Weak passwords the target of

A new Widows worm is working its way through company networks by taking advantage of weak passwords, security researchers said over the weekend.

The worm, dubbed “Morto” by Microsoft and Helsinki-based F-Secure, has been circulating since at least last week, when company administrators noticed systems generating large numbers of unexplained connections to the Internet.

According to Microsoft, Morto is the culprit.

“Although the overall numbers of computers reporting detections are low in comparison to more established malware families, the traffic it generates is noticeable,” said Hil Gradascevic, a researcher with the Microsoft Malware Protection Center (MMPC), in a Sunday blog.

Morto spreads using RDP, or Remote Desktop Protocol, the Microsoft-made protocol for controlling one computer by connecting to it from another.

All versions of Windows from XP on include client software that uses RDP to remotely access machines. The software, called Remote Desktop Connection (RDC) in XP, Vista and Windows 7, requires a username and password to log in to a remote system.

Windows PCs infected with Morto scan the local network for other machines that have RDC switched on, then try to log in to a Remote Desktop server using a pre-set list of common passwords, said F-Secure. If one of the passwords works, the worm then downloads additional malware components to the just-victimized server and kills security software to remain hidden.

The scanning for potential targets generates significant traffic on TCP port 3389, the port a Remote Desktop server monitors for incoming access requests.

That traffic caught the attention of puzzled network administrators starting last Thursday.

“Every 10 min. or so, a flood of TCP 3389 connection attempts out to seemingly random IP addresses,” reported a user identified as “BarrySDCA” in a Friday message posted to a Microsoft support forum . “Our firewall is blocking it from getting out and it keeps trying.”

That thread currently has nearly 70 messages and has been viewed by others almost 6,000 times, both large numbers for a discussion that started only days ago.

Analyses done by Microsoft and F-Secure identified the list of weak passwords the worm tries, which includes such too-easy examples as “password,” “123456” and “abc123.”

“This particular worm highlights the importance of setting strong system passwords,” said Microsoft’s Gradascevic. “The ability of attackers to exploit weak passwords shouldn’t be underestimated.”

Morto’s purpose may be to crank out denial-of-service attacks against hacker-designated targets, said Microsoft in the write-up published Sunday.

Although Microsoft patched RDP just three weeks ago as part of August’s monthly security update , Morto does not exploit that vulnerability, or any other in the protocol.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer , or subscribe to Gregg’s RSS feed . His e-mail address is gkeizer@ix.netcom.com .

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Related Tech News

Get ITBusiness Delivered

Our experienced team of journalists brings you engaging content targeted to IT professionals and line-of-business executives delivered directly to your inbox.