Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Computer Virus Alert
corporate e-mail | 8/19/03 | CaptRon

Posted on 08/19/2003 2:13:28 PM PDT by CaptRon

We just received the following e-mail and I thought I should alert my fellow Freepers:

[Our] IT Organization has been alerted to a Microsoft Windows exposure, separate from last week's alert, that could potentially be exploited to cause destructive behavior in our network. We are not currently aware of any viruses or malicious software that specifically exploit the exposure. However, we are taking precautionary measures to protect our environment. This includes the roll out of a Microsoft-supplied corrective patch to all Windows Servers, desktops, and laptops. Additionally, given that the exposure involves the activation of sound or music files, we are blocking the .MID and .MIDI attachments in both Exchange and Internet e-mail. Internet Proxy already blocks any active components that include .MID or .MIDI Files.


TOPICS: Miscellaneous; Technical
KEYWORDS: computervirus

1 posted on 08/19/2003 2:13:28 PM PDT by CaptRon
[ Post Reply | Private Reply | View Replies]

To: CaptRon
Don't worry, Arnold will solve this and every other problem with his policy statement tomorrow. Stay tuned.
2 posted on 08/19/2003 2:14:30 PM PDT by ElkGroveDan (It's time for Arnold to stop splitting the Republican vote and step aside for the good of the party)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CaptRon
W32.Welchia.worm?
3 posted on 08/19/2003 2:15:31 PM PDT by FourPeas
[ Post Reply | Private Reply | To 1 | View Replies]

To: CaptRon
"Where did you think you were going today?"
4 posted on 08/19/2003 2:15:36 PM PDT by Redcloak (All work and no FReep makes Jack a dull boy. All work and no FReep make s Jack a dul boy. Allwork an)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CaptRon
Yeah... Our server was down (here atwork) for about 3 hours as they struggled to dislodge it. We're back up and running. I wonder if this isn't Cyber-terrorism by the wackos of Al Qaeda... or DU(mp)
5 posted on 08/19/2003 2:18:50 PM PDT by bedolido (None of us is as dumb as all of us!)
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #6 Removed by Moderator

To: CaptRon
Evidently, this refers to the the DirectX problem that was patched about about a month ago. Why do you waste bandwidth to serve those too stupid/lazy to update their operating system?
7 posted on 08/19/2003 2:23:24 PM PDT by mdefranc
[ Post Reply | Private Reply | To 1 | View Replies]

To: CaptRon
I received about sixty of these today so far:
Return-Path: 
X-Original-To: xxxxxx@xxxxxx.xxx
Delivered-To: xxxxxx@xxxxxx.xxx
Received: from RRPOLICE (unknown [207.193.189.127])
	by xxxx.xxxxxx.xxx (Postfix) with ESMTP id AAB688215C
	for ; Tue, 19 Aug 2003 14:04:58 -0500 (CDT)
From: 
To: 
Subject: Your details
Date: Tue, 19 Aug 2003 14:04:56 --0500
X-MailScanner: Found to be clean
Importance: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MSMail-Priority: Normal
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary="_NextPart_000_145BF55A"
Message-Id: <20030819190458.AAB688215C@xxxx.xxxxxx.xxx>
X-UIDL: #(<!!Qp]"!_D?"!Q,="!

This is a multipart message in MIME format

--_NextPart_000_145BF55A
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

Please see the attached file for details.
--_NextPart_000_145BF55A
Content-Type: application/octet-stream;
	name="your_details.pif"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="your_details.pif"

8 posted on 08/19/2003 2:30:53 PM PDT by _Jim (First INDICT the ham sandwhich ... the next step is to CONVICT it ...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: _Jim
Symantec's web site is reporting it as a new variant of the SoBig worm. This one is SoBig-F.
9 posted on 08/19/2003 2:33:54 PM PDT by hchutch (The National League needs to adopt the designated hitter rule.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: All
http://www.freerepublic.com/focus/f-news/966599/posts
10 posted on 08/19/2003 2:39:42 PM PDT by TheBigB (Some say shoot to kill. Others say shoot to maim. I say empty the f'n clip and let God make the call)
[ Post Reply | Private Reply | To 9 | View Replies]

To: hchutch
Yup Sobig-F!

http://www.enterpriseitplanet.com/security/news/article.php/3065721

Dangerous new variant of Sobig family spreading
August 19, 2003

Several security vendors Tuesday issued alerts for W32/Sobig-F, a worm that spreads via email and network shares. W32/Sobig-F copies itself to the Windows folder as winppr32.exe and sets one of the following registry entries:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\TrayX
= \winppr32.exe /sinc
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\TrayX
=

The worm sends itself, using its own SMTP engine, as an attachment to email addresses collected from various files on the victim's computer. When it distributes itself via email it forges the sender's email address, making it difficult to know who is truly infected.

The email has the following format:

Subject line: Chosen from -
Re: That movie
Re: Wicked screensaver
Re: Your application
Re: Approved
Re: Re: My details
Re: Details
Your details
Thank you!

Message text: Chosen from -
Please see the attached file for details.
See the attached file for details
Attached file: Chosen from -
movie0045.pif
wicked_scr.scr
application.pif
document_9446.pif
details.pif
your_details.pif
thank_you.pif
document_all.pif
your_document.pif

W32/Sobig-F also attempts to spread by copying itself to Windows network shares and uses the Network Time Protocol to one of several servers in order to determine the current date and time. If the date is September 10 2003 or later the worm stops working.

