Researchers have discovered a third vector to the Nimda worm, which is set to propagate again through e-mail at 3pm Sydney time on Friday.
"We rechecked the code base to Nimda, and we found a code set that is supposed to re-spread Nimda through e-mail systems starting 10 days after machines were first infected," said Oliver Friedrichs, director of engineering at the Attack Registry and Intelligence Service. That service is sponsored by SecurityFocus, a business security firm in San Mateo, California.
Ten days after first infecting machines, the worm will attempt to re-spread itself through readme.exe attachments, with the same payload as its original mail-based infection.
The impact could be significant or minute, depending on how well the IT community has cleaned systems and patched Microsoft Internet Information Server and Outlook programs. The 10-day vector is likely to be less severe than Nimda was the first time because more systems have been patched against the vulnerabilities, Friedrichs said.
But because Nimda has spread itself to so many places on computers, networked systems may not have been cleaned enough to prevent widespread mailings of the virus. Therefore, Friedrichs advised IT managers to do the following:
1. Double-check their patches.
2. Make sure their antivirus software blocks Nimda.
3. Block executable files at the e-mail gateway.
4. Alert users not to preview or open any attachments that say readme.exe.