Barely 24 hours after the Slapper B worm started to show up on antivirus monitoring stations, a new variant has cropped up. According to security specialist ISS, Slapper C has infected 1,500 servers already and is spreading, although a source . . .
Barely 24 hours after the Slapper B worm started to show up on antivirus monitoring stations, a new variant has cropped up. According to security specialist ISS, Slapper C has infected 1,500 servers already and is spreading, although a source point has not been identified at this time.

The company warned that the source code for Slapper has spread quickly among the underground community, and will be the development platform of choice for future attacks.

Slapper and its variants exploit a vulnerability in the Secure Sockets Layer 2.0 of Apache web servers using distributions from Red Hat, Mandrake, SuSE, Gentoo and Slackware. Its suspected creator was arrested in the Ukraine on Wednesday.

The link for this article located at vnunet is no longer available.