Other
Zotob Worm β Windows 2000 MS05-039 Exploit (CNN, NYT, DHS Disrupted)
Primary Source βIncident Details
The Zotob worm emerged on August 13, 2005 β just four days after Microsoft released the MS05-039 security patch for a critical Plug and Play buffer overflow vulnerability in Windows 2000. The worm spread rapidly via port 445, targeting unpatched Windows 2000 systems, causing them to reboot repeatedly. Notably high-profile victims included CNN (live TV broadcasts disrupted, reporters seen rebooting machines on air), The New York Times (newsroom computers infected), and the US Department of Homeland Security. A total of approximately 13 variants were identified. The FBI investigated and arrested two suspects within 11 days: Farid Essebar (nicknamed ‘Diablo’), an 18-year-old Moroccan national, and Atilla Ekici, a 21-year-old Turkish national. Essebar was convicted and sentenced to 2 years in Morocco. Zotob was notable for: (1) the speed of weaponization of a newly disclosed vulnerability; (2) the high visibility of its victims; and (3) the rapid law enforcement response. The incident reinforced the criticality of rapid patch deployment cycles and was frequently cited in discussions of zero-day and near-zero-day exploitation timelines.
Technical Details
- Initial Attack Vector
- Exploitation of MS05-039 (CVE-2005-1983), a critical buffer overflow vulnerability in the Windows Plug and Play service affecting Windows 2000 systems; the worm propagated automatically via TCP port 445 without requiring user interaction, exploiting unpatched systems within 4 days of the security patch release
- Vendor / Product
- Microsoft Windows 2000 Plug and Play service
- Malware Family
- Zotob (IRCBot variant)
- CVE / GHSA References
- CVE-2005-1983
Timeline
- 2005-08-13 Breach occurred
- 2005-08-16 Publicly disclosed