Worm 'Nyxem.e' spreading fast, raises concern

dipdude

Skilled
'Nyxem.e' is a mass-mailing worm that carries a "nuclear option" payload that corrupts data in popular file formats, it also spreads using remote shares.

It accounts for 1 out of every 15 pieces of malicious code. It is similar to the 'Email-Worm.Win32.VB.bi' that was found a few days ago.

F-Secure disclosed that Nyxem.e worm, carries code that instructs it to replace data in files with .doc, .xls, .mdb, .mde, .ppt, .pps, .zip, .rar, .pdf, .psd, or .dmp extensions with the useless string "DATA Error [47 0F 94 93 F4 K5]" on the third of the month.

The viciousness of the worm can also be gauged by the fact that it tries delete selected security software. It also spreads through shared folders and by addresses hijacked from infected PCs.

The way the mails arrive have lead various security sites to dub it as 'kama sutra worm'. It arrives as an attachment to e-mail messages with a variety of subject headlines, many of which tout porn with phrases like "Arab sex," "give me a kiss," "Hot Movie," and "F***** Kama Sutra pics."

Details about the worm :

Nyxem.E is written in Visual Basic and is compiled as p-code. The size of the main executable is about 95 kilobytes. When executed the worm, it first copies itself to several locations.
  • %Windows%\rundll16.exe
  • %System%\scanregw.exe
  • %System%\Update.exe
  • %System%\Winzip.exe
Startup entries :
[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]"ScanRegistry" = "%System%\scanregw.exe /scan

Details about the extensions infected & mail headers :

Payload :
The worm has a dangerous payload. On every 3rd day of a month after the worm's UPDATE.EXE file is run, it destroys files with those extensions on all available drives, The file contents get replaced with a text string "DATA Error [47 0F 94 93 F4 K5]".
  • *.doc
  • *.xls
  • *.mdb
  • *.mde
  • *.ppt
  • *.pps
  • *.zip
  • *.rar
  • *.pdf
  • *.psd
  • *.dmp
The worm collects e-mail addresses from files with following extensions :
  • .HTM
  • .DBX
  • .EML
  • .MSG
  • .OFT
  • .NWS
  • .VCF
  • .MBX
  • .IMH
  • .TXT
  • .MSF
Mail headers :
  • The Best Videoclip Ever
  • School girl fan***** gone bad
  • A Great VideoF****
  • Kama Sutra pics
  • Arab ***
  • DSC-00465.jpg
  • give me a ki***Hot Movie*
  • Fw: Funny :)
  • Fwd: Photo
  • Fwd: image.jpg
  • Fw: Sexy
  • Re:
  • Fw:
  • Fw: Picturs
  • Fw: DSC-00465.jpg
  • Word file
  • eBook.pdf
  • the file
  • Part 1 of 6 Video clipe
  • You Must View This Videoclip!
  • Miss Lebanon 2006
  • Re: S** Video
  • My photos
Infection counter :

The worm has an interesting feature. When it infects a computer it opens a web browser on a certain webpage. This increments the counter on that webpage. At the moment the counter is close to 400000.

TechEncalve Advise :
  1. To avoid being infected, it is best not to download or open mails with the above headers & attachments.
  2. Update signatures of your Antivirus & Antispyware programs.
  3. Always scan your mail attachment's before opening them.

___________________________

Update :

The worm 'Nyxem.e' is scheduled to create havoc on 3rd February.

The worm was accounting for about 35 percent of virus traffic as of Monday morning. It seems, the worm is still spreading, albeit a bit more slowly.

The fact is, it is still gaining ground and with the payload it is carrying it can cause wide spread damage by overwriting your crucial microsoft and adobe documents.

"On Friday the counter was at 270,000," said Hypponen, "but early Monday, it was at 680,000. That's 400,000 PCs that have been infected in one weekend."

