'Morto' targets weak passwords, usernames and spreads via the Remote Desktop Protocol.
A retro worm attack is underway that takes the unusual spin of employing the Remote Desktop Protocol (RDP) in Windows' remote desktop connection feature as its attack vector.
Researchers from Microsoft, F-Secure, eEye Digital Security, and other organizations say the so-called Morto worm infects Windows workstations and Windows servers. It spreads by uploading a Windows DLL file to a targeted machine. The worm looks for weak administrator passwords in Remote Desktop on an organization's network--everything from "12345" to "admin" and "password."
Researchers say the attack could be used for various purposes, including distributed denial-of-service (DDoS) attacks against targeted organizations. "The remote control feature allows bot-like control of the infected machines and they can be used for basically any purpose," says Mikko Hypponen, chief research officer of F-Secure Lab.
Microsoft's Malware Protection Center (MMPC), which sounded the alarm about the worm over the weekend, on Friday added detection for Worm:Win32/Morto.A. The relative number of infections isn't as high as with other malware families, but the worm generates "noticeable" amounts of traffic, according to Microsoft.
As of Saturday, there were only a few thousand computers infected with Morto, according to Microsoft's data. That's in contrast to nearly 30,000 infected with the Sality family of malware, and more than 10,000 with IRCbot malware, according to Microsoft.
"Based on telemetry through the remainder of Sunday, August 28, we are continuing to see low detections in comparison to established malware families as mentioned in the MMPC blog," says Pete Voss, senior response communication manager for Microsoft Trustworthy Computing. "It's important to remember that this malware does not exploit a vulnerability in Remote Desktop Protocol, but instead relies on weak passwords ... We encourage people to use strong passwords to help protect their systems."
The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)
New Best Practices for Secure App DevelopmentThe transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Published: 2015-10-15 The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...
Published: 2015-10-15 Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.
Published: 2015-10-15 Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.