Sober worm starts running amok

A new version of the Sober worm wriggled out of its hole early on Monday and set about quickly attacking computers in Europe and the U.S., a security services company said. The worm is a mass-mailer, meaning it spreads itself via e-mail using contacts listed in the address books of computers it infects.

The first instance of the worm, called W32.Sober-K-mm, was intercepted by U.K. security company MessageLabs Ltd. at 05:01 a.m. GMT. The company detected 663 instances of the worm in the first hour, and the figure climbed quickly to more than 2,200 instances between 11 a.m. and noon GMT, prompting MessageLabs to give it a high-risk rating, said Maksym Schipka, a senior antivirus researcher with the company. “Compared to other Sober worms it looks to me like this one is spreading itself more aggressively,” he said.

The latest variant appears to have originated in Germany, and by midmorning it had also been detected in France, the U.K. and the U.S. It may have been created by the same hacker that wrote the first version of the Sober worm, which appeared in October 2003 and also originated in Germany, Schipka said.

“I’m not aware that the source code for this worm was made public. It is written in Visual Basic which makes it more difficult to reverse engineer the virus than if it were written in C++ or Assembler. So it would be logical to assume it is the same virus writer,” he said. W32.Sober-K-mm spreads itself as an email attachment and creates random subject lines and body texts in either English or German, depending on the e-mail addresses it gathers. Subject lines observed so far include “Alert! New Sober worm,” “Paris Hilton Sex Videos,” “You visit illegal websites” and “Your new Password,” according to MessageLabs, in Gloucester, England.

The worm can also generate fake messages that try to fool the recipient into opening the attached .zip file. Some emails purport to be from an antivirus company offering a security patch against a new version of the Sober worm — when in fact they contain they worm. Others pretend to be from the U.S. Federal Bureau of Investigation and include an attachment labelled “indictment,” Schipa said.

When a user opens the attachment the worm creates several executable files with the names csrss.exe, winlogon.exe and smss.exe. It then modifies the registry key Software\Microsoft\Windows\CurrentVersion\Run so that the files execute on startup.

The worm also displays the contents of part of the infected machine’s file system in a notepad document. Schipka said it is not clear yet why this document appears and that it may be a bug in the worm. “Sober is known as being relatively buggy,” he said.

The notepad file may be a sign that the virus writer is experimenting with new techniques, one observer speculated.

Such worms can make the computers they infect sluggish to operate and also clog e-mail servers and networks. Users are advised to update their antivirus software to keep the definition files current.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now