Grant Gross
Senior Writer

Witty worm exploits hole in ISS security product

news
Mar 22, 20043 mins

Some versions of BlackIce, RealSecure impacted

A new worm that exploited a hole in some of Internet Security Systems Inc.’s (ISS’) intrusion protection products seems to be dying down after affecting thousands of IP (Internet Protocol) addresses since Saturday.

The so-called Witty worm, affecting some versions of ISS’ BlackIce and RealSecure intrusion protection products, is “highly malicious” because it slowly destroys the system it infects, according to an alert from Lurhq Corp., a managed security provider. “Rather than simply executing a ‘format C:’ or similar destructive command, the worm slowly corrupts the filesystem while it continues to spread,” Lurhq’s alert said.

The spread of the worm appeared to be slowing down Monday, said Joe Stewart, senior security researcher at Lurhq. “It was only a big deal for the people who had the ISS products’ specific versions,” Stewart added. “It was not a threat for Windows users in general.”

ISS estimated the worm infected about 12,000 IP addresses, although the exact number is difficult to determine, said Dan Ingevaldson, director of X-Force research and development at ISS. Early reports had the worm infecting up to 50,000 IP addresses, but Ingevaldson said ISS’ scans didn’t find evidence of the worm being that widespread.

“We saw a spike in the first days of the infection, and it’s been going down since then,” Ingevaldson said.

The worm, which exploited an ICQ parsing vulnerability, affected non-updated versions of ISS’ BlackIce and RealSecure products. A complete list of affected versions is available at ISS’ alert site: http://xforce.iss.net/xforce/alerts/id/167. An ISS update that fixes the vulnerability has been available since March 9.

In addition to the maliciousness of the worm, its timing is also significant, Stewart said. A vulnerability alert for the ISS products was released on March 18, and the worm began spreading March 20. The writer of the worm either new of the vulnerability before the announcement or wrote and tested the worm in less than two days, Stewart said.

“Usually, you have a week or two after the vulnerability was announced,” Stewart said. “This was a substantial piece of work to be done in one day.”

ISS counts about 1.6 million corporate installations of the BlackIce PC intrusion detection software, and that number doesn’t include home installations. The worm illustrates the importance of running updated intrusion detection and firewall software, Ingevaldson added.

“Our customers know you have to apply the most recent updates,” he sad. “They know that for it to work, they need to have the most recent updates, and they would not be affected at all if they did.”

Grant Gross

Grant Gross, a senior writer at CIO, is a long-time IT journalist who has focused on AI, enterprise technology, and tech policy. He previously served as Washington, D.C., correspondent and later senior editor at IDG News Service. Earlier in his career, he was managing editor at Linux.com and news editor at tech careers site Techies.com. As a tech policy expert, he has appeared on C-SPAN and the giant NTN24 Spanish-language cable news network. In the distant past, he worked as a reporter and editor at newspapers in Minnesota and the Dakotas. A finalist for Best Range of Work by a Single Author for both the Eddie Awards and the Neal Awards, Grant was recently recognized with an ASBPE Regional Silver award for his article “Agentic AI: Decisive, operational AI arrives in business.”

More from this author