Throwback Thursday: Holding the Bady

Posted by   Helen Martin on   Jul 21, 2016

Last week saw the 15th anniversary of the appearance of 'Code Red' (also known as 'Bady') - the first fileless worm, which spread by exploiting a vulnerability in Microsoft IIS, even penetrating Microsoft's own IIS servers. 

Throwback-Thursday-VB.jpg

Part of the worm's payload was to launch denial of service attacks against a number of fixed IP addresses - including the then IP address of the White House website.

In August 2001, Costin Raiu analysed the Win32/Bady.worm, concluding that, had the worm been written just a little more carefully, the impact and damage it caused could have been much, much worse.

Costin's article can be read here in HTML-format, or downloaded here as a PDF.

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Throwback Thursday: Giving the EICAR test file some teeth

The 68-byte EICAR test file plays as important a role today as it did 19 years ago. In this week's Throwback Thursday we look back at a VB99 conference paper in which Randy Abrams described how this 'miracle tool' worked and how it could be used.

XMRig used in new macOS cryptominer

A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner.

Tendency for DDoS attacks to become less volumetric fits in a wider trend

CDN provider Cloudflare reports an increase in DDoS attacks targeting layer 7 and focusing on exhausting server resources rather than sending large volumes of data. This fits in a wider trend.

Turkish Twitter users targeted with mobile FinFisher spyware

Through fake social media accounts, users were tricked into installing an Android application that was actually a mobile version of the FinFisher spyware.

Hide'n'Seek IoT botnet adds persistence

The Hide'n'Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.