Just in time for the holidays, a worm called Dasher has hit the Internet. The malicious software, which primarily targets Windows 2000 systems, is one of three new attacks targeting Microsoft’s software that has emerged in the last 24 hours. Two other recently posted attacks can crash or gum up the Internet Explorer (IE) browser.The first reports of Dasher began circulating Thursday and two variants of the worm have now been reported by Finnish security firm F-Secure.Dasher is based on an exploit for a recently patched bug in Microsoft Distributed Transaction Coordinator, a component of the operating system that is commonly used by database software to help manage transactions. Microsoft rates the bug “critical” for Windows 2000 systems.The worm’s emergence does not come as a surprise. The “proof of concept” code that could be used to make a worm like Dasher first began circulating after Microsoft issued its patch in early October. Some security researchers feared that it could be used to create a worm similar to last August’s Zotob attack , which brought down hundreds of thousands of systems worldwide. Two variants of Dasher are now in circulation, F-Secure said Thursday. Both versions install software that then tries to infect other vulnerable systems, and that also can be used to log keystrokes and turn the computer into a remotely controlled “bot” system.One version of the worm seems to be largely ineffective thanks to some buggy code, and other variations are unlikely to be as widespread as Zotob, said Cesar Cerrudo, CEO with security research firm Argeniss in Parana, Argentina. “I don’t think it will be a successful worm since that vulnerability is difficult to exploit 100% … it fails 50% of the time,” he said via instant message. However, he added, the worm still had the potential to infect thousands of systems. Meanwhile, two IE exploits were posted to the Packet Storm Web site on Wednesday.The first example takes advantage of a bug in the way IE processes CSS (Cascading Style Sheet) code, according to its author Markus Heer, a developer with Penta Group, an IT consulting firm based in St. Gallen, Switzerland. CSS is a formatting standard used to give Web pages a consistent look and feel.The bug was discovered during the course of building an enterprise Java application, Heer said in an e-mail interview. “I wrote the exploit after debugging the CSS/HTML code to find out the problem and develop a workaround for our application,” he said.The second exploit, attributed to a hacker named “Ziplock,” exploits a Javascript bug to lock up an IE browser. Both this and the CSS code have been tested and found to work with version 6.0 of IE, the hackers said.A representative of Microsoft’s public relations agency was not able to comment on the bugs and an executive at the company responded to an interview request by saying he would look into the matter and comment when he had more information. Related content news EU approves $1.3B in aid for cloud, edge computing New projects focus on areas including open source software to help connect edge services, and application interoperability. By Sascha Brodsky Dec 05, 2023 3 mins Technology Industry Technology Industry Technology Industry brandpost Sponsored by HPE Aruba Networking Bringing the data processing unit (DPU) revolution to your data center By Mark Berly, CTO Data Center Networking, HPE Aruba Networking Dec 04, 2023 4 mins Data Center feature 5 ways to boost server efficiency Right-sizing workloads, upgrading to newer servers, and managing power consumption can help enterprises reach their data center sustainability goals. By Maria Korolov Dec 04, 2023 9 mins Green IT Servers Data Center news Omdia: AI boosts server spending but unit sales still plunge A rush to build AI capacity using expensive coprocessors is jacking up the prices of servers, says research firm Omdia. By Andy Patrizio Dec 04, 2023 4 mins CPUs and Processors Generative AI Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe