W32/Nimda-A worm A new worm named W32/Nimda-A (known aliases are Nimda, Minda, Concept Virus, Code Rainbow) began to proliferate the morning of September 18, 2001 on an extremely large scale. It utilizes multiple IIS vulnerabilities to propagate via the web, and Outlook and Outlook Express vulnerabilities to distribute itself through email.


Warning: Trying to access array offset on value of type bool in /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-social-sharing/includes/class-public.php on line 81

It spreads through three different means; as an email attachment, a web defacement download, and by directly targeting machines by exploiting known IIS vulnerabilities such as the ones exploited by Code Red and Code Blue. There has been one report thus far of an Apache Server crashing due to Nimda terminating httpd processes. No further corroboration has been made that this worm may have in the inadvertent affect of creating a denial of service condition on Apache Servers.

Multiple sources have confirmed that this worm consumes a large amount of bandwidth and impairs performance on web servers as a result. It should be noted that this worm began to proliferate almost exactly a week since the terrorist activities began to take place in the United States.

Leave a Reply

Your email address will not be published.

Enter Captcha Here : *

Reload Image


Fatal error: Uncaught TypeError: implode(): Argument #2 ($array) must be of type ?array, string given in /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-rocket/vendor/matthiasmullie/minify/src/CSS.php:518 Stack trace: #0 /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-rocket/vendor/matthiasmullie/minify/src/CSS.php(518): implode() #1 /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-rocket/vendor/matthiasmullie/minify/src/CSS.php(311): MatthiasMullie\Minify\CSS->shortenHex() #2 /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-rocket/vendor/matthiasmullie/minify/src/Minify.php(111): MatthiasMullie\Minify\CSS->execute() #3 /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-rocket/inc/classes/subscriber/Optimization/class-minify-html-subscriber.php(86): MatthiasMullie\Minify\Minify->minify() #4 /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-rocket/inc/vendors/classes/class-minify-html.php(212): WP_Rocket\Subscriber\Optimization\Minify_HTML_Subscriber->minify_inline_css() #5 [internal function]: Minify_HTML->_removeStyleCB() #6 /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-rocket/inc/vendors/classes/class-minify-html.php(110): preg_replace_callback() #7 /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-rocket/inc/vendors/classes/class-minify-html.php(48): Minify_HTML->process() #8 /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-rocket/inc/classes/subscriber/Optimization/class-minify-html-subscriber.php(73): Minify_HTML::minify() #9 /var/www/vhosts/bitstop.ph/httpdocs/wp-includes/class-wp-hook.php(307): WP_Rocket\Subscriber\Optimization\Minify_HTML_Subscriber->process() #10 /var/www/vhosts/bitstop.ph/httpdocs/wp-includes/plugin.php(191): WP_Hook->apply_filters() #11 /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-rocket/inc/front/process.php(268): apply_filters() #12 [internal function]: do_rocket_callback() #13 /var/www/vhosts/bitstop.ph/httpdocs/wp-includes/functions.php(5277): ob_end_flush() #14 /var/www/vhosts/bitstop.ph/httpdocs/wp-includes/class-wp-hook.php(307): wp_ob_end_flush_all() #15 /var/www/vhosts/bitstop.ph/httpdocs/wp-includes/class-wp-hook.php(331): WP_Hook->apply_filters() #16 /var/www/vhosts/bitstop.ph/httpdocs/wp-includes/plugin.php(476): WP_Hook->do_action() #17 /var/www/vhosts/bitstop.ph/httpdocs/wp-includes/load.php(1102): do_action() #18 [internal function]: shutdown_action_hook() #19 {main} thrown in /var/www/vhosts/bitstop.ph/httpdocs/wp-content/plugins/wp-rocket/vendor/matthiasmullie/minify/src/CSS.php on line 518