Morto attempts to compromise Remote Desktop connections in order to penetrate remote systems, by exploiting weak administrator passwords. Once a new system is compromised, it connects to a remote server in order to download additional information and update its components. It also terminates processes for locally running security applications in order to ensure its activity continues uninterrupted. Affected users should note that a reboot may be required in order to complete the cleaning process.
This particular worm highlights the importance of setting strong system passwords. Using strong passwords can go a long way towards protecting your environment — and the ability of attackers to exploit weak passwords shouldn't be underestimated. For example, Morto tries the following passwords:
When creating strong passwords, remember that the key to a strong password is length and complexity. Here's a few tips to keep in mind:
- An ideal password is long and has letters, punctuation, symbols, and numbers.
- Whenever possible, use at least 14 characters or more.
- The greater the variety of characters in your password, the better.
- Use the entire keyboard, not just the letters and characters you use or see most often.
For more advice on creating (and remembering) strong passwords, visit my Safety and Security Center.
For your information here are some examples of files that are being detected as Win32/Morto: