Threat of the month: Morto worm

The Morto worm recently rose to fame as the only worm to leverage the Microsoft RDP protocol to propagate.  Worms are rare these days so any new worm is interesting.

How does it work?
Morto scans the LAN for systems running RDP (TCP port 3389).  Once RDP is found the worm attempts a dictionary attack on the Administrator account.  Upon successful login the remote hard drive is mounted and Morto copies itself to the remote PC. Using the Regedit command the DLL previously copied over is automatically loaded into memory and the worm is off and running again.

Should I be worried?

Morto represents the continued ingenuity of the Malware community. Although it didn't pack a dangerous payload it should be a wakeup call to IT administrators worldwide because it exploited weak configurations. Morto was packaged with only 36 guessable passwords, such as “123,” “Admin,” and “password.”

How can I prevent it?
Don't forget about the local administrator account on your computers. Ensure the same password policies apply to local accounts as they do the domain level accounts.  Disable RDP services if not needed and keep all systems protected with anti-malware software.  

More in Features

Behind the scenes: Privacy and data-mining

Behind the scenes: Privacy and data-mining

With data-mining firms harvesting personal information from online activity, privacy advocates, if not yet consumers, are alarmed, reports James Hale.

The great divide: Reforming the CFAA

The great divide: Reforming the CFAA

Aaron Swartz's death inspired Rep. Zoe Lofgren to want to reform the federal anti-hacking law, but some security pros worry this would sterilize a potent enforcement weapon, reports Dan Kaplan.

Suspect everything: Advanced threats in the network

Suspect everything: Advanced threats in the network

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.