Fact-checked by Grok 2 weeks ago

Nimda

Nimda is a discovered on September 18, 2001, that rapidly infected over two million Windows systems worldwide by exploiting multiple vulnerabilities in (IIS) web servers and client software. Named after "admin" spelled backwards, Nimda combined sophisticated propagation techniques, including mass attachments disguised as ".EXE," scanning for open shares, infecting websites to enable drive-by downloads, and leveraging backdoors left by prior worms like Code Red II. It targeted unpatched systems running , 2000, and earlier versions, as well as 5.0 and later, using directory traversal flaws and buffer overflows to gain administrative access. The worm's payload modified HTML and ASP files by appending JavaScript code to automatically email itself from infected machines, created hidden such as C$, and added a Guest account with full privileges, severely compromising system security. This multi-vector approach—encompassing client-to-client, server-to-client, and client-to-server infections—made Nimda one of the fastest-spreading at the time, surpassing the worm in speed and reach within hours of its release. Its emergence just one week after the heightened concerns, though no evidence linked it to ; instead, it clogged , caused denial-of-service conditions, and particularly disrupted U.S. financial networks. In terms of impact, Nimda infected hundreds of thousands to millions of hosts across the U.S., , and Asia, leading to widespread system slowdowns, file corruption, and cleanup costs potentially exceeding those of , estimated at $2.4 billion. Unique for being the first worm to proactively alter uninfected websites for malware distribution, it underscored vulnerabilities in Microsoft's ecosystem and prompted urgent patches from the company. Removal involved isolating systems, deleting replicated files like load.exe, restoring modified files, and applying security updates, but its persistence in registries and shares complicated eradication efforts. Overall, Nimda highlighted the evolving threat of hybrid worms, influencing subsequent cybersecurity on early detection and .

Background and Discovery

Release and Historical Context

The Nimda worm emerged on September 18, 2001, precisely one week after the terrorist attacks on the . This timing coincided with widespread public and governmental focus on potential threats to , amplifying concerns over digital security in the immediate aftermath of the physical assaults. The year 2001 marked a high point in the prevalence of computer worms, building on earlier outbreaks such as the SirCam worm in July, which spread via email attachments containing personal files, and the worm later that month, which targeted IIS servers and infected hundreds of thousands of systems globally. These incidents highlighted escalating vulnerabilities in networked systems and paved the way for Nimda's innovative use of multiple propagation vectors to achieve rapid dissemination. Initial reports on the release day described significant slowdowns in and delivery as Nimda began scanning and infecting systems worldwide. Antivirus companies, including , promptly identified the threat and issued alerts, enabling early mitigation efforts amid the worm's aggressive spread.

Naming and Initial Attribution

The name "Nimda" is derived from "admin" spelled backwards, a reference to the worm's ability to gain administrative privileges on infected Windows systems. Security researchers first identified the worm on September 18, 2001, shortly after the 9/11 attacks, with firms such as TruSecure Corporation and assigning it the designation W32/Nimda.A@mm based on its self-replicating code and mass-mailing capabilities. The worm's internal strings explicitly labeled it as such, aiding in its rapid classification by antivirus vendors like , which described it as a complex mass-mailing worm. Initial efforts to attribute the worm's authorship faced significant challenges, as no confirmed creator has ever been identified despite extensive investigations. Unfounded rumors circulated linking it to terrorist groups, fueled by its release just one week after the , though U.S. publicly stated there was no evidence of such a connection. In response, the FBI established a to probe the worm's origins and propagation methods, collaborating with experts, but the investigation yielded no arrests or definitive leads.

Infection Mechanisms

Email-Based Propagation

The Nimda worm employed as a primary vector for client-to-client propagation by harvesting email addresses from infected systems and sending mass-mailed messages containing its . Upon , the worm scanned the victim's Windows via the MAPI interface, as well as email messages stored in the system's , to compile a list of target recipients. It then used the local , such as or , to dispatch these messages without requiring manual intervention from the user. This automated process allowed rapid dissemination, with the worm programmed to repeat the emailing cycle every 10 days until removal. The emails generated by Nimda featured randomized subject lines exceeding 80 characters in length, often appearing innocuous or nonsensical to evade immediate suspicion, while the message body utilized a multipart/alternative format. This structure included an empty HTML text section followed by an "audio/x-wav" section embedding the worm as a base64-encoded executable file named README.exe, approximately 57 KB in size. The filename README.exe served as a subtle social engineering lure, mimicking a benign document that users might be inclined to open if the automatic execution failed, thereby exploiting curiosity or assumptions about safe file types in professional or personal communications. Infected systems targeted prevalent 2001-era email clients like , leveraging their integration with for broader compatibility. Upon receipt, the attachment executed automatically on vulnerable Windows systems without user interaction, primarily due to a flaw in versions 5.5 and earlier (excluding 5.01 SP2) that permitted type handling vulnerabilities, as detailed in CERT vulnerability note CA-2001-06. This allowed the worm to infect the host during preview or opening, immediately initiating further scans of the for propagation and combining with other vectors like network shares for amplified spread. The mechanism's reliance on both technical exploits and the trust users placed in attachments from known contacts underscored its effectiveness in 2001 enterprise environments dominated by unpatched software.

