When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Don't get bitten by Spida

Spida (js.spida.b.worm, also known as Double Tap and SQLSnake) is an Internet worm now attacking Microsoft SQL servers worldwide.

Written in JavaScript, Spida actively scans port 1433 for access into systems with blank system administrator accounts. According to the SANS Institute, a computer research organization, system administrators began noticing an upsurge in scans on port 1433, which is used by Microsoft's SQL servers, on Monday, May 20, 2002. Within the first 12 hours, the number of scanned and infected systems rose sharply to more than 1,600, and those systems are now scanning for others on the Internet.

In addition to port scanning, the worm collects and e-mails passwords from the infected servers. Users of Microsoft Windows 95, 98, or Me are not affected by the Spida worm. So there is an advantage to running inferior OS's after all. Not you could run latest iterations of SQL dbs on these OS's though.

Spida includes a UPX-compressed version of FScan and a Trojan horse that actively scans port 1433 on randomly generated IP addresses. It looks for other SQL servers on the Internet running with the default settings including blank system administrator passwords. Once it's found a system, Spida infects it and continues scanning for other vulnerable SQL servers. On the infected system, Spida collects passwords and e-mails them back to the presumed creator of this worm.

News source: ZDNet

View: Spida bites Microsoft SQL servers

Report a problem with article
Next Article

Blindwrite Suite Version 4.0.2

Previous Article

AOL Instant Messenger 4.8.2781 Beta

Join the conversation!

Login or Sign Up to read and post a comment.

-1 Comments - Add comment