Online Media - Publish.com
Publish.com Ziff-Davis Enterprise  
SEARCH · ONLINE MEDIA · MOBILE · WEB DESIGN · GRAPHICS TOOLS · PRINTING · PHOTO · TIPS · OPINIONS
Home arrow Online Media arrow Trend Micro: RSS Is Worm Bot's Next Target
Trend Micro: RSS Is Worm Bot's Next Target
By Ryan Naraine

Rate This Article:
Add This Article To:
An anti-virus research engineer warns that the growth of RSS and the coming Internet Explorer 7 browser refresh will provide a lucrative target for bot worm attacks.

Security researchers at Trend Micro Inc. have pinpointed RSS (Really Simple Syndication) technology as a lucrative target for future bot worm attacks.

David Sancho, senior anti-virus research engineer at Trend Micro, warned that RSS feed hijacking will become commonplace when Microsoft Corp. ships Internet Explorer 7, a browser refresh that will feature built-in RSS support.

In a white paper titled "The Future of Bot Worms," Sancho said the IE7 release "will open some interesting possibilities to worm creators."

"The easy way of taking advantage of the popularity [of RSS] is to hijack the existing configured feed clients to automatically download new copies of worms and other threats to the infected computers. This is accomplished by pointing the already-configured client to different and malicious Web content," Sancho wrote.

"The way this would work is checking if the system has any automatic feed download configured. If it does, it would just add or change an existing one to point to the malicious Web site," he added.

Sancho predicts that RSS feed hijacking attacks will serve as a passive download point that could easily bypass personal firewalls and other security barriers.

"The download would still be working even if the worm is detected [and] deleted. To get rid of this properly, there should be a cleaning tool that deletes the configuration in the feed client," he added.

Read more here about Microsoft's instructions on Working with RSS in Vista.

The anti-virus researcher recommends that companies should consider deploying a method to scan HTTP traffic.

Sancho also warned that worm bot authors are finding ways to quickly exploit known vulnerabilities. The Nimda worm, for example, was unleashed 366 days after the vulnerability was reported while the recent Zotob worm only took 4 days to create.

"Automatic updates are just not an option anymore," Sancho declared, urging PC owners to patch home systems immediately as the updates are made available on the Microsoft Web site. "The security of our home systems is at stake just by being connected to the Internet."

In corporate settings, he suggests that IT administrators deploy software and hardware systems that specifically defend against worm bot threats.

"Detecting and blocking the network packets that the worm uses to exploit the vulnerability is by and large the best prevention to not get hit by this kind of malware," Sancho said, urging businesses to use IDS (intrusion detection systems) and specific network anti-virus systems.

He also predicted that polymorphic shellcode exploit attacks will become a new technique in worm attacks.

Check out eWEEK.com's for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer's Weblog.




Discuss Trend Micro: RSS Is Worm Bot's Next Target
 
>>> Be the FIRST to comment on this article!
 

 
 
>>> More Online Media Articles          >>> More By Ryan Naraine
 


Buyer's Guide
Explore hundreds of products in our Publish.com Buyer's Guide.
Web design
Content management
Graphics Software
Streaming Media
Video
Digital photography
Stock photography
Web development
View all >

ADVERTISEMENT


FREE ZIFF DAVIS ENTERPRISE ESEMINARS AT ESEMINARSLIVE.COM
  • Dec 10, 4 p.m. ET
    Eliminate the Drawbacks of Traditional Backup/Replication for Linux
    with Michael Krieger. Sponsored by InMage
  • Dec 11, 1 p.m. ET
    Data Modeling and Metadata Management with PowerDesigner
    with Joel Shore. Sponsored by Sybase
  • Dec 12, 12 p.m. ET
    Closing the IT Business Gap: Monitoring the End-User Experience
    with Michael Krieger. Sponsored by Compuware
  • Dec 12, 2 p.m. ET
    Enabling IT Consolidation
    with Michael Krieger. Sponsored by Riverbed & VMWare
  • VTS
    Join us on Dec. 19 for Discovering Value in Stored Data & Reducing Business Risk. Join this interactive day-long event to learn how your enterprise can cost-effectively manage stored data while keeping it secure, compliant and accessible. Disorganized storage can prevent your enterprise from extracting the maximum value from information assets. Learn how to organize enterprise data so vital information assets can help your business thrive. Explore policies, strategies and tactics from creation through deletion. Attend live or on-demand with complimentary registration!
    FEATURED CONTENT
    IT LINK DISCUSSION - MIGRATION
    A Windows Vista® migration introduces new and unique challenges to any IT organization. It's important to understand early on whether your systems, hardware, applications and end users are ready for the transition.
    Join the discussion today!



    .NAME Charging For Whois
    Whois has always been a free service, but the .NAME registry is trying to change that.
    Read More >>

    Sponsored by Ziff Davis Enterprise Group

    NEW FROM ZIFF DAVIS ENTERPRISE


    Delivering the latest technology news & reviews straight to your handheld device

    Now you can get the latest technology news & reviews from the trusted editors of eWEEK.com on your handheld device
    mobile.eWEEK.com

     


    RSS 2.0 Feed


    internet
    rss graphic Publish.com
    rss graphic Google Watch

    Video Interviews


    streaming video
    Designing Apps for Usability
    DevSource interviews usability pundit Dr. Jakob Nielsen on everything from the proper attitude for programmers to the importance of prototyping in design to the reasons why PDF, Flash and local search engines can hurt more than they help.
    ADVERTISEMENT