Online security experts are increasing the threat level on a
fast-spreading e-mail virus capable of allowing an attacker to upload and execute malicious code on infected computers.
The mass-mailing W32/BAGLE-A worm, also known as Bagle or Beagle,
includes a backdoor component which listens on TCP port 6777 and lets an attacker execute arbitrary programs on infected systems, anti-virus experts warned on Tuesday.
MessageLabs described the Bagle virus as “high risk” while Network
Associates has assigned a “medium risk” assessment.
The virus, first quarantined in Germany, has been spotted in 138
countries with the highest distributions in Europe and Asia. Because of the long holiday weekend, distribution in the U.S. has been low.
The Bagle virus arrives as a .EXE attachment with a random name and with
the word “hi” in the subject line. If an unsuspecting user executes the
attachment, the worm copies itself to the Windows system folder with
instructions to run at logon.
Upon execution, the Bagle virus uses its own SMTP
send itself to addresses harvested from files on the hard disk and spoofs
the “From” field in e-mails it sends.
According to a Network Associates alert, the worm contains a potentially
dangerous remote access component which listens on TCP port 6777 for remote
connections. “It tries to notify the virus author of its readiness to accept
commands by contacting various websites and calling a script located on the
remote site,” the company warned.
The company warned that home users are at higher risk of infection.
Network Associates and Sophos have posted disinfection instructions,
available here and here.
According to Sophos senior security analyst Chris Belthoff, home users were at a higher risk of infection because most enterprises are blocking .EXE attachments at the gateway. But, as with the destructive SoBig virus, workers at home offices who connect remotely to an enterprise network represent a danger.
“This virus can sneak into an enterprise environment through the home workers because it grabs all e-mail addresses to mail itself to. In many cases, it’s a work-related address book that puts the attachment inside the network,” Belthoff told internetnews.com.
He believes the virus is the work of a sophisticated spam network looking to take over computers and use them as spam zombies. “Eventually, mail server capabilities could be downloaded to infected machines. Once that backdoor is active, any type of code can be loaded on an infected machine.”
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.