Also Known As :

W32.Blackmal.E@mm[Symantec], WORM_GREW.{A, B} [Trend Micro], W32/Nyxem-D [Sophos], W32/MyWife.d@MM [McAfee], Email-Worm.Win32.VB.bi, Email-Worm.Win32.Nyxem.e [F-Secure], W32/Small.KI@mm [Norman], Win32/Blackmal.F [Computer Associates], Tearec.A [Panda Software]

Systems Affected :

Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP

Norton has released a removal tool :

To download the removal tool click here.
__________________________

Just In :

'Nyxem.e' fools windows by spoofing digital certificates.

The security threat posed by worm 'Nyxem.e' has just gone up the roof because of a new finding made by the security company Fortinet.

It seems the worm fools windows into accepting malicious activex control's by spoofing digital certificates.

It achieves this by adding 18 entries to the Windows Registry which helps the ActiveX control slip through the operating system's defences. In another words by adding those registry entries it makes the control look like 'safe' and 'digitally signed' in eyes of the operating system.

"If a worm puts a fake certificate on an infected machine, MITM [Man-In-The-Middle] attacks become extremely easy.

______________________________

Update :

Kama Sutra worm hits India, Peru hardest

India has the infamous honour of topping the list, with nearly 80,000 infected PCs. Peru, which came in second, sports almost 55,000 compromised computers.

In comparison, the United States has about 15,000 machines contaminated with the worm.

"Viruses don't always spread uniformly," LURHQ said in its report. "There are many factors at play which are hard to quantitise, such as the initial seeding, social engineering, AV deployment, and random chance. And, as with all statistics, take [these] with a grain of salt."

LURHQ tagged the total number of Blackworm-infected computers at around 300,000 — a number bandied about last week — even though a web-based infection counter claims a number in the millions. LURHQ, however, was able to strip out bogus "clicks" on that counter to arrive at is estimate.

"An attempt was made by an unknown party to artificially inflate the counter using a set of 279 distributed (presumably compromised) computers," said LURHQ.

TE Suggestion :

  • The worm is set to erase files on Feb 3rd, update your virus signatures and scan your systems thoroughly so as not to regret it later.
  • You can also run the standalone removal tool by Norton :
    To download the removal tool click here.

____________________________

Just In :

Microsoft not to issue Kama Sutra Fix before Feb 3rd

Microsoft Monday posted a security advisory on the KamaSutra/Blackworm/MyWife/Nyxem.e worm that's set to overwrite Office documents on infected PCs Friday.

Microsoft has decided against updating its Windows Malicious Software Removal Tool before the next regularly-scheduled release of Feb. 14.

Microsoft offered no explanation why the tool wouldn't be updated earlier.

Both the company's free online security service, Windows Live Safety, and its in-beta OneCare Live software, however, will disinfect compromised computers, Microsoft said.

_________________________

Final Countdown :

Worm already hits systems with wrongly set clock's

Kama Sutra worm has begun thrashing files on infected machines with incorrectly set system clocks. Even though the worm is programmed to first delete files on infected machines on Friday (February 3), its deadline is based on the clock of infected Windows PCs.

F-Secure says it has already received two reports from users who've had files on their system overwritten by the worm.

This old-school "trash your Windows PC" worm has infected an estimated 600,000 machines, with the US, India and Peru having the greatest number of infected machines

One US firm alone is responsible for around 75,000 infection hits, according to an analysis by security firm LURHQ.

Removal Tools :

________________________________________

Update :

Worm has minimal impact :

Many users of infected machines have cleaned up their act, according to Messagelabs.

The worm is likely to have affected home users' machines anyway, given that small, medium and large organisations appear to have learned their lesson from previous exploits.

It estimates the worm is currently live on 20,000 IP addresses, suggesting 20,000 individual home users or organisations worldwide are currently infected by Kama Sutra, a big fall from earlier this week. MessageLabs has seen worm 'clean-up' from approximately 11,000 IP addresses a day.

