« Android Malware, Adobe Exploits, Spam Volume & More in the McAfee Quarterly Threat Report | Main | TDSS Botnet Has a Firefox Add-On?! »
08/29/2011
Morto: Remote Desktop Connection Worm In the Wild, Spreading Actively
Co-Editor
For us antivirus folks, worms are among the most feared because of their ability to infect, spread, and replicate on their own.
This one is being dubbed "Morto," and what's so unique about it is it's the first one to use the Microsoft Remote Desktop Connection.
The only surprising thing to me is that it's taken so long for a worm of this type to surface. Remote Desktop gives you direct access to your desktop remotely, so if someone manages to break into your system via the Remote Desktop Service, it gives them direct access to your computer--as if they were working right on your desktop, albeit remotely.
This particular worm isn't exploiting any bugs in Windows or in Remote Desktop; rather, it's exploiting weak passwords, long the bane of good system administrators.
Further, it's attempting to gain access to the default "Administrator" login, giving it maximum permissions on the system. Thus, once it's in, the computer is fully compromised.
Our own networks are seeing this threat attempting to connect to our servers at a rate of about 10 attempts per second, so clearly, this is a threat to take seriously if you have machines that rely on TCP port 3389, the Remote Desktop port.
As for the passwords being attempted, F-Secure's post on the Morto Remote Desktop worm lists these as the passwords being used to attempt the break-ins:
- admin
- password
- server
- test
- user
- pass
- letmein
- 1234qwer
- 1q2w3e
- 1qaz2wsx
- aaa
- abc123
- abcd1234
- admin123
- 111
- 123
- 369
- 1111
- 12345
- 111111
- 123123
- 123321
- 123456
- 654321
- 666666
- 888888
- 1234567
- 12345678
- 123456789
- 1234567890
Here's our recommendations to keep this worm at bay:
- Change your password. Here's a how-to on choosing a good password.
- Rename your "Administrator" account. Since the worm is using "Administrator," alternatives will help keep it at bay.
- Block access to TCP port 3389, if possible, or limit access only to IP addresses you trust.
- Make sure your antivirus software/Internet security software is up-to-date.
- Backdoor:W32/Morto.A
- Backdoor:W32/Morto.B
The comments to this entry are closed.
Comments
You can follow this conversation by subscribing to the comment feed for this post.