News

'Neeris' Worm Using Old Tricks on Windows PCs

While the IT security community waited anxiously to see what havoc the Conficker worm might bring to infected systems on April 1, another worm slithered into the picture and now has Microsoft's full attention.

This time, it's an old nemesis called the "Neeris" worm. A new variant of Neeris, known as Worm:Win32/Neeris.gen!C, began infecting Microsoft Windows-based systems between March 31 and April 1 while IT security pundits were looking the other way. A lot of attention was diverted to Conficker, although nothing of consequence happened on that fated April 1 date.

Redmond said this week that Neeris has resurfaced and is exploiting the same vulnerability targeted by Conficker. Microsoft issued a patch for this vulnerability in October (MS08-067), but company officials have complained that IT shops still lag in applying it.

Neeris tries to exploit the same Microsoft Windows AutoRun and remote call procedure features utilized by Conficker. The aim of the attack is to extract passwords, change system configurations and allow a hacker to override a workstation.

Neeris replicates itself through a server service vulnerability described in a previous patch from September of 2006 (MS06-040). That method involves sending malicious links over MSN Messenger and interloping on MSN's instant messaging program so that when the links are accessed, the worm can do its dirt.

To stave off this new-old worm, the Microsoft is telling IT shops to take steps to install patches on nonupdated machines, as with Conficker. Disabling AutoRun in Windows is also a temporary workaround fix.

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

comments powered by Disqus

Featured

  • Microsoft Revamps Fledgling AutoGen Framework for Agentic AI

    Only at v0.4, Microsoft's AutoGen framework for agentic AI -- the hottest new trend in AI development -- has already undergone a complete revamp, going to an asynchronous, event-driven architecture.

  • IDE Irony: Coding Errors Cause 'Critical' Vulnerability in Visual Studio

    In a larger-than-normal Patch Tuesday, Microsoft warned of a "critical" vulnerability in Visual Studio that should be fixed immediately if automatic patching isn't enabled, ironically caused by coding errors.

  • Building Blazor Applications

    A trio of Blazor experts will conduct a full-day workshop for devs to learn everything about the tech a a March developer conference in Las Vegas keynoted by Microsoft execs and featuring many Microsoft devs.

  • Gradient Boosting Regression Using C#

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the gradient boosting regression technique, where the goal is to predict a single numeric value. Compared to existing library implementations of gradient boosting regression, a from-scratch implementation allows much easier customization and integration with other .NET systems.

  • Microsoft Execs to Tackle AI and Cloud in Dev Conference Keynotes

    AI unsurprisingly is all over keynotes that Microsoft execs will helm to kick off the Visual Studio Live! developer conference in Las Vegas, March 10-14, which the company described as "a must-attend event."

Subscribe on YouTube