W32/Sober Revisited
added November 22, 2005 | updated November 22, 2005
US-CERT is aware of several new variants of the W32/Sober virus that propagate via email. As with many viruses, these variants rely on social engineering to propagate. Specifically, the user must click on a link or open an attached file.
A recent variant sends messages that appear to be from the CIA or FBI, while a German version appears to be coming from the Bundeskriminalamt (BKA), the German Federal police service. US-CERT encourages users to review the appropriate alert below:
FBI ALERTS PUBLIC TO RECENT E-MAIL SCHEME
BKA warnt vor gefälschten E-Mails mit BKA-Absender - Variante des Sober-Wurms
These new variants of the W32/Sober virus identified above share common characteristics listed below. Once infected, the malicious code may:
Although each variant has different functionality, the list below contains a subset of the common characteristics found in previous variants. Once a system is infected, the malicious code may:
US-CERT strongly encourages users to install anti-virus software, and keep its virus signature files up-to-date.
Additionally, US-CERT strongly encourages users not to follow unknown links, even if sent by a known and trusted source. You may also wish to visit the US-CERT Computer Virus Resources.
___________________________________________________________
We continue to receive reports about new Sober variants. Thanks to Chris M. for supplying a very comprehensive list of links (see below). the CME system assigned these variants the ID CME-681.
IMPORTANT: Antivirus software does not provide any reliable protection against current threats. Viruses like Sober tend to change every few hours well in advance of AV signature updates. The fact that an attachment did not get marked is no indication that it is harmless. We do receive reports of up to date versions of AV software missing some of the recent Sober variants.
Sober is now considered the "largest virus outbreak of the year" according to F-Secure (thanks Matthias J. for pointing this out). It looks like the fake FBI e-mails are working for them.
Note from reader Marc R: Please do not have your AV software reply to viruses. All commonly seen viruses use fake 'From:' headers. Rumor has it that fbi.gov is having a hard time keeping up with all the bounces in the first place.
One not of interested: We had another Sober outbreak last year in June, around the same time we had the "Download.ject". Download.Ject (aka Berbew) used a Internet Explorer 0-day exploit to download and install a trojan. A number of well known, trusted, web sites had been compromissed and spread the trojan.
None of these does anything new or fancy. They all try to trick users into executing the attached ZIP file. The best defense at this point is probably to strip ZIP file attachments.
The subjects and the body text vary widely. Many of them suggest that the attachment was sent by some government authority (FBI, CIA) and requests that you open it in order to verify some charges brought against you. A version in German refers to the 'BKA' (German equivalent of FBI). Other versions claim to be sent by banks and ask you to open an attachment to verify account details.
List of Links:
Symantec (Level 3 risk) W32.Sober.X@mm
http://securityresponse.symantec.com/avcenter/venc/data/w32.sober.x@mm.html
McAfee (currently Low risk) W32/Sober@MM!M681
http://vil.nai.com/vil/content/v_137072.htm
Trend Micro (Medium risk) WORM_SOBER.AG
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM%5FSOBER%2EAG
F-Secure (Radar Level 2) Sober.Y
http://www.f-secure.com/v-descs/sober_y.shtml
Sophos (low risk) W32/Sober-{X, Z}
http://www.sophos.com/virusinfo/analyses/w32soberx.html
http://www.sophos.com/virusinfo/analyses/w32soberz.html
Computer Associates (Medium risk) Win32.Sober.W
http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=49473
Panda Antivirus (Medium risk) Sober.Y
http://www.pandasoftware.com/virus_info/encyclopedia/overview.aspx?IdVirus=92673&sind=0
Imagine getting a message in your email that says, "I'm from the government and I'm here to help you."
How gullible do you have to be?
Caught 335 of these coming into our system in the last 12 hours (and counting!)
I got 4 or 5 emails today with Sober.x attachments. They must be coming from either a customer or a supplier to our company. (The spoofed addresses are from other companies in our industry.) I've been getting the "Here's your password and username" versions of the worm.
I got one from admin@fbi.gov yesterday, saying that "We have logged your IP-address on more than 30 illegal Websites." Oddly, I scanned the attachment for viruses but it came up negative. If it was Sober, it must have been different enough from older versions to fool Norton AV.
I deleted the message in any case without opening the attachment, which I would do with any suspicious attachment.
I just now got one of these while checking my mail. The subject was "Your IP has been logged" from cia.gov - glad I didn't open it.
I am a federal employee and when I got to work this morning, I checked my work email and sure enough, that is exactly the message I got. It had a zip file - but I knew better than to open it - since the message was not addressed to me, specifically. I was worried, too cuz I had logged onto this freerepublic! LOL..... Now I can be at ease.
This one seems to be spreading fast. This afternoon our AV system had nabbed over 200 of them, and counting. No infections inside so far.
Remember when I said "just delete it?"
This is why.
I've gotten at least 10 infected e-mails, FBI,CIA, and a few other ad's.
Trend Micro has caught all of them.
One of the secretaries at work got this today. She figured out it was nonsense and deleted it. We're proud of our users sometimes :-)
My wife got that email. She said "what do you think about that?" and I said, "well, do you REALLY think that if we were involved in something important to have the fbi contact us, that they would contact us by email?" she got a real weird look on her face and then burst out laughing. I said "go ahead and click on that zip file attachment" She said, "nothing happened" I said "THAT's why we run linux, babe."