Is solve the Code Red problem quickly.
Write a worm that uses the same vulnerability as Code Red to infect a system, scan the IIS logs to find who has been scanning this system, optionally waits a while, then infects them. Then wipes out the local machine.
The purpose of the optional wait is to nail machines with intermittant connections to the internet...
I know someone who says that he is comforted by the fact that he doesn't see people doing things that are nearly as nasty as what he thinks up. I think I am beginning to understand that point of view.
Cheers,
Ben