced," Stewart said. "This was a substantial piece of work to be done in one day."

ISS counts about 1.6 million corporate installations of the BlackIce PC intrusion detection software, and that number doesn't include home installations. The worm illustrates the importance of running updated intrusion detection and firewall software, Ingevaldson added.

"Our customers know you have to apply the most recent updates," he sad. "They know that for it to work, they need to have the most recent updates, and they would not be affected at all if they did."

What’s wrong? The new clean desk test
Join the discussion
Be the first to comment on this article. Our Commenting Policies