Log in
Register
Menu
Log in
Register
Home
What's new
Latest activity
Authors
Forums
New posts
Search forums
What's new
New posts
Latest activity
Members
Current visitors
New posts
Search forums
Menu
Log in
Register
Install the app
Install
Forums
Miscellaneous Sections
Tech Head - The Technology Section
Computer Discussion
Fizzer virus secrets revealed
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="net1" data-source="post: 20777"><p>The Fizzer virus - which caused havoc on P2P and chat networks - has been decompiled, revealing many of its secrets </p><p>Members of the chat-network security group IRC/Unity have decoded the manner in which the creator of the Fizzer virus can communicate with the program, a co-founder of the group said on Monday. </p><p></p><p>The Fizzer virus connects from an infected PC to a randomly selected Internet relay chat (IRC) network using a list of more than 300 such networks contained in the virus. Once connected, Fizzer creates a chat channel and listens for commands from a specific user nickname. The IRC/Unity group discovered the algorithm that determines what that name should be. </p><p></p><p>"It's a three-letter nickname that is only valid for the current date," said John McGarrigle, the newly elected chairman of the IRC/Unity group, a collection of administrators from more than 50 different chat networks. "Once you have that, you can control the bot (virus program) through IRC." </p><p></p><p>The discovery occurred less than a week after smaller IRC networks became inundated with connection requests from compromised PCs. Late last week, the IRC/Unity group -- formed in response to the Fizzer worm -- started work on decompiling the program in an attempt to block the worm. </p><p></p><p>This weekend, the IRC/Unity group discovered that access to computers infected by the Fizzer worm is regulated by a three-letter nickname, which is generated by an algorithm that depends on the current date. A person who knows the nickname can issue commands to any computer that's compromised by the virus and listening to the current chat channel. </p><p></p><p>Several IRC operators have started using the information to command any PC infected with the virus that connects to their network to uninstall itself. </p><p></p><p>"A lot of networks are actively sending out the command to all IRC Fizzer clients," said McGarrigle. "When they send the uninstall command, it leaves no trace of the bot." </p><p></p><p>While the legality of the tactic is questionable, the actions could eradicate the virus from PCs in the coming weeks. </p><p></p><p>Still, the IRC/Unity group is not done yet. While it has determined the latest authorised nicknames for the virus, it hasn't learned all the specifics of the algorithm, which could hinder efforts to automate any response to the virus. </p><p></p><p>"There is still a lot of work," McGarrigle said. "Just because we have figured this out doesn't mean that we are going to (eliminate) the threat."</p></blockquote><p></p>
[QUOTE="net1, post: 20777"] The Fizzer virus - which caused havoc on P2P and chat networks - has been decompiled, revealing many of its secrets Members of the chat-network security group IRC/Unity have decoded the manner in which the creator of the Fizzer virus can communicate with the program, a co-founder of the group said on Monday. The Fizzer virus connects from an infected PC to a randomly selected Internet relay chat (IRC) network using a list of more than 300 such networks contained in the virus. Once connected, Fizzer creates a chat channel and listens for commands from a specific user nickname. The IRC/Unity group discovered the algorithm that determines what that name should be. "It's a three-letter nickname that is only valid for the current date," said John McGarrigle, the newly elected chairman of the IRC/Unity group, a collection of administrators from more than 50 different chat networks. "Once you have that, you can control the bot (virus program) through IRC." The discovery occurred less than a week after smaller IRC networks became inundated with connection requests from compromised PCs. Late last week, the IRC/Unity group -- formed in response to the Fizzer worm -- started work on decompiling the program in an attempt to block the worm. This weekend, the IRC/Unity group discovered that access to computers infected by the Fizzer worm is regulated by a three-letter nickname, which is generated by an algorithm that depends on the current date. A person who knows the nickname can issue commands to any computer that's compromised by the virus and listening to the current chat channel. Several IRC operators have started using the information to command any PC infected with the virus that connects to their network to uninstall itself. "A lot of networks are actively sending out the command to all IRC Fizzer clients," said McGarrigle. "When they send the uninstall command, it leaves no trace of the bot." While the legality of the tactic is questionable, the actions could eradicate the virus from PCs in the coming weeks. Still, the IRC/Unity group is not done yet. While it has determined the latest authorised nicknames for the virus, it hasn't learned all the specifics of the algorithm, which could hinder efforts to automate any response to the virus. "There is still a lot of work," McGarrigle said. "Just because we have figured this out doesn't mean that we are going to (eliminate) the threat." [/QUOTE]
Insert quotes…
Verification
Post reply
Forums
Miscellaneous Sections
Tech Head - The Technology Section
Computer Discussion
Fizzer virus secrets revealed
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top