Posted on 11/22/2005 5:33:41 PM PST by Eagle9
W32/Sober Revisited
added November 22, 2005 | updated November 22, 2005
US-CERT is aware of several new variants of the W32/Sober virus that propagate via email. As with many viruses, these variants rely on social engineering to propagate. Specifically, the user must click on a link or open an attached file.
A recent variant sends messages that appear to be from the CIA or FBI, while a German version appears to be coming from the Bundeskriminalamt (BKA), the German Federal police service. US-CERT encourages users to review the appropriate alert below:
FBI ALERTS PUBLIC TO RECENT E-MAIL SCHEME
BKA warnt vor gefälschten E-Mails mit BKA-Absender - Variante des Sober-Wurms
These new variants of the W32/Sober virus identified above share common characteristics listed below. Once infected, the malicious code may:
Although each variant has different functionality, the list below contains a subset of the common characteristics found in previous variants. Once a system is infected, the malicious code may:
US-CERT strongly encourages users to install anti-virus software, and keep its virus signature files up-to-date.
Additionally, US-CERT strongly encourages users not to follow unknown links, even if sent by a known and trusted source. You may also wish to visit the US-CERT Computer Virus Resources.
___________________________________________________________
We continue to receive reports about new Sober variants. Thanks to Chris M. for supplying a very comprehensive list of links (see below). the CME system assigned these variants the ID CME-681.
IMPORTANT: Antivirus software does not provide any reliable protection against current threats. Viruses like Sober tend to change every few hours well in advance of AV signature updates. The fact that an attachment did not get marked is no indication that it is harmless. We do receive reports of up to date versions of AV software missing some of the recent Sober variants.
Sober is now considered the "largest virus outbreak of the year" according to F-Secure (thanks Matthias J. for pointing this out). It looks like the fake FBI e-mails are working for them.
Note from reader Marc R: Please do not have your AV software reply to viruses. All commonly seen viruses use fake 'From:' headers. Rumor has it that fbi.gov is having a hard time keeping up with all the bounces in the first place.
One not of interested: We had another Sober outbreak last year in June, around the same time we had the "Download.ject". Download.Ject (aka Berbew) used a Internet Explorer 0-day exploit to download and install a trojan. A number of well known, trusted, web sites had been compromissed and spread the trojan.
None of these does anything new or fancy. They all try to trick users into executing the attached ZIP file. The best defense at this point is probably to strip ZIP file attachments.
The subjects and the body text vary widely. Many of them suggest that the attachment was sent by some government authority (FBI, CIA) and requests that you open it in order to verify some charges brought against you. A version in German refers to the 'BKA' (German equivalent of FBI). Other versions claim to be sent by banks and ask you to open an attachment to verify account details.
List of Links:
Symantec (Level 3 risk) W32.Sober.X@mm
http://securityresponse.symantec.com/avcenter/venc/data/w32.sober.x@mm.html
McAfee (currently Low risk) W32/Sober@MM!M681
http://vil.nai.com/vil/content/v_137072.htm
Trend Micro (Medium risk) WORM_SOBER.AG
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM%5FSOBER%2EAG
F-Secure (Radar Level 2) Sober.Y
http://www.f-secure.com/v-descs/sober_y.shtml
Sophos (low risk) W32/Sober-{X, Z}
http://www.sophos.com/virusinfo/analyses/w32soberx.html
http://www.sophos.com/virusinfo/analyses/w32soberz.html
Computer Associates (Medium risk) Win32.Sober.W
http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=49473
Panda Antivirus (Medium risk) Sober.Y
http://www.pandasoftware.com/virus_info/encyclopedia/overview.aspx?IdVirus=92673&sind=0
Imagine getting a message in your email that says, "I'm from the government and I'm here to help you."
How gullible do you have to be?
Caught 335 of these coming into our system in the last 12 hours (and counting!)
I got 4 or 5 emails today with Sober.x attachments. They must be coming from either a customer or a supplier to our company. (The spoofed addresses are from other companies in our industry.) I've been getting the "Here's your password and username" versions of the worm.
Gullah bull vs. gullible. As in gullah bull warning.
I got one from admin@fbi.gov yesterday, saying that "We have logged your IP-address on more than 30 illegal Websites." Oddly, I scanned the attachment for viruses but it came up negative. If it was Sober, it must have been different enough from older versions to fool Norton AV.
I deleted the message in any case without opening the attachment, which I would do with any suspicious attachment.
I just now got one of these while checking my mail. The subject was "Your IP has been logged" from cia.gov - glad I didn't open it.
I never open that stuff.
I am a federal employee and when I got to work this morning, I checked my work email and sure enough, that is exactly the message I got. It had a zip file - but I knew better than to open it - since the message was not addressed to me, specifically. I was worried, too cuz I had logged onto this freerepublic! LOL..... Now I can be at ease.
I have received at least 20 of these e-mails in the past 24 hrs on my home computer....
Unbelievable.
I've never had good luck with Norton. I use EZ Armor. I got 5 or 6 of those emails this morning and EZ Armor alerted me that they were a high level threat. I cleaned my cache, deleted my cookies and my temporary internet files. I don't know if that eliminated whatever it was that was causing me to get the emails, but I haven't gotten one since.
This one seems to be spreading fast. This afternoon our AV system had nabbed over 200 of them, and counting. No infections inside so far.
I've had my main email address for a long time, and I hate to change it. Most spam comes because you have posted in a forum online some time in the past, or have gotten on someone's email list that was sold and got into the public domain.
I'd say it's a good idea to delete the temp internet files fairly often. I don't delete my cookies because some of them have data I need to access sites where I am registered, but I do comb through them once in a while and weed them out.
CT Cookie Spy allows you to easily see what you have and delete what you don't want. And Norton and AdAware deal with most of the malign cookies.
I havent received any on my home computer - so far.
None of those things affect whether you get sent the messages. That's caused by someone else being infected and sending you the email messages.
The infected computer will, therefore belong to somebody that has your email address in their address book. That's where the worm finds addresses to send to.
There was a thread at DU from a guy that really thought the FBI was watching him. Now ~that's~ funny.
Remember when I said "just delete it?"
This is why.
LOL... priceless.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.