Slapper worm slowly spreading

The Slapper worm identified late last week is slowly but surely infecting thousands of vulnerable Linux Apache Web servers across the Internet, according to security firms monitoring its progress.

Slapper has now infected at least 30,000 Linux Apache Web servers that haven't been patched to fix vulnerabilities related to the OpenSSL protocol detailed by The OpenSSL Group on July 30. Once infected by Slapper, the Linux Apache Web servers are forced to join a peer-to-peer network that can be used by anyone on the P2P network to drop any kind of application file directly into the infected servers.

Though Slapper is so far not suspected of carrying any dangerous payload, it opens the path for hackers to join the insidious P2P network to take advantage of compromised machines.

"We see .net, .mil and .com domains that have all been infected," commented Tony Magallanez, systems engineer at Finland-based security firm F-Secure. "Slapper sets up a Trojan on machines it infects and listens on the UDP port. You can drop files or applications right into the system."

Unlike most viruses, the Slapper P2P worm, which spreads by scanning for new victims, delivers its own source code and comes with instructions on how to use it, says Magallenez. F-Secure deployed a Linux Apache server as a sacrificial lamb to become infected so the security firm could observe the worm's spread and potential activity.

The main difficulty the Slapper worm has in spreading is that it has to compile itself, and "each and every binary will be a little different on each machine," said Magallenez. "All binaries on all Linux systems are a little different."

Linux Apache Web servers using the OpenSSL protocol - which should be patched according to the OpenSSL group's instructions - include Red Hat Inc., Caldera International Inc., Stackware, and Debian.

Chances are that the worm is grabbing root privileges when it infiltrates a vulnerable Linux Apache Web server, Magallanez noted, adding that Slapper may have originated somewhere in eastern Europe, and the unknown author has included a disclaimer in good English that says the code is not intended for destructive use.

To remove Slapper from infected machines it will be necessary to look for three files in the directory, .uubugtraq; .uubugtraq.c; and .bugtraq, says Magallanez. The harder job will be doing a close inspection of any infected machine to determine whether important files have been changed or destroyed by anyone exploiting the P2P network created by Slapper.

Join the PC World newsletter!

Error: Please check your email address.

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Ellen Messmer

Computerworld

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?