Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Worm Masquerades as CNN Headline Alerts

    Written by

    Ryan Naraine
    Published January 21, 2005
    Share
    Facebook
    Twitter
    Linkedin

      A new e-mail worm masquerading as news headlines from CNN has the ability to log keystrokes and open backdoors for new threats, anti-virus vendor Sophos Inc. said in an advisory.

      Researchers at Sophos said the worm, identified as W32/Crowt-A, takes its subject lines and message content from headlines gathered in real-time from Time Warners CNN Web site. The worms subject line and attachment share the same name, but continually change to mirror the front-page headline on the CNN site.

      Once executed, Crowt-A installs a backdoor Trojan function that attempts to log keystrokes on infected PCs and sends gathered data to a remote user. Sophos warned that Trojans are often used by malicious hackers to hijack personal information such as bank passwords, Social Security numbers and credit card data.

      /zimages/3/28571.gifThe latest MSN Messenger worm can also hijack data. Click here to read more.

      The worm also attempts to send itself to e-mail addresses found on the infected computer.

      To trick users into executing the file, the message text lifts legitimate news information direct from CNNs site. “Virus writers are always looking for new tricks to entice innocent computer users into running their malicious code; this latest ploy feeds on peoples desire for the latest news,” said Sophos security consultant Carole Theriault.

      Theriault said virus writers are preying on the reality that many e-mail users subscribe to legitimate news updates, but she warned that enterprises should make sure their anti-virus detection is constantly updated. “Users need to be suspicious of all unsolicited e-mail, whether its promising celebrity pictures or news updates.”

      Crowt-A copies itself to the SERVICES.EXE file in the Windows startup, templates and common program files folders, making the Windows startup folder a hidden folder at the same time. It sets entries in the registry at several locations to run the copies of itself on system startup, according to the Sophos alert.

      The backdoor component connects by default on port 80 to a preprogrammed Web site and listens for instructions from a remote user. These instructions include changing the configuration-related registry setting, sending information about the infected computer, sending the users Windows address book, downloading files from remote locations, deleting files, rebooting the infected computer and setting up a command prompt that the remote user can control.

      An infected machine can also be hijacked to act as a proxy server, to delete files from the Windows cookie folder and send virus-laden e-mails. “Some of these actions take place even without prompting from a remote user,” Sophos added.

      Data gathered by the keystroke logger is automatically sent to a Yahoo e-mail address or to the remote user via the backdoor.

      Next Page: New virus spoofs BitDefender address.

      Page 2

      Separately, IT security services firm BitDefender has distanced itself from a new virus that spoofs the “[email protected]” address. In a notice to customers BitDefender said the virus, dubbed Sticy.A, contains an IRC backdoor that prompts users to download malicious executables.

      “We expect this to be the work of a bored Romanian student. … The whole setup is amateurish in the extreme. Nevertheless, we have been receiving about 20 bounced e-mails per minute, so I suspect the virus is spreading at a steady pace,” said BitDefender Chief Technology Officer Bogdan Dumitru.

      For insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzers Weblog.

      “The hosting company of the Web site in question has been contacted and asked to remove the offending site. Users are strongly advised to not follow the link or download the executables in question under any circumstances whatsoever, to update their anti-virus with the latest virus definitions and to initiate a full scan of their computers at their earliest convenience,” the company said.

      Check out eWEEK.coms for the latest security news, reviews and analysis.

      Ryan Naraine
      Ryan Naraine

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.