Welcome to the Virus Encyclopedia of Panda Security.
It launches Denial of Service attacks against several websites between April 22 and 28, 2004, both inclusive. It installs a backdoor which listens to the TCP ports 5556 and 5557.
|Detection updated on:||April 15, 2004|
|Yes, using TruPrevent Technologies
Netsky.V is a worm that launches DoS (Denial of Service) attacks against several websites between April 22 and 28, 2004, both inclusive.
In addition, it installs a backdoor that listens to the TCP ports 5556 (where it installs an FTP service) and 5557 (where it installs an HTTP service). By doing so, Netsky.V turns these ports into servers from which it can download itself to other computers.
Netsky.V spreads via an e-mail message in an HTML format with variable characteristics and with no attachments. This message exploits the Internet Explorer vulnerability, ObjectData, which allows arbitrary code to be run remotely, without user's intervention.
Netsky.V is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.