Network Share Exploitation

The Nimda worm exploited open network shares on Windows systems to facilitate lateral movement within local networks, primarily targeting unsecured file-sharing resources accessible via the (SMB) protocol. Upon infection, Nimda scanned for vulnerable hosts by probing ports 135 through 139, which are associated with and RPC services used for network enumeration and share discovery. This scanning allowed the worm to identify systems with open shares lacking password protection, particularly on , 98, and ME. On all affected systems, including and 2000, it disabled share security by deleting subkeys in the registry key [SYSTEM\CurrentControlSet\Services\lanmanserver\Shares\Security], while on NT and 2000 it additionally created and modified the Guest account to facilitate access. Once an open share was located, Nimda copied itself to the target , often disguising the as innocuous files such as load.exe in the Windows or by appending its to existing (.exe) files, thereby modifying them to execute the upon launch. It also targeted mapped drives and shares, including like C and D, granting full write permissions to propagate further across enterprise environments without requiring user interaction or as an . This file-based infection mechanism enabled rapid spread in internal networks, infecting documents and executables on shared resources to ensure persistence and continued scanning from newly compromised machines. To maintain remote access, Nimda created backdoor accounts by activating or adding the account to the Administrators group on and 2000 systems, assigning it a blank password for unrestricted control. It further compromised security by creating hidden (e.g., c through z) on all local drives with full access for the Everyone group, disabling share-level security and exposing entire file systems to lateral propagation. These modifications allowed unauthorized and accelerated the worm's dissemination within organizations, often independent of its vector.

Web Server Vulnerabilities

The Nimda worm targeted web servers running Internet Information Services (IIS) version 5.0, exploiting a known vulnerability in the IIS Indexing Service DLL through specially crafted requests to .ida and .idq files, as detailed in Microsoft Security Bulletin MS01-020. This flaw, originally targeted by the II worm earlier in 2001, allowed remote attackers to execute arbitrary commands on unpatched servers without authentication. Upon successful exploitation, Nimda issued commands via the server's , often using TFTP to download the worm's payload (admin.dll) from the attacking host. It then creates backdoors, such as copying to root.exe in web-accessible directories like c:\inetpub\scripts\root.exe, to enable remote execution and further propagation. Once in control, Nimda modified infected websites by appending malicious code to all accessible .htm, .html, and .asp files in the server's directory structure. The injected script, such as <SCRIPT language="jscript">window.open("readme.eml")</SCRIPT>, automatically executed in vulnerable browsers (e.g., Internet Explorer versions affected by MIME-type vulnerabilities) when users visited the altered pages, prompting the download of the worm disguised as an named readme.exe. This technique transformed compromised sites into active infection vectors, redirecting unsuspecting visitors to load and execute the directly from the server. To locate additional targets, Nimda scanned the for vulnerable IIS servers by sending HTTP GET requests probing for specific default files indicative of unpatched installations, including "alltext." and "default.." If these files returned a 200 status or other signs of IIS presence (e.g., responses from /scripts or /msadc directories), the worm attempted the .ida exploit against the host. This method marked Nimda as the first to systematically weaponize modified web content for self-propagation, leveraging end-user browsers as unwitting scanners and distributors within both and environments.

