Other

Zotob Worm β€” Windows 2000 MS05-039 Exploit (CNN, NYT, DHS Disrupted)

πŸ“… 2005-08-13 🏒 Microsoft Windows 2000 Plug and Play service 🦠 Zotob (IRCBot variant) πŸ”Ž CVE-2005-1983
Primary Source β†—

Incident Details

The Zotob worm emerged on August 13, 2005 β€” just four days after Microsoft released the MS05-039 security patch for a critical Plug and Play buffer overflow vulnerability in Windows 2000. The worm spread rapidly via port 445, targeting unpatched Windows 2000 systems, causing them to reboot repeatedly. Notably high-profile victims included CNN (live TV broadcasts disrupted, reporters seen rebooting machines on air), The New York Times (newsroom computers infected), and the US Department of Homeland Security. A total of approximately 13 variants were identified. The FBI investigated and arrested two suspects within 11 days: Farid Essebar (nicknamed ‘Diablo’), an 18-year-old Moroccan national, and Atilla Ekici, a 21-year-old Turkish national. Essebar was convicted and sentenced to 2 years in Morocco. Zotob was notable for: (1) the speed of weaponization of a newly disclosed vulnerability; (2) the high visibility of its victims; and (3) the rapid law enforcement response. The incident reinforced the criticality of rapid patch deployment cycles and was frequently cited in discussions of zero-day and near-zero-day exploitation timelines.

Technical Details

Initial Attack Vector
Exploitation of MS05-039 (CVE-2005-1983), a critical buffer overflow vulnerability in the Windows Plug and Play service affecting Windows 2000 systems; the worm propagated automatically via TCP port 445 without requiring user interaction, exploiting unpatched systems within 4 days of the security patch release
Vendor / Product
Microsoft Windows 2000 Plug and Play service
Malware Family
Zotob (IRCBot variant)
CVE / GHSA References
CVE-2005-1983

Timeline

  1. 2005-08-13 Breach occurred
  2. 2005-08-16 Publicly disclosed