However, this virus writer did do one good thing, intentionally or not, he or she provided a two week window before activation of the payload to destroy data. This has allowed many smart computer users and businesses an opportunity to disinfect their machines and hopefully take protective measures".

Nevertheless, and according to reports, the Kama Sutra worm forced the municipality of Milano to turn off 10,000 machines.

We are hopeful that this does not indicate a return to destructive, nuisance viruses.

Naming :

The Nyxem virus family that spawned Kama Sutra (AKA Nyxem-E) made its debut in March 2004. The first worm in the series launched a DDoS attack against the "New York Mercantile Exchange" website (www.nymex.com). The motive and perpetrator of the virus series remains unknown.

________________________________

Update :

Not Overhyped after all, stats out :

Although the Nyxem.e worm was found to have caused very little actual damage, researchers estimate that the worm in total infected between 469,507 and 946,835 systems between 15 January and 1 February.

The worm is considered a rare specimen because an infected system contacted a website for a single time, providing both the worm author and security researchers with information about its proliferation.

Two researchers from the Coopoerative Association for Internet Data Analysis (CAIDA) studied the visitor logs and corrected for outside visitors landed at the figure of at least 469,507 infections. The team was made up of CAIDA's technical director David Moore and Colleen Shannon, a senior security researcher.

Based on the lowest infection count, Nyxem.e claimed most of its victims in India (32.2 per cent), followed by Peru (18.7 per cent), Italy (8.1 per cent), Turkey (6.0 per cent) and the US (5.6 per cent), the data showed.

"Our estimates of the total number of victims of Nyxem.e are an order of magnitude less than estimates of the spread of other email viruses," the duo concluded.

They credited the broad attention for the worm in curbing the online pest and cleaning up many systems before it could do its destructive work. There were only few reports of users losing data, although they asserted that the full extent of the damage will likely never be known.

The limited number of damage reports had caused speculations that the security sector or media had overhyped Nyxem.e's threat. But the number of infections appears to justify the attention for the worm.

The researchers however warned that users shouldn't claim victory just yet. There has been a significant cost to users and organisations in scanning and cleaning up systems. The worm also continues to pose a risk, as it is set to activate again on 3 March.
 
Article Updated :

India has the infamous honour of topping the list, with nearly 80,000 infected PCs. Peru, which came in second, sports almost 55,000 compromised computers.

Worm set to hit on Feb 3rd.
 
Just In :

Microsoft has decided against updating its Windows Malicious Software Removal Tool before the next regularly-scheduled release of Feb. 14.
 
Crap!!!!!

I already got a mail with the heading "Part 1 of 6 Video clipe" and deleted it straightaway..thank god..i guess the yahoo viruscheck will detect this virus anyways..thanks for the headsup anyways dipdude!!

DC.
 
****KKKKKKKKKKKKKK my system clock was wrongly times lets see what happens now any idea what kind of packets r suspectible to this worms activities and what are the ports by which they enter or its just random?
 
damm.. my friends cyber is already hit by this worm.. altho nothing was deleted cuz it was yet to be activated.. he had problems with norton antivirus.. he did download the removal tooll didnt help.. and i dont even have norton.. mine scrwed up too.. im guessing i've the same virus.. hope its not true tho..
 
did a scan using the removal tool in safe mode right on at 12.AM .. no virus found managed to install and update norton 5 mins before i hit 12 on my system.. so far so good.

the virus on my friends cyber cafe was detected by norton and deleted but somehow still made it on all the comps of the cyber.. god knows wats the state once it starts deleting.. i dunno if it already has

anyways im safe so far.. gonna do a system scan tonight.. hopefully no virus when i check back in the morning..

was tensed up cuz have a lot of very important stuff of on my comp.. i hope this shi.t doesnt happen..
 
Well, today is perhaps the biggest day of destruction caused by a freakin' ****ing program written in Visual Basic in the computer world.
 
hi,

thanks buddy for keeping us all well informed about the worm and bet ya....its only on TE with such coverage....thanks again..
 
Back
Top