Technical Analysis

Payload and System Modifications

Upon successful , the Nimda worm deploys a that primarily focuses on and persistence rather than data destruction, ensuring no files are deleted or overwritten in a destructive manner. Instead, it creates multiple copies of itself across the infected system, such as placing LOAD.EXE in the Windows system directory (%System%) and MMC.EXE (a renamed copy of the worm) in the same location, along with additional files like RICHED20.DLL and ADMIN.DLL. These copies facilitate further to local drives, shares, and even remote systems via exploited backdoors. To achieve persistence, Nimda modifies system configuration files and registry keys; for instance, it alters the SYSTEM.INI file by appending shell=explorer.exe load.exe –dontrunold to ensure the worm loads on startup, and it adjusts registry entries under HKCU\Software\[Microsoft](/page/Microsoft)\Windows\CurrentVersion\Explorer to hide file extensions and suppress displays of hidden or system files. Additionally, it activates the Guest account with administrator privileges and creates hidden for all local drives (e.g., C, D, ..., Z$) with full access permissions, compromising system security without altering core user data. The worm exhibits rootkit-like behavior by concealing its presence, setting hidden and system attributes on its files (e.g., RICHED20.DLL and LOAD.EXE) to evade casual detection, and infecting .EXE files—excluding WINZIP32.EXE and those exceeding approximately 8 MB—by prepending malicious code and embedding the original executable as a resource. It also targets web documents, appending JavaScript code to .HTML, .HTM, and .ASP files that, when accessed via a browser, prompts the download of README.EXE (another worm copy). These modifications affect a broad range of file types but prioritize executables and server-side scripts for maximum spread. Nimda's operations lead to significant system performance degradation, as it continuously scans for vulnerable targets—such as random addresses for IIS servers—and attempts mass emailing, consuming bandwidth and CPU resources in a manner that mimics denial-of-service effects on both local networks and infected hosts. This relentless activity, including the creation of temporary files like MEP*.TMP during propagation, can slow traffic and overload systems, though the worm includes no intentional destructive elements beyond these disruptive behaviors.

Exploited Security Flaws

The Nimda worm exploited several vulnerabilities in (IIS), including the detailed in Microsoft Security Bulletin MS01-033, which affected the Index Server and Site Server components of IIS versions 4.0 and 5.0 on and systems, such as directory traversal (MS00-052) and improper header handling (MS01-020). This flaw in MS01-033, publicly disclosed and patched in June 2001, involved specially crafted HTTP requests to .ida and .idq extensions that could overflow a , enabling remote code execution with the privileges of the IIS process, typically level. By September 2001, when Nimda emerged, many systems remained unpatched, allowing the worm to scan for and infect vulnerable IIS servers across the . In addition to this primary vector, Nimda leveraged backdoors installed by prior worms, notably Code Red II, which had created unauthorized rootkit-like access points on compromised IIS servers earlier in 2001. The worm probed random IP addresses for these backdoors, using protocols like TFTP to transfer its once detected, exploiting the persistent administrative access left by Code Red II's modifications to system files. Nimda also targeted weak file permissions on open network shares, where default or misconfigured access controls on Windows systems allowed unauthenticated reading and writing, facilitating lateral spread within local networks without authentication. Unlike emerging threats that introduce novel attack surfaces, Nimda employed no zero-day exploits, relying entirely on vulnerabilities that had been known and addressable for months prior to its release. This dependence on established flaws, such as MS01-033 and inherited backdoors, underscored widespread patching deficiencies in environments during 2001, where delayed updates left millions of systems exposed despite available mitigations from .

Spread and Impact

Infection Scale and Timeline

The Nimda worm exhibited one of the fastest propagation rates observed in early , infecting approximately 150,000 computer systems within its first day of detection on September 18, 2001, according to monitoring by the Cooperative Association for Data Analysis (CAIDA). This initial surge was driven by the worm's multifaceted infection vectors, which allowed it to exploit unpatched vulnerabilities in Internet Information Services (IIS) web servers predominantly located on the U.S. East Coast. By the end of September 2001, security experts estimated that Nimda had infected up to 2 million machines worldwide, marking it as a significant global threat before widespread patching efforts curtailed its spread. The worm's timeline began with its emergence in the United States on , 2001, where it rapidly targeted vulnerable servers in eastern regions, leveraging backdoors from prior malware like . Within hours, it expanded overnight to , with reports of infections in countries including and , facilitated by international email and network shares. By September 19, the propagation reached , affecting thousands of business networks as the worm scanned and infected systems across continents via open web connections and shared drives. Infections peaked around September 20 before beginning a decline, with active cases dropping to about one-third of the maximum as organizations applied Microsoft security patches; by late October 2001, prevalence had significantly decreased, leading antivirus firms to lower its threat rating. Corporate networks bore the brunt of the outbreak due to widespread use of unpatched IIS servers, which Nimda exploited to self-propagate across internal shares and external . Sectors such as and were particularly hard-hit in the U.S., where the worm disrupted operations in and public agencies shortly after its release, amplifying vulnerabilities in high-stakes environments reliant on Windows-based infrastructure. This selective impact underscored the worm's efficiency in targeting systems over isolated personal computers.

