N
Nathan Eady
I run a small heterogenous network at a small public library. Today, one of
the WinXP systems, which has Norton AV, popped up a warning that it had found
a virus. The info link pointed here:
http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html
I let it quarantine the file (explorer.exe in a folder where there would not
normally be a file by that name) and began investigating. I doublechecked
for KaZaA (which the Symantec page mentions as the most probably entry point)
but as I knew already it's not installed. (I get rid of such things when I
find them. Had a very bad experiece with KaZaA and network performance once.
I don't allow Gator either, or Bonzi, or AIM...) That leaves (according to
Symantec) trojan backdoors, especially the IRC variety, so I pulled up regedit
and had a look, but I'm pretty sure everything in the various Run keys is
legitimate.
So I pulled up the Quarantined Items report and had a look-see at the location
where it found the thing. (The whole path was not visible in the original
dialog.) Hmmm... the place where it found it is the Shared Documents folder.
I'm speculating at this point that the PC that found the thing is not the
one that was infected per se, that the infected PC merely dropped the thing
in that folder over the network. With, incidentally, the hidden attribute.
So I started checking other PCs. There's another WinXP PC, and it had the
same situation exactly -- the file was there, but no other evidence of
infection. I quarantined the file there too.
So, I have several questions...
* Is this behavior known? Can someone confirm that it does this?
Does Symantec know that the worm does this, and if we can confirm
it, shouldn't it be mentioned on the writeup?
* Is the infected computer necessarily on my LAN, or could it be
elsewhere on the internet? (Assume we have no firewall[1].) My
tendency is to believe that it is coming from outside the LAN,
since the WinXP computers are the only ones infected. (The Linux
and Win9x and Mac OS X systems all use password protection on the
fileshares, but I haven't figured out how to do that with WinXP.
(I was highly annoyed when I installed my first WinXP system and
discovered that the filesharing dialog didn't have an entry box
for password, but that's another discussion for another day.) If
the infected computer were inside the LAN, it would be likely
to have passwords in the keyring thingy and thus be able to gain
access to the fileshares on the Win98 systems at least, but I
am not finding the infected files there. Does that make sense,
or am I jumping to confusions? Am I wrong in assuming that a worm
running on the system would be able to use the keyring passwords?
(Either way, of course, I will be checking all our Windows systems
as soon as I get a moment.))
* Assuming we don't execute hidden executables from the shared
documents folder, there's no risk to the PC hosting the fileshare,
correct?
[1] I know, I know, we should have a firewall... it's on my agenda.
I want to put all the non-server systems behind IP Masquerade if
possible, but I haven't got there yet. We have a limited budget
and I don't get to set the priorities. Ad interim, we don't use
known-dangerous applications (IIS, sendmail, Outlook, IE, ...)
and I try to pay some attention to security patches.
the WinXP systems, which has Norton AV, popped up a warning that it had found
a virus. The info link pointed here:
http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html
I let it quarantine the file (explorer.exe in a folder where there would not
normally be a file by that name) and began investigating. I doublechecked
for KaZaA (which the Symantec page mentions as the most probably entry point)
but as I knew already it's not installed. (I get rid of such things when I
find them. Had a very bad experiece with KaZaA and network performance once.
I don't allow Gator either, or Bonzi, or AIM...) That leaves (according to
Symantec) trojan backdoors, especially the IRC variety, so I pulled up regedit
and had a look, but I'm pretty sure everything in the various Run keys is
legitimate.
So I pulled up the Quarantined Items report and had a look-see at the location
where it found the thing. (The whole path was not visible in the original
dialog.) Hmmm... the place where it found it is the Shared Documents folder.
I'm speculating at this point that the PC that found the thing is not the
one that was infected per se, that the infected PC merely dropped the thing
in that folder over the network. With, incidentally, the hidden attribute.
So I started checking other PCs. There's another WinXP PC, and it had the
same situation exactly -- the file was there, but no other evidence of
infection. I quarantined the file there too.
So, I have several questions...
* Is this behavior known? Can someone confirm that it does this?
Does Symantec know that the worm does this, and if we can confirm
it, shouldn't it be mentioned on the writeup?
* Is the infected computer necessarily on my LAN, or could it be
elsewhere on the internet? (Assume we have no firewall[1].) My
tendency is to believe that it is coming from outside the LAN,
since the WinXP computers are the only ones infected. (The Linux
and Win9x and Mac OS X systems all use password protection on the
fileshares, but I haven't figured out how to do that with WinXP.
(I was highly annoyed when I installed my first WinXP system and
discovered that the filesharing dialog didn't have an entry box
for password, but that's another discussion for another day.) If
the infected computer were inside the LAN, it would be likely
to have passwords in the keyring thingy and thus be able to gain
access to the fileshares on the Win98 systems at least, but I
am not finding the infected files there. Does that make sense,
or am I jumping to confusions? Am I wrong in assuming that a worm
running on the system would be able to use the keyring passwords?
(Either way, of course, I will be checking all our Windows systems
as soon as I get a moment.))
* Assuming we don't execute hidden executables from the shared
documents folder, there's no risk to the PC hosting the fileshare,
correct?
[1] I know, I know, we should have a firewall... it's on my agenda.
I want to put all the non-server systems behind IP Masquerade if
possible, but I haven't got there yet. We have a limited budget
and I don't get to set the priorities. Ad interim, we don't use
known-dangerous applications (IIS, sendmail, Outlook, IE, ...)
and I try to pay some attention to security patches.