News

Fizzer Bubbles Up

A mass-mailing worm known as Fizzer broke out late last week and is getting more attention from a prominent security vendor Monday.

Fizzer sends itself to all contacts in the Windows Address Book, contains a backdoor that uses mIRC to communicate with a remote attacker and contains a keylogger. The worm affects all versions from Windows 95 through Windows XP.

The message has dozens of possible subject lines, several different body texts and randomly generated attachment names.

While security vendor F-Secure gives Fizzer its highest alert status, both Symantec and Trend Micro started it out on a lower rung. Symantec, however, bumped up the severity of the alert Monday.

"Due to the number of submissions received from customers, Symantec Security Response is upgrading this threat from a Category 2 to a Category 3 threat," the company said in a statement.

For comparison, Klez.H, which is still on top of Symantec's threat list despite being released more than a year ago, currently ranks higher as a Level 4 threat on Symantec's threat scale.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft Expands Azure AD Password Lengths, Adds Conditional Access Controls

    Microsoft announced a couple of Azure Active Directory enhancements this week regarding password lengths and new conditional access controls for IT pros.

  • Attack Surface Analyzer 2.0 Available for Checking Software Installs

    Microsoft this week described Attack Surface Analyzer 2.0, an updated tool for checking software installations that's now built using open source code.

  • What Causes Hyper-V Replication Failures?

    Hyper-V replication failures happen rarely, but their impact can be catastrophic when they do. Know the scenarios that are likely to trigger a replication failure.

  • Microsoft Touts Using HyperClear To Address Intel Processor Woes

    Microsoft is again promoting its HyperClear Hyper-V hypervisor technology as a potential balm for organizations trying to come to grips with Intel's latest speculative execution side-channel attack disclosures.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.