Economic and Operational Consequences

The Nimda worm inflicted substantial economic damage primarily through cleanup efforts and associated productivity losses, with estimates varying based on the scope of infections and response measures. Network Associates calculated the global economic impact at nearly $531 million shortly after the outbreak, factoring in of approximately two million machines worldwide. Computer Economics later assessed the total cost at $635 million, positioning Nimda as one of the more expensive incidents of its era. These figures encompassed direct remediation expenses, such as scanning and disinfecting systems, as well as from , though no evidence indicates direct financial theft or by the worm. Operationally, Nimda caused widespread disruptions by overwhelming networks with scanning , leading to slowdowns and outages in corporate environments. Many organizations experienced clogged intranets and systems, forcing manual interventions like shutdowns to contain the spread and restore functionality. High-profile victims included Dell's servers, which faced issues, and the Australian Parliament's systems in , highlighting vulnerabilities in both commercial and governmental infrastructures. The worm's rapid propagation exacerbated these effects, with reports of hindered access and reduced overall performance, contributing to lost productivity across affected sectors. Emerging in the immediate aftermath of the , Nimda compounded existing economic strains by heightening demands on IT support teams during a period of national recovery.

Response and Mitigation

Detection Tools and Removal Methods

Early detection of the Nimda worm relied primarily on signature-based antivirus tools from major vendors, which identified the malware through patterns in its executable files and associated artifacts. Symantec's Norton AntiVirus detected infections as W32.Nimda.A@mm by scanning for the worm's primary executable, README.EXE, as well as appended code in modified executables and HTML files across local drives, network shares, and email attachments. Similarly, McAfee's antivirus software flagged Nimda as Generic.dx, targeting the same key indicators including the worm's backdoor components and email-spreading routines during full system scans. These tools required updated virus definitions, often delivered via LiveUpdate mechanisms, to recognize Nimda's variants shortly after its September 2001 outbreak. The standard removal process began with isolating the infected system by disconnecting it from the network to prevent further propagation. Users were advised to boot into safe mode to limit the worm's active processes, then run a full antivirus scan to quarantine and delete infected files. Specific manual steps included deleting core worm components such as README.EXE, ADMIN.DLL, LOAD.EXE (located in %WinDir%\System32), and RICHHED20.DLL (the worm's modified version of the legitimate Windows file), along with temporary files like MEP*.TMP and all .EML or .NWS files scattered across directories. Additionally, editing the SYSTEM.INI file to remove "load.exe -dontrunold" from the full shell line "explorer.exe load.exe -dontrunold" under the [boot] section was essential, as was cleaning the registry by restoring settings in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced (for hidden files and extensions), removing the added Guest account and C$ share from system accounts, and reverting changes in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares\Security. For web content, modified HTML, ASP, and HTM files—appended with JavaScript to propagate the worm—had to be restored from clean backups or have the appended JavaScript code manually removed, as automated tools could not reliably reverse these changes without risking data loss. Symantec provided a dedicated W32.Nimda.A@mm Removal Tool to automate much of this process, executable via a simple download and run on affected Windows systems. In enterprise environments, Nimda's rapid spread across networked servers posed significant cleanup challenges, including the need to coordinate across thousands of machines and address persistent backdoors from prior infections like Code Red II. CERT issued advisory CA-2001-26 outlining detection, patching, and isolation steps to contain the outbreak. Microsoft's patch MS01-033 addressed the exploited IIS .idq vulnerability, closing propagation vectors and aiding in backdoor removal when combined with system reboots. Administrators often deployed custom or vendor-provided scripts to scan and cleanse multiple IIS web servers, targeting infected executables and defaced content en masse, though full remediation frequently required rebuilding compromised hosts to ensure thorough eradication. These efforts highlighted the worm's multi-vector nature, where detection focused on payload modifications like added executables and altered web files to confirm and isolate infections.

