Skip to comments.
SoBig.F Packs Few Design Surprises
eWeek ^
| 26, 2003
| Dennis Fisher
Posted on 08/27/2003 6:27:49 AM PDT by FourPeas
Edited on 04/13/2004 2:58:59 AM PDT by Jim Robinson.
[history]
It turns out that SoBig.F is even less original than previously thought.
The self-updating capability that had anti-virus experts, users and even the FBI scrambling this weekend was in fact present in some of the earlier versions of the virus, albeit in a somewhat less advanced form.
(Excerpt) Read more at eweek.com ...
TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Extended News; News/Current Events
KEYWORDS: computervirus; sobig; worm
1
posted on
08/27/2003 6:27:49 AM PDT
by
FourPeas
To: FourPeas
I was
shocked on August 19, 2003, when SoBigF began to show up on my corporate network.
I actually saw the thing before Symantec had posted def's for its detection. And this scares the heck out of me.
The false impression of being safe and secure in Anti-Virus software was manifested last week. The fact that a bug could spread prior to def's being updated on a corporate network is a big bad wolf, huffing and puffing getting ready to blow the houses down.
I work in a straw house, I recommend you build brick houses.
2
posted on
08/27/2003 6:45:01 AM PDT
by
Tank-FL
(Keep the Faith - GO VMI Beat NAVY)
To: Tank-FL
sircam and klez came out before they had fixes, too. And then, McAfee and Norton each had to re-issue updates to their tools for a few days. It only makes sense, IMO, that the virus is in the wild before a fix is made, otherwise would that mean the companies doing the fixes are associated with its (the viruses) distribution? < /tinfoil >
To: RedBloodedAmerican
It is just in the past they were discovered and def's were posted in really short order. This is the first time in you 20+ years in IT that I got infections prior to def's being posted.
With my past employer I used a vendor from Norway. For logical reasons this company seemed to be hours ahead of the U.S. companies. I just never had this happen before.
4
posted on
08/27/2003 6:56:44 AM PDT
by
Tank-FL
(Keep the Faith - GO VMI Beat NAVY)
To: Tank-FL
If you are a security type, come in early and look at Hong Kong. They get the viruses first it seems. Then you can delete them from the Exchange server.
5
posted on
08/27/2003 6:58:49 AM PDT
by
AppyPappy
(If You're Not A Part Of The Solution, There's Good Money To Be Made In Prolonging The Problem.)
To: AppyPappy
How hard would it be to track original hackers down and 'delete' them?
6
posted on
08/27/2003 7:04:36 AM PDT
by
budwiesest
(Gladly: The cross-eyed bear.)
To: AppyPappy
This works only if a network isn't global, otherwise they just get in when the Hong Kong office opens for business.
7
posted on
08/27/2003 7:45:58 AM PDT
by
FourPeas
To: FourPeas
Alright -- if this is true, then where were those 20 machines? Who owned/maintained them?
8
posted on
08/27/2003 7:48:11 AM PDT
by
RonF
To: FourPeas
You can check with Hong Kong security admins. They generally see them first because they are hours ahead of us. With email viruses, you can just delete them before anyone gets to work.
9
posted on
08/27/2003 7:57:33 AM PDT
by
AppyPappy
(If You're Not A Part Of The Solution, There's Good Money To Be Made In Prolonging The Problem.)
To: RonF
I've not seen a answer to that ten thousand dollar question. It all seems to be quite hush-hush.
10
posted on
08/27/2003 8:51:33 AM PDT
by
FourPeas
To: AppyPappy
That assumes that there *are* HK security admins and that the network is not administered from the states. It also assumes that the network admins have a clue. I'm not sure either one is a valid assumption.
11
posted on
08/27/2003 9:01:07 AM PDT
by
FourPeas
To: RonF
Those 20 machines were infected as well... I do not believe the owners had a clue.
12
posted on
08/27/2003 9:07:12 AM PDT
by
bigcheese
(And the geeks shall internet the earth...)
To: FourPeas
That's what we did. We checked the HK websites, found the virus parameters and used them to clean Exchange.
13
posted on
08/27/2003 11:08:16 AM PDT
by
AppyPappy
(If You're Not A Part Of The Solution, There's Good Money To Be Made In Prolonging The Problem.)
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson