Sober Worm Has Nazi Connection

The infamous Sober worm is set to rear its ugly head again in a New Year’s activity that has security officials expecting the worst.

Security experts at iDefense reverse-engineered the latest Sober variant and discovered the code will automatically download some unknown code on Jan. 5, 2006, the anniversary of the founding of the Nazi party and the eve of a major German political convention.

“This discovery emphasizes the ever-present and often underestimated threat of ‘hacktivism’ — combining malicious code with political causes,” Joe Payne, iDefense vice president of security intelligence services, said in a statement.

The latest Sober variant has already made its mark in the security world and with the millions of e-mail users who’ve received the damaging e-mails.

Last month the Federal Bureau of Investigation (FBI) warned users not to open an attachment in e-mails purportedly coming from the agency. The attachment in question was, in fact, the Sober.z worm ready to infect computers and deliver its payload.

This isn’t the first time the FBI has been the target of a Sober attack. In February the Sober.k worm used the same methods found in last month’s messages, a warning the FBI had tracked user visits to illegal Web sites and requested they open the attached file.

Like other worms, Sober.z disables the security software that could prevent its spread, scans the user’s PC for e-mail addresses, delivers a copy of itself to that address and hides code within the user’s PC. U.K.-based security vendor Sophos lists it the top virus of November, with nearly 43 percent of virus reports received by the company attributed to Sober.z.

In essence, the Sober e-mail attacks last month are merely a prelude to the true attack, which is to download the file. iDefense officials predict the next wave could have a “significantly detrimental” effect on Internet traffic as e-mail servers attempt to keep up with the expected messages.

Allysa Myers, virus research manager at McAfee’s Anti Virus Emergency Response Team, said the download component is pretty common in Sober variants and its likely the Jan. 5, 2006, date will be a relative non-event. Researchers have had enough time, she said, to contact the ISPs hosting the Web sites the code is supposed to download from, negating the upcoming attack. It will all depend on what sites haven’t been shut down by that date, Myers said.

This article was first published on To read the full article, click here.

News Around the Web