Long-Term Security Lessons

The Nimda worm's rapid exploitation of unpatched vulnerabilities in Microsoft Internet Information Services (IIS) underscored the critical importance of timely patching in cybersecurity practices. Following the 2001 outbreak, Microsoft responded by prioritizing software security, implementing the Security Development Lifecycle (SDL) to audit code more rigorously and releasing IIS 6.0 in lockdown mode, where security-sensitive features were disabled by default to reduce exposure. This shift led to enhanced Windows updates, including automatic security patches for consumer editions starting in 2002 and default firewall activation in Windows XP Service Pack 2 in 2004, significantly mitigating similar worm risks thereafter. As a threat blending worm-like propagation with virus-style modifications, Nimda exposed the limitations of traditional signature-based antivirus tools, which struggled against its multi-vector spread via , shares, and servers. This influenced the toward behavior-based detection methods, which analyze activities like unauthorized scanning or alterations to identify unknown variants, as evidenced in subsequent and tools developed in the mid-2000s. Nimda's infection of files further highlighted the risks of compromised digital assets serving as propagation vectors, fostering early awareness of supply-chain-like vulnerabilities in ecosystems where tainted content could infect visitors automatically. This legacy contributed to broader cybersecurity paradigms, including evolving principles like zero-trust models that emphasize continuous verification over implicit network trust to counter lateral movement and multi-path threats. Its ongoing relevance is seen in modern zero-trust architectures, which prioritize explicit and segmentation to address persistent risks from untrusted content and hybrid attacks.

