Antivirus company, Symantec, has gone back on its claim that it had captured an example of a new Internet worm that takes advantage of a recently-disclosed hole in Windows machines running Secure Sockets Layer (SSL).
On Tuesday, the company trapped an example of the malicious code called backdoor.mipsiv. and warned customers that it was either a new worm or small automated program called a "bot" that exploits a new Windows Private Communications Transport Protocol (PCT) vulnerability, part of the Windows implementation of SSL.
However, on Wednesday, Symantec said further analysis of the code showed that it was neither a worm nor a bot, and didn't use the PCT vulnerability.
Instead, the code, still called backdoor.mipsiv, is described as a Trojan program. Mipsiv is placed on vulnerable machines by malicious hackers, after which it opened communications ports on systems it compromised and used Internet Relay chat (IRC) channels to send instructions, Symantec said.
"We better understand what it's doing now and after further investigation, it doesn't look like it's self propagating," senior manager of security product management at Symantec, Jonah Paransky, said.
Symantec's confusion stemmed from its misinterpretation of a series of related, but isolated events, he said.
Malicious hackers have been scanning for machines that have the PCT vulnerability, then using exploit code targeted at that security hole to compromise those systems and place the mipsiv Trojan on them.
Once installed, mipsiv communicatedwith the rest of the Internet through the same communications port, 443, that was used by PCT, Paransky said.
However, the Mipsiv code did not contain either worm or bot features and could only have been placed on systems by attackers who compromised the system using the PCT exploit code, or other means, he said.
That means that the effects of the PCT exploit will be felt on targeted networks, whereas a worm or virus that used it could harm systems across the Internet.
Microsoft warned customers about the buffer overrun vulnerability in PCT on April 13 and issued a software patch for affected systems. According to the company's security advisory, MS04-011, the PCT hole could allow a remote attacker to take complete control of affected systems.
Sample computer code to exploit the hole appeared on the Internet within days of the warning, prompting Microsoft to issue a warning to customers about the malicious activity.
In recent days, other security experts that monitor malicious activity on the Internet had been warning of increased attacks that use the SSL vulnerability and postulated that a worm may be responsible, but nobody has captured a copy of the malicious code.
The SANS Institute's Internet Storm Center said that it received reports of exploits using the SSL PCT hole and systematic scanning of networks for vulnerable systems, which indicated some kind of "automated tool."
Antivirus and security technology companies compete intensely to be the first to spot and even name new Internet threats like worms and viruses.
Symantec did not jump the gun in an attempt to be the first company to spot the new threat, Paransky said.
"This is a classic tension in the community between letting customers know early and letting them know more information," he said.
The danger posed by the PCT vulnerability and its widespread impact prompted the quick response from the company, which also raised its ThreatCon Rating of global network activity to level three or "High" alert, indicating that an "isolated threat to the computing infrastructure is currently underway or ... malicious code reaches a severe risk rating," according to the company's Web page.
Symantec would leave the ThreatCon Rating in place for at least 24 hours, Paransky said. He could not comment on whether it would be lowered after that.
Despite the false alarm with mipsiv, the increase in scanning for machines vulnerable to the PCT exploit meant that a true worm or other automated attack was likely in the future, he said.