Welcome to the Virus Encyclopedia of Panda Security.
It uses the LSASS, RPC DCOM and WebDAV vulnerabilities, among other means, in order to spread to as many computers as possible. It logs keystrokes, obtains confidential information on the affected computer, runs files, etc.
|First detected on:||Jan. 10, 2005|
|Detection updated on:||Jan. 10, 2005|
|Yes, using TruPrevent Technologies
Gaobot.CKP is a worm with backdoor characteristics that allows hackers to gain remote control over the affected computer and carry out actions such as command execution, download and execute files, log keystrokes, obtain different information on the computer, launch distributed denial of service (DDoS) attacks, etc.
Gaobot.CKP uses different means to spread:
It makes copies of itself in the shared network resources it accesses to.
It exploits the LSASS, RPC DCOM and WebDAV vulnerabilities to spread across the Internet.
It can access computers with the applicaction SQL Server installed, and whose SA (System Administrator) account password is blank.
It takes advantage of the backdoors opened by the worms Bagle.A and Mydoom.A, in order to spread to those computers affected by these worms.
It uses the following backdoors in order to enter the affected computer: Optix, NetDevil, Kuang and SubSeven.
It affects computers with the program DameWare Mini Remote Control installed and running.
If you have a Windows 2003/XP/2000/NT computer, it is highly recommendable to download the security patches for the LSASS, RPC DCOM and WebDAV vulnerabilities from the Microsoft website.
Gaobot.CKP is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.