Credit: Tookapic / Insspirito Hackers have posted code that could be used to target Microsoft’s Windows operating system in a worm attack.The code, which was published early Thursday on the Milw0rm website, works on the Windows 2000 operating system, according to Oliver Friedrichs, director of emerging technologies with Symantec’s Security Response.It takes advantage of a flaw in the Windows Workstation service, which Windows uses to do things like file-sharing or printing over the network.When Microsoft patched this flaw in its monthly batch of security fixes earlier this week, security vendors had warned that this was one of the most critical of the November updates, and could possibly be exploited in a self-replicating worm. On Thursday, they reiterated this advice, though the odds of a widespread worm may not be great.“If you run Windows 2000 systems in your environment, this flaw is the most critical one to patch, and even more so now that there’s a live working exploit on the Internet,” said Marc Maiffret, chief technology officer with eEye Digital Security. Maiffret said that while the Workstation flaw is “just as easy to exploit” as the flaws used by the Blaster and Zotob worms, the bad guys have realized that they can be more effective by using their malware in low-key, targeted attacks. “Nobody is going to dare to write a worm,” he said. “Why would they, when they could target companies and make money off of them?”“All worms do is create awareness,” he added.There is also a technical factor that may limit the spread of any worm based on this exploit code.According to Friedrichs, the attack code must also be aware of a legitimate domain controller on the victim’s network. “It limits somewhat the exposure of systems on the Internet,” he said.Symantec has not yet seen this malware being used in attacks, Friedrichs said Thursday.Still, some security vendors think that a worm attack could be in the works. “If we are able to confirm that it does work … then the possibility of a worm is really high,” said Amol Sarwate, Vulnerability Research Lab manager with Qualys. “Once people get it working, it’s only a matter of time for people to encapsulate it in worm behavior.” Qualys researchers are studying the exploit code and are still not sure which versions of Windows can be compromised by the attack, he said.Sarwate noted that there is other attack code in circulation this week. Hackers have also posted malware targeting a critical flaw in the WinZip 10 file compression software, which was also patched by Microsoft on Tuesday.“It is a big deal for the people who have WinZip installed, but it’s not as much of a big deal as [the Workstation exploit],” he said.Symantec is now warning of attack code targeting a third Windows flaw. On Thursday it said that exploit code has also been published for a flaw in the Client Service for Netware, which was also patched Tuesday. -Robert McMillan, IDG News Service (San Francisco Bureau) Related content feature 10 most popular IT certifications for 2023 Certifications are a great way to show employers you have the right IT skills and specializations for the job. These 10 certs are the ones IT pros are most likely to pursue, according to data from Dice. By Sarah K. White May 26, 2023 8 mins Certifications Careers interview Stepping up to the challenge of a global conglomerate CIO role Dr. Amrut Urkude became CIO of Reliance Polyester after his company was acquired by Reliance Industries. He discusses challenges IT leaders face while transitioning from a small company to a large multinational enterprise, and how to overcome them. By Yashvendra Singh May 26, 2023 7 mins Digital Transformation Careers brandpost With the new financial year looming, now is a good time to review your Microsoft 365 licenses By Veronica Lew May 25, 2023 5 mins Lenovo news Alteryx works in generative AI for speedy analytics results OpenAI integration and AI wizardry for report generation are aimed at making Alteryx’s analytics products more accessible. By Jon Gold May 25, 2023 3 mins Analytics Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe