University of Rochester

Firewall Home

University IT Home

IT Notices


About Us



Contact Us

Intrusion Example


More Information

Firewall Home

Solutions for Securing your Network

Budget Requirements

Service or Consultation Request

Firewall Configuration Change Request




Bugbear worm


The Bugbear worm, which looked for port 37 (netbios name server) to exploit, comes to a computer as an email attachment that can be executed. When it is executed, it then uses the email addresses found on the computer to mail itself to others. It also collects information from the computer, including information entered at the keyboard, and sends it to others and the attacker. Bugbear and its variations can also attempt to disable antivirus and firewall software applications. It is the nature of the way it spreads that makes it a 'worm'.







Text | Directory | Index | Contact | Calendar | News | Giving

Last Modified: Friday, 20-Sep-2013 10:51:38 EDT