'Morto' targets weak passwords, usernames and spreads via the Remote Desktop Protocol.
A retro worm attack is underway that takes the unusual spin of employing the Remote Desktop Protocol (RDP) in Windows' remote desktop connection feature as its attack vector.
Researchers from Microsoft, F-Secure, eEye Digital Security, and other organizations say the so-called Morto worm infects Windows workstations and Windows servers. It spreads by uploading a Windows DLL file to a targeted machine. The worm looks for weak administrator passwords in Remote Desktop on an organization's network--everything from "12345" to "admin" and "password."
Researchers say the attack could be used for various purposes, including distributed denial-of-service (DDoS) attacks against targeted organizations. "The remote control feature allows bot-like control of the infected machines and they can be used for basically any purpose," says Mikko Hypponen, chief research officer of F-Secure Lab.
Microsoft's Malware Protection Center (MMPC), which sounded the alarm about the worm over the weekend, on Friday added detection for Worm:Win32/Morto.A. The relative number of infections isn't as high as with other malware families, but the worm generates "noticeable" amounts of traffic, according to Microsoft.
As of Saturday, there were only a few thousand computers infected with Morto, according to Microsoft's data. That's in contrast to nearly 30,000 infected with the Sality family of malware, and more than 10,000 with IRCbot malware, according to Microsoft.
"Based on telemetry through the remainder of Sunday, August 28, we are continuing to see low detections in comparison to established malware families as mentioned in the MMPC blog," says Pete Voss, senior response communication manager for Microsoft Trustworthy Computing. "It's important to remember that this malware does not exploit a vulnerability in Remote Desktop Protocol, but instead relies on weak passwords ... We encourage people to use strong passwords to help protect their systems."
The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)
Published: 2014-07-30 Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 6.x and 7.x through 22.214.171.124, Maximo Asset Management 7.5 through 126.96.36.199 and 7.5.1 through 188.8.131.52 for SmartCloud Control Desk, and Maximo Asset Management 6.2 through 6.2.8 for Tivoli IT Asset Management f...
Published: 2014-07-30 Multiple cross-site scripting (XSS) vulnerabilities in IBM Maximo Asset Management 6.2 through 6.2.8, 6.x and 7.1 through 184.108.40.206, and 7.5 through 220.127.116.11; Maximo Asset Management 7.5 through 18.104.22.168 and 7.5.1 through 22.214.171.124 for SmartCloud Control Desk; and Maximo Asset Management 6.2 through 6.2.8...
Published: 2014-07-30 Unspecified vulnerability in the server in IBM Rational Software Architect Design Manager 4.0.6 allows remote authenticated users to execute arbitrary code via a crafted update site.
Published: 2014-07-30 Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.
Published: 2014-07-30 Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request.