Welcome to the Virus Encyclopedia of Panda Security.
It joins an IRC channel in order to receive control commands, such as launching denial of service attacks against websites.
|First detected on:||Aug. 10, 2004|
|Detection updated on:||Aug. 10, 2004|
Sdbot.AKM is a worm with backdoor characteristics, which allows hackers to gain remote access to the affected computer in order to carry out actions that compromise user confidentiality and impede the tasks performed.
Sdbot.AKM uses its own IRC client in order to join an IRC channel and accept remote control commands, such as launching denial of service (DoS) attacks against websites. It can also download and run files on the affected computer.
Sdbot.AKM spreads across computer networks. In order to do so, it checks if the affected computer belongs to a network. If so, it attempts to access the network shared resources, using passwords that are typical or easy to guess. Then, it makes a copy of itself to those shared resources.
Sdbot.AKM is difficult to recognize, as it does not show any messages or warnings that indicate it has reached a computer.