According to Panda Software's Virus Laboratory, Sobig.F can only infect computers if the user runs the file carrying the worm. Detailed information about Sobig.F and other malicious code is available from Panda Software's Virus Encyclopedia here

MessageLabs has also intercepted several copies of the mass-mailing virus, which it has identified as W32/Sobig.F-mm. The initial copies all originated from the United States.

Name: W32/Sobig.F-mm
Number of copies intercepted so far: 1,124 (increasing rapidly)
Most active country: United States (95%), Denmark (3%), Norway (1%)

Initial analysis would suggest that Sobig.F is a mass-emailing virus that is spreading very vigorously. Sobig.F appears to be polymorphic in nature and the email from: address is also spoofed and may not indicate the true identity of the sender. In earlier versions of the Sobig family, the file extension has sometimes been truncated. MessageLabs have not yet observed this with the Sobig.F strain.

In an attempt to bypass local antivirus security, the file size varies on each generation reminiscent of Yaha by appending rubbish to the end of the file, but is on average around 74kb in size. The initial copies are packed using TELock, but there may be other variants in the wild packed using different packers.

For further information, please visit the MessageLabs web site here

According to Trend Micro, Sobig.F may spoof the FROM field using email addresses found on the infected machine so that its email messages appear to originate from one source but was actually sent from another.

This worm runs on Windows 95, 98, ME, NT, 2000, and XP. Read technical details at this Trend Micro page.

W32/Dumaru@MM Pretends to Have IE Patch

This mass mailing worm has been proactively detected with internal heuristics as "virus or variant of New Malware-b" with the 4.2.40 engine and 4239 DAT combination (or greater) since 12/23/2002.

The worm uses its own SMTP engine to email itself in the following format:

From: "Microsoft" security@microsoft.com
Subject: Use this patch immediately!
Attachment: patch.exe
Message Text: Dear friend, use this Internet Explorer patch now!
There are dangerous virus in the Internet now!
More than 500.000 already infected!

The worm trawls the hard disk for files with extensions .htm .wab .html .dbx .tbb .abd for email addresses to send itself to. These email addresses are written to file winload.log. A password stealer component is dropped by this worm, which is detected as PWS-Narod. Read more at this Network Associates page.

According to Sophos, W32/Dumaru-A spreads using email and infects other executable using NTFS Alternate Data Stream.

When the attachment is run W32/Dumaru-A copies itself into the Windows folder as dllreg.exe and into the Windows system folder as load32.exe and vxdmgr32.exe. W32/Dumaru-A drops and runs \windrv.exe. Windrv.exe is a backdoor Trojan detected by Sophos Anti-Virus as Troj/Narod-B.

The virus creates the registry value load32 of the registry key:
\HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
so that the virus file \load32.exe is run on Windows startup.

W32/Dumaru-A also changes system files system.ini and win.ini. The shell entry of the boot section in System.ini is changed so that it contains the reference to the virus file vxdmgr32 in the Windows systrem folder.

The virus creates a run entry in the windows section of win.ini to reference the virus file dllreg.exe in the Windows folder. W32/Dumaru-A has its own SMTP engine and attempts to collect email addresses by searching the content of files with the extensions WAB, HTM, HTML, DBX, ABD and TBB. Read more at this Sophos page.

According to Trend Micro, Dumaru-A infects .EXE files using Alternate Data Stream (ADS). It searches the entire system for target executables but is only able to infect files in the root directory.

This virus propagates via email using its own Simple Mail Transfer Protocol (SMTP) engine. More information is at this Trend Micro page.

W32.Welchia.Worm Exploits Several Vulnerabilities

W32.Welchia.Worm:


11 posted on 08/19/2003 2:51:32 PM PDT by _Jim (First INDICT the ham sandwhich ... the next step is to CONVICT it ...)
[ Post Reply | Private Reply | To 9 | View Replies]

To: mdefranc
I received this from my company's IT center. I do not waste bandwidth. If I thought I was I would not have posted it. I do not need you to educate me on netiquette.
12 posted on 08/19/2003 8:55:02 PM PDT by CaptRon
[ Post Reply | Private Reply | To 7 | View Replies]

FREE PC PROTECTION:

13 posted on 08/23/2003 5:44:02 AM PDT by martin_fierro (A v v n c v l v s M a x i m v s)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CaptRon; _Jim; Eaker; harpseal
Thanks for posting this Capt Ron. I run grisoft AVG and Norton Corp Edition AV software and this dang thing still got my puter pukin. Also running Zone alarm and adware's latest. I am getting the same messages that _jim is getting above in my e-mail.

I have run the Norton fixes to rid myself of the sobig f and it said I didn't have the sobig as the e-mails I got suggested. Yet now I have something called Win32.HLLM.Reteras ??. Also all the latest updates and fixes from Mr Gates Inc............

The e-mails such as _Jim describes. Is that a one time deal if I have run all my AV software, updated and as extensive as one can get from a laptop. Or do I need to do more on this subject ?

Stay Safe !

14 posted on 08/31/2003 6:30:53 PM PDT by Squantos (Cum catapultae proscriptae erunt tum soli proscript catapultas habebunt.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: CaptRon
As of 9/18/03 they are emailing very official-looking Microsoft notifications with attachments that are supposedly patches. Don't fall for it. Virus checkers didn't catch it. They may now that some have been updated.

Only go to Microsoft's official website for critical updates.

Did anybody post anything about this latest threat? I searched and didn't find anything.

15 posted on 09/19/2003 7:30:41 AM PDT by Aliska
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson