The Sobig.f worm that continues to bedevil computer networks around the globe is poised to unleash a new phase of its havoc between 3:00 PM and 6:00 PM Eastern Standard Time on Friday, security experts warned, even though they may have already blunted its intended effect.
Security firm F-Secure Corporation warned on Friday that the Windows
e-mail worm Sobig.f, already dubbed the most widespread worm in the world
since it began clogging and infecting global computer networks on Tuesday, is planning a new phase of
attack to hit on Fridays and Sundays until it is programmed to expire on Sept. 10th.
The worm infected close to one million computers via e-mail attachments
in e-mails with spoofed addresses (including a spoofed address owned by the
parent company of this publication), experts said. Now, those infected
computers are programmed to start to connect to machines found on an
encrypted list hidden in the virus body. F-Secure said the list contains the
address of 20 computers located in United States, Canada and South Korea and
is expected to start at 3:00 EST Friday.
Once the worm infected a machine, it was then programmed to go to one of those 20 Web sites to pull down code to drop it into the infected machine, said Chris Belthoff, a senior security analyst with Sophos, Inc., an anti-virus company based in Lynfield, Mass. But he said those 20 machines are believed to be offline.
“These 20 machines seem to be typical home PCs, connected to the Internet
with always-on DSL connections,” said Mikko Hypponen, director of anti-virus
research at F-Secure.
“Most likely the party behind Sobig.f has broken into these computers and
they are now being misused to be part of this attack.”
F-Secure and other experts said the worm connects to one of these 20
servers and authenticates itself with a secret 8-byte code. The servers
respond with a Web address, they said. Infected machines download a program
from this address — and run it. At this moment experts say they are not
sure what the program will do.
F-Secure said it has been able to break into this system and crack the
encryption, but currently the Web address sent by the servers doesn’t go
anywhere.
“The developers of the virus know that we could download the program
beforehand, analyze it and come up with countermeasures,” said Hypponen. “So
apparently their plan is to change the Web address to point to the correct
address or addresses just seconds before the deadline. By the time we get a
copy of the file, the infected computers have already downloaded and run
it.”
The Sobig worms come with a three-stage attack, added Ken Dunham,
malicious code intelligence manager with Reston, Va.-based iDefense, Inc.
The e-mail worm is the first stage, installing a backdoor Trojan is the
second stage and then installing a proxy server is the last stage.
“The backdoor is designed to let the attacker steal information,” said
Dunham. “He could steal password data or the worm could activate a key
logger whenever you’re doing online banking.”
Dunham said if the 20 IPs used in the attack are available and manipulated by the attacker, the attacker can install malicious code of choice on SoBig infected computers connecting to the downloader IP. The code may be anything but has traditionally been a backdoor Trojan (Lala/Hooker) and then a copy of Wingate (proxy server).
“Blocking outbound UDP 8998 activity will successfully block SoBig communications with remote servers hard coded into the code of the worm used for updating itself/installing new code. Additionally, blocking against the NTP server ports may prevent the worm from meeting certain date and time conditions for the secondary and tertiary attacks. Block port 123 and UDP ports 995-999,” Dunham explained.
He also suggested that IT administrators block against the Wingate proxy server if found on a computer so that spam cannot be sent through a formerly infected or currently infected computer.
Since it was discovered this week, the Sobig.f variant of the Sobig worm has been called the fastest-spreading worm ever discovered on the Internet, according to numerous online security firms.
F-Secure also said it has been working with officials, authorities and
various CERT organizations to disconnect the specific machines from the
Internet. “Unfortunately, the writers of this virus have been waiting for
this move too,” said F-Secure’s Hypponen. These 20 machines are chosen from
the networks of different operators, making it quite likely that there won’t be enough time to take them all down by 3:00 EST (19:00 UTC). Even if just one stays up, it will be
enough for the worm, F-Secure said.
F-Secure said the techniques used by the worm make it quite obvious it’s not written by a typical teenage virus writer. “Who’s behind all this? “Looks like organized crime to me,” said Hypponen.
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.