Chris Andrew, vice president of product management at PatchLink, said that coding errors caused a few variants of the worm to send computers into a reboot loop, which meant they spent very little time spreading the infection.
"If you read the vulnerability description in that exploit, it actually tells you that if you do it wrong it crashes the computer. If you do it right, then nobody can tell you have hacked the computer," Andrew said.
Many users blame
Redmond for Zotob
and its variants,
a survey says.
He said companies that were hit by one of the flawed variants were "lucky" because it gave them more time totaking hold.
"The people at were very upset that their computers crashed, but they were the lucky ones," Andrew said.
James Turner, security analyst at Frost & Sullivan Australia, agreed that the worm could easily have been worse--because the flawed variants gave administrators some.
"Your ultimate crime does not leave any traces. The minute a worm forces computers to do things that are abhorrent--like rebooting--it draws attention to itself," Turner said.
Allan Bell, marketing director for McAfee Asia-Pacific, said the versions that caused systems to crash--which McAfee has called IRCbot--are "often" created using source code distributed online.
PatchLink's Andrew agreed: "There are documented open-source materials available that show you how to do the hacks. It is hardly surprising that there are a whole bunch of (Zotob) variants."
American Express, Boeing and Holden are just some of companies with Australian locations that suffered from Zotob infections this week.
As part of its monthly patching cycle, Microsoft last week released a number of security updates, including the now infamous MS05-039, which fixed a critical vulnerability in Windows 2000.
Within days, exploit code was being distributed, and on Sunday the first Zotob worm was discovered in the wild.
Munir Kotadia of ZDNet Australia reported from Sydney.