Although the experts are not yet rating the Deloder worm as a high risk to PC users, the technical make-up of the Trojan horses it leaves behind is of concern. They consist of a commonly used piece of network administration software called Virtual Network Computing (VNC), and an Internet Relay Chat (IRC) bot, or remote-access Trojan horse.
The VNC component allows attackers to connect to an infected system and control it as if they were in front of it. They have full access through a graphical user interface.
The IRC bot, when activated, connects to a remote server and waits for commands, which could mean that infected systems are going to be used for aattack.
This worm, unlike others such as, requires no user interaction to spread--it exploits common passwords, such as "password" and "computer," in share directories in Windows NT/2000/XP machines and hence spreads automatically.
However, because the virus attacks through weak share-directory passwords, the effect on corporations has been minimal because share directories are typically firewalled.
Daniel Zatz, a security spokesman from Computer Associates International, says his company hasn't received any reports of customers being infected. "Very little has been reported to the (antivirus) vendors themselves,? he said.
Aside from potential denial-of-service implications, Zatz says that people may be stung through identity theft--even a novice malicious hacker can access an infected system with ease.
"This is one of the ways that identity theft occurs," he said.
Despite this, Melbourne, Australia-based security consultant Adam Pointon says that the worm is hitting home users hard. "It's been increasing threefold over the last few days," he said.
The SANS Institute's Internet Storm Center, a research group that monitors the Internet for attacks, has lifted the pertinent alert status from green to yellow. More information is available on SANS' Web site.
ZDNet Australia 's Patrick Gray reported from Sydney.