http://securityresponse.symantec.com/avcenter/venc/data/backdoor.litmus.html

Title: Symantec Security Response - Backdoor.Litmus
Symantec United States
global sites
products
purchase
service and support
security response
downloads
about symantec
search
feedback


© 1995-2002 Symantec Corporation.
All rights reserved.
Legal Notices
Privacy Policy

security response
Category 2

Backdoor.Litmus

Discovered on: October 17, 2001
Last Updated on: April 15, 2002 at 05:12:02 PM PDT

Backdoor.Litmus is a backdoor Trojan horse that can give a hacker access to the computer. Like many other backdoor Trojans, Backdoor.Litmus is controlled by the hacker using IRC channels.


Type: Trojan Horse

  • Virus Definitions (Intelligent Updater)*
  • October 18, 2001

  • Virus Definitions (LiveUpdate™)**
  • October 24, 2001

    *

    Intelligent Updater virus definitions are released daily, but require manual download and installation.
    Click here to download manually.

    **

    LiveUpdate virus definitions are usually released every Wednesday.
    Click here for instructions on using LiveUpdate.

    threat assessment

    Wild:

    Threat Metrics

    Low Medium Low

    Wild:
    Low

    Damage:
    Medium

    Distribution:
    Low

    Damage:

    technical details

    When Backdoor.Litmus is run, it creates a copy of itself as %Windows%\Litmus\Msgsrv16.exe.

    NOTE: %Windows% is a variable. The worm locates the \Windows folder (by default this is C:\Windows or C:\Winnt) and copies itself to that location.

    Once a computer is compromised, the hacker can perform actions such as the following:


    recommendations

    Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":


    removal instructions

    NOTE: If the Trojan files are currently running (in use by Windows), Norton AntiVirus (NAV) may not be able to delete them. In this situation, you must restart in Safe mode and run the scan again. All Windows 32-bit operating systems except Windows NT can be restarted in Safe mode. Read the document for your operating system.

    Additional information:

    Possible system changes
    If the Trojan was run and a hacker executed files on the computer, it may be difficult to determine exactly what was done, even after the Trojan was removed. If you are familiar with your operating system and how to use system-repair or system-checking tools, we suggest that you fully check the system for any of these modifications and undo them. Otherwise, consider reinstalling the Windows operating system.


    Write-up by: Andre Post

    Reply via email to