Chinese Internet Security Response Team Reports ANI Worm
The Chinese Internet Security Response Team reports the detection of an worm-like payload installed using the ANI-exploit. According to their report:
"It has the same behavior as Worm.Win32.Fujacks. It also can infects .HTML .ASPX .HTM .PHP .JSP .ASP and .EXE files, and inserts the malicious links which contained Windows Animated Cursor Handling zero-day vulnerability into .HTML .ASPX .HTM .PHP .JSP .ASP files. It also can send out Chinese spams which are include the same zero-day vulnerability link."
They recommend that the following domains be blocked to contain this particular variant:
2007ip.com
microfsot.com
"It has the same behavior as Worm.Win32.Fujacks. It also can infects .HTML .ASPX .HTM .PHP .JSP .ASP and .EXE files, and inserts the malicious links which contained Windows Animated Cursor Handling zero-day vulnerability into .HTML .ASPX .HTM .PHP .JSP .ASP files. It also can send out Chinese spams which are include the same zero-day vulnerability link."
They recommend that the following domains be blocked to contain this particular variant:
2007ip.com
microfsot.com
Keywords:
0 comment(s)
×
Diary Archives
Comments