References

  1. [1]
  2. [2]
    None
    ### Summary of Nimda Worm Facts from the Paper
  3. [3]
    The Warnings? | Cyber War! | FRONTLINE - PBS
    Apr 24, 2003 · Nimda, which is "admin" spelled backwards, was a mass-mailing worm that exploited vulnerabilities in Microsoft software. It was notable because ...Missing: facts | Show results with:facts
  4. [4]
    [PDF] Overview of Nimda - GIAC Certifications
    Oct 1, 2001 · Experts say Nimda could inflict more damage than the Code Red worm, which first surfaced in July and cost firms an estimated $2.4 billion in ...
  5. [5]
    [PDF] Nimda Worm - Why It It Different? - GIAC Certifications
    Nov 11, 2001 · It is destructive, it eats up bandwidth, and it spreads rapidly. It exploits numerous vulnerabilities in the target operating systems. The worm ...Missing: facts | Show results with:facts
  6. [6]
    What Is a Computer Worm & How Do You Prevent Them?
    Nimda: Nimda was the first computer worm that modified existing websites to offer malicious downloads.4 It spread by sending mass emails and then began ...
  7. [7]
    W32.Nimda worm spreading fast / PCs infected from China to ...
    Sep 20, 2001 · The worm was first noted seven days, almost to the minute, after last Tuesday's terrorist assault began, but U.S. Attorney General John Ashcroft ...
  8. [8]
    Experts Warn Nimda Worm on the Wiggle - Washington Technology
    Attorney General John Ashcroft said Sept. 18 that the worm, which appeared exactly one week after the terrorist attacks on New York and ...
  9. [9]
    Year's top 10 computer viruses named | Technology - The Guardian
    Nov 28, 2001 · The most widely reported computer viruses of 2001 were Nimda and SirCam, while Code Red - the worm that sparked an unprecedented FBI warning of imminent ...Missing: peak | Show results with:peak
  10. [10]
    2001: the Year of the Worm - Bitdefender
    Dec 2, 2008 · ... worm, called Code Red II struck back in August, but it primarily infected Chinese web servers. On September 18, another worm called Worm.Nimda ...<|control11|><|separator|>
  11. [11]
    A Worm Named Nimda - CBS News
    Sep 18, 2001 · Nimda, the latest computer worm, has taken its show on the road. The virus-like program has been shutting down Internet sites in Norway, Japan and other ...Missing: 9/11 SirCam Symantec
  12. [12]
    CERT Advisory CA-2001-26 - Seclists.org
    Sep 18, 2001 · The Nimda worm has the potential to affect both user workstations (clients) running Windows 95, 98, ME, NT, or 2000 and servers running Windows NT and 2000.
  13. [13]
    SCI/TECH | Nimda virus 'on the wane' - BBC News
    Sep 20, 2001 · ... Worm can spread over the internet. Nimda worm scans webpages for e-mail addresses ... The worm, the name of which spells admin backwards, arrives ...
  14. [14]
    FBI investigates Nimda worm | ZDNET
    Sep 19, 2001 · UPDATE: FBI creates task force to investigate attack by 'Nimda', which hits both servers and PCs running Microsoft software.Missing: concerns | Show results with:concerns
  15. [15]
    Nimda Takes Over The Net - eWeek
    Sep 18, 2001 · TruSecure named the worm after the file name that transports it: W32.nimda.a.mm. The worm was discovered around 9 a.m. and complaints about ...Missing: origin | Show results with:origin
  16. [16]
  17. [17]
    Net-Worm:W32/Nimda | F-Secure
    The first variant in the Net-Worm:W32/Nimda family was found on September 18th, 2001, and quickly spread around the world. Nimda uses the Unicode exploit to ...Missing: 9/11 SirCam reports Symantec
  18. [18]
    Scary Hybrid Internet Worm Loose - WIRED
    Sep 18, 2001 · This worm, named W32/Nimda.A-mm, is dangerously different than virtually all other e-mail and network-borne viruses: It can infect a computer ...
  19. [19]
    Ten years on from Nimda: Worm author still at large - The Register
    Sep 17, 2011 · Saturday marks the tenth anniversary of the infamous Nimda worm. Nimda (admin spelled backwards) was a hybrid worm that spread via infected email attachments.Missing: rumors | Show results with:rumors
  20. [20]
    New Worm Making Way Through the Net - ABC News
    Sep 18, 2001 · Attorney General John Ashcroft said today there was no evidence the worm is linked to last week's terrorist attacks on the World Trade Center ...Missing: rumors | Show results with:rumors
  21. [21]
    More on the W32/Nimda.A@mm worm - CNET
    ... FBI to create a task force to investigate the attack, sources said. Known as Nimda or readme.exe, the worm spreads by sending infected e-mail messages ...
  22. [22]
    [PDF] SAFE Nimda - Cisco
    This document discusses the recently released Concept/Nimda (Nimda) worm/virus and its effect on the network and its hosts. Today a number of technologies ...
  23. [23]
    How to Protect Your Network Against the Nimda Virus - Cisco
    Background Information. For background information on the Nimda worm ... http://www.sarc.com/avcenter/venc/data/w32.nimda.a@mm.html · icon_popup_short ...Missing: origin | Show results with:origin
  24. [24]
    [PDF] A Study of an Actual Nimda Worm Infection on an Enterprise Scale
    Any Microsoft IIS Server version 3.0, 4.09, or 5.0 that was not patched with the service packs released when the vulnerability the worm exploits was first ...Missing: attribution FBI
  25. [25]
    [PDF] NIMDA a Worm with Connections - GIAC Certifications
    The worm, primarily takes advantage of poorly maintained Microsoft software running on computers that are connected to a network. Computers that are easily ...
  26. [26]
    [PDF] W32/Nimda.A.mm Worm Analysis Practical - GIAC Certifications
    Nov 11, 2001 · The W32.Nimda.A@mm is a mass-mailing worm that began spreading on September. 18th, 2001 at 8:30am. This self-propagating worm quickly ...Missing: initial | Show results with:initial
  27. [27]
  28. [28]
    [PDF] The Nimda Worm: An Overview - GIAC Certifications
    Oct 8, 2001 · The goal of this paper is to review how Nimda propagates, focus on the initial vulnerabilities it exploits to enter an organization, and what ...
  29. [29]
    Worm:Win32/Nimda threat description - Microsoft Security Intelligence
    Apr 29, 2008 · The worm also spreads by infecting executable files and by copying itself to local folders, network shares, and remote computers through ...
  30. [30]
    Microsoft Security Bulletin MS01-033 - Critical
    This is a buffer overrun vulnerability. An attacker who successfully exploited this vulnerability could gain complete control over an affected web server.
  31. [31]
  32. [32]
    Nimda winds down; companies recover - CNET
    Sep 20, 2001 · On Tuesday, the day the worm started to spread, the number of infected computer systems detected by CAIDA quickly climbed to a peak of 150,000.
  33. [33]
    TECHNOLOGY; Computers Hit Around Globe By New Form Of Old ...
    Nov 1, 2001 · A new version of a malicious computer program known as Nimda is making its way through the world's computer networks, computer security ...Missing: 9/11 heightened concerns
  34. [34]
  35. [35]
    Stung by Security Flaws, Microsoft Makes Software Safety a Top Goal
    Jan 17, 2002 · ''Using Internet-exposed I.I.S. Web servers securely has a high cost of ownership,'' the report stated. ''Nimda has again shown the high risk of ...
  36. [36]
    [PDF] A Behavior Based Approach to Virus Detection - FIU Digital Commons
    Mar 24, 2008 · Most of the known worms replicate both on a local computer and across networks with a smaller number strictly replicating across networks.
  37. [37]
    Zero Trust strategy—what good looks like - Microsoft
    Nov 11, 2019 · Beginning in the early 2000s, businesses and IT organizations were rocked by worms like ILOVEYOU, Nimda, and SQL Slammer.