A category of Windows malware I have been quietly watching all year — graphical, easy-to-use, remote-control trojans like Sub7 and Back Orifice 2000 — has matured into a genuine threat. Time to write about what they do and what defenders should know.
Five days on from ILOVEYOU. The cleanup is mostly done. The structural fixes that would prevent the next variant are not coming. A walk through what the platform actually needs and why the platform is unlikely to deliver it.
Yesterday a VBScript-based mass-mailing worm called ILOVEYOU appeared, originating from the Philippines. Within hours it had hit corporate mail systems across Asia, Europe, and the Americas. A first note from inside the busy week.
Another mass-mailing worm has emerged. ExploreZip is similar to Melissa in propagation but materially worse in payload. The trajectory I outlined in March is on schedule, and on the wrong side.
On Friday, a Word macro virus called Melissa propagated itself by mail to anyone in the recipient's Outlook address book. By Monday, multiple Fortune 500 mail servers were down. A note on the immediate aftermath and what Melissa changes about the threat model.
A small fireworks animation arrives in your inbox. It runs. It hooks WSOCK32. From now on, every email you send carries a copy of itself. We have crossed a threshold and most people have not noticed.