Microsoft hole spawns real attacks, false alarm

Antivirus company, Symantec, has gone back on its claim that it had captured an example of a new Internet worm that takes advantage of a recently-disclosed hole in Windows machines running Secure Sockets Layer (SSL).

On Tuesday, the company trapped an example of the malicious code called backdoor.mipsiv. and warned customers that it was either a new worm or small automated program called a "bot" that exploits a new Windows Private Communications Transport Protocol (PCT) vulnerability, part of the Windows implementation of SSL.

However, on Wednesday, Symantec said further analysis of the code showed that it was neither a worm nor a bot, and didn't use the PCT vulnerability.

Instead, the code, still called backdoor.mipsiv, is described as a Trojan program. Mipsiv is placed on vulnerable machines by malicious hackers, after which it opened communications ports on systems it compromised and used Internet Relay chat (IRC) channels to send instructions, Symantec said.

"We better understand what it's doing now and after further investigation, it doesn't look like it's self propagating," senior manager of security product management at Symantec, Jonah Paransky, said.

Symantec's confusion stemmed from its misinterpretation of a series of related, but isolated events, he said.

Malicious hackers have been scanning for machines that have the PCT vulnerability, then using exploit code targeted at that security hole to compromise those systems and place the mipsiv Trojan on them.

Once installed, mipsiv communicatedwith the rest of the Internet through the same communications port, 443, that was used by PCT, Paransky said.

However, the Mipsiv code did not contain either worm or bot features and could only have been placed on systems by attackers who compromised the system using the PCT exploit code, or other means, he said.

That means that the effects of the PCT exploit will be felt on targeted networks, whereas a worm or virus that used it could harm systems across the Internet.

Microsoft warned customers about the buffer overrun vulnerability in PCT on April 13 and issued a software patch for affected systems. According to the company's security advisory, MS04-011, the PCT hole could allow a remote attacker to take complete control of affected systems.

Sample computer code to exploit the hole appeared on the Internet within days of the warning, prompting Microsoft to issue a warning to customers about the malicious activity.

In recent days, other security experts that monitor malicious activity on the Internet had been warning of increased attacks that use the SSL vulnerability and postulated that a worm may be responsible, but nobody has captured a copy of the malicious code.

The SANS Institute's Internet Storm Center said that it received reports of exploits using the SSL PCT hole and systematic scanning of networks for vulnerable systems, which indicated some kind of "automated tool."

Antivirus and security technology companies compete intensely to be the first to spot and even name new Internet threats like worms and viruses.

Symantec did not jump the gun in an attempt to be the first company to spot the new threat, Paransky said.

"This is a classic tension in the community between letting customers know early and letting them know more information," he said.

The danger posed by the PCT vulnerability and its widespread impact prompted the quick response from the company, which also raised its ThreatCon Rating of global network activity to level three or "High" alert, indicating that an "isolated threat to the computing infrastructure is currently underway or ... malicious code reaches a severe risk rating," according to the company's Web page.

Symantec would leave the ThreatCon Rating in place for at least 24 hours, Paransky said. He could not comment on whether it would be lowered after that.

Despite the false alarm with mipsiv, the increase in scanning for machines vulnerable to the PCT exploit meant that a true worm or other automated attack was likely in the future, he said.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Paul Roberts

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill


I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?