Investigations into recent increases in port 5000 scans have revealed the existence of two new worms: Bobax and Kibuv.
The W32/Bobax-A worm, which employs the same Microsoft security vulnerability as the Sasser worm to break into computers, uses port 5000 to identify Windows XP systems (the port used for "Universal Plug and Play").
According to the Sophos Web site, this new worm "is capable of turning infected computers into spam factories and launchpads for denial-of-service attacks against Web sites."
The process is explained on the LURHQ security site: "unlike proxy Trojans which require the spammer to connect and send each individual piece of mail, Bobax sends the mail using a template and a list of email addresses. This has the benefit of offloading almost all the bandwidth requirements of spamming onto the Trojaned machines, allowing the spammer to operate with minimal cost."
Kibuv.B creates an FTP server on port 7955 for which any username/password combination will work. Like other malware of this type, the FTP server sends a copy of the worm in response to any file request.
The vulnerabilities exploited by these two worms are not new -- users with the latest patches from Microsoft are protected.
ZDNet Australia's staff reported from Sydney. For more coverage from ZDNet Australia, click here.