Zotob updates



A couple of late afternoon updates at the handlers diary at incidents.org (sans institute). For starters, it looks like there may be a variation of zotob that has a mass mailer included. I didn’t specifically see this in SARC’s writeups of zotob.a or zotob.b, so, I’m wondering if this is going to be a .c? This variant connects to the same IRC server as the others, but a different channel. (The IRC connection was to allow remote control.)


One of the strings in their analysis was botzor2. It sounds as though there have been a horde of act-a-likes trying to get in on the act as well.

In a slightly different note, there is a warning about email messages that direct the user to a website to take advantage of the MS05-038 vulnerability. The subject line is “McDonalds bomber jailed for life”. The link within the email is to a site that IS STILL OPERATIONAL and hosted in Chine, the code on the page (javascript) attempts to load into an .hta file. The site redirectes to the malicious page and you are to advised to NOT visit, but block 210.22.50.80 if you’re a network admin.

That’s the lay of the land right now.

   Send article as PDF   

Similar Posts