Sober.X Worm Makes Return

Virus Slows E-Mail Systems Across Nation

By Brian Krebs
Special to the Washington Post
Thursday, December 8, 2005; D01

The Sober.X computer worm that began flooding=20
inboxes last month masquerading as a threatening=20
e-mail from federal investigators made a=20
resurgence this week, with security experts now=20
calling it the most prolific e-mail worm ever unleashed.

The junk traffic generated by Sober has bogged=20
down e-mail systems at some of the nation's=20
largest Internet service providers. For several=20
days last week, subscribers of Microsoft Corp.'s=20
Hotmail and MSN e-mail services experienced long=20
delays in receiving new messages as the company=20
struggled to filter out Sober-generated traffic.

San Carlos, Calif.-based e-mail security company=20
Postini Inc. said it has quarantined more than=20
441 million Sober-infected messages since Nov.=20
22, twice as many messages as the largest=20
previous attack on record, which was the Mydoom=20
worm in January 2004. At the time, Postini=20
intercepted roughly 8 million Mydoom-infected e-mails per day.

The Sober worm's spread peaked around=20
Thanksgiving, then tapered off over the weekend,=20
according to Andrew Lochart, Postini's senior=20
director of marketing. Early this week, however,=20
it staged a comeback. The company blocked more=20
than 35 million Sober-generated messages on Tuesday alone.

"That's an exceptional number for a virus in a=20
24-hour period," Lochart said. "Things quieted=20
down a little bit after a tremendous outbreak=20
last week, but now this thing has gone back to pegging the needle."

The worm most often comes attached to an e-mail=20
supposedly sent by the FBI or CIA, claiming that=20
the government has discovered you visiting=20
"illegal" Web sites and asking you to open an=20
attachment to answer some official questions.=20
Microsoft Windows users who click on the attached=20
file infect their computers with the worm, which=20
then e-mails copies of itself to every address found on the victim's=
 machine.

Sober lowers security settings on infected=20
machines, but unlike most e-mail-borne viruses=20
and worms, it does not carry an overtly malicious=20
payload. Rather, research unveiled Wednesday=20
suggests the worm may be laying the groundwork=20
for a new attack early next year.

Researchers at iDefense Inc., a Reston division=20
of Mountain View, Calif.-based VeriSign Inc.,=20
unscrambled portions of the worm's code and found=20
that infected PCs are programmed to download=20
updates from a series of Web sites on Jan. 5.=20
Whether those updates will include a new version=20
of the worm or instructions for carrying out some=20
other type of online activity is not clear to researchers.

Earlier this year, a Sober variant forced=20
infected computers to spew out spam e-mails=20
calling for the re-establishment of the Nazi=20
Party in Germany. Jan. 5 coincides with the 87th=20
anniversary of the founding of the Nazis in Munich.

Allysa Myers, a member of the virus response team=20
with software maker McAfee Inc., said the worm=20
will most likely fizzle out before that date=20
arrives, as authorities have identified the update sites.

"There is some indication that the worm is going=20
to try and upload new code to start a new phase=20
in January, but at that point it is likely those=20
sites will have been shut down," Myers said.


=A9 2005 The Washington Post Company



Reply via email to