Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

SoBig.F Packs Few Design Surprises
eWeek ^ | 26, 2003 | Dennis Fisher

Posted on 08/27/2003 6:27:49 AM PDT by FourPeas

Edited on 04/13/2004 2:58:59 AM PDT by Jim Robinson. [history]

It turns out that SoBig.F is even less original than previously thought.

The self-updating capability that had anti-virus experts, users and even the FBI scrambling this weekend was in fact present in some of the earlier versions of the virus, albeit in a somewhat less advanced form.


(Excerpt) Read more at eweek.com ...


TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Extended News; News/Current Events
KEYWORDS: computervirus; sobig; worm

1 posted on 08/27/2003 6:27:49 AM PDT by FourPeas
[ Post Reply | Private Reply | View Replies]

To: FourPeas
I was shocked on August 19, 2003, when SoBigF began to show up on my corporate network.

I actually saw the thing before Symantec had posted def's for its detection. And this scares the heck out of me.

The false impression of being safe and secure in Anti-Virus software was manifested last week. The fact that a bug could spread prior to def's being updated on a corporate network is a big bad wolf, huffing and puffing getting ready to blow the houses down.

I work in a straw house, I recommend you build brick houses.

2 posted on 08/27/2003 6:45:01 AM PDT by Tank-FL (Keep the Faith - GO VMI Beat NAVY)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tank-FL
sircam and klez came out before they had fixes, too. And then, McAfee and Norton each had to re-issue updates to their tools for a few days. It only makes sense, IMO, that the virus is in the wild before a fix is made, otherwise would that mean the companies doing the fixes are associated with its (the viruses) distribution? < /tinfoil >
3 posted on 08/27/2003 6:50:28 AM PDT by RedBloodedAmerican
[ Post Reply | Private Reply | To 2 | View Replies]

To: RedBloodedAmerican
It is just in the past they were discovered and def's were posted in really short order. This is the first time in you 20+ years in IT that I got infections prior to def's being posted.

With my past employer I used a vendor from Norway. For logical reasons this company seemed to be hours ahead of the U.S. companies. I just never had this happen before.

4 posted on 08/27/2003 6:56:44 AM PDT by Tank-FL (Keep the Faith - GO VMI Beat NAVY)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Tank-FL
If you are a security type, come in early and look at Hong Kong. They get the viruses first it seems. Then you can delete them from the Exchange server.
5 posted on 08/27/2003 6:58:49 AM PDT by AppyPappy (If You're Not A Part Of The Solution, There's Good Money To Be Made In Prolonging The Problem.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: AppyPappy
How hard would it be to track original hackers down and 'delete' them?
6 posted on 08/27/2003 7:04:36 AM PDT by budwiesest (Gladly: The cross-eyed bear.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: AppyPappy
This works only if a network isn't global, otherwise they just get in when the Hong Kong office opens for business.
7 posted on 08/27/2003 7:45:58 AM PDT by FourPeas
[ Post Reply | Private Reply | To 5 | View Replies]

To: FourPeas
Alright -- if this is true, then where were those 20 machines? Who owned/maintained them?
8 posted on 08/27/2003 7:48:11 AM PDT by RonF
[ Post Reply | Private Reply | To 1 | View Replies]

To: FourPeas
You can check with Hong Kong security admins. They generally see them first because they are hours ahead of us. With email viruses, you can just delete them before anyone gets to work.
9 posted on 08/27/2003 7:57:33 AM PDT by AppyPappy (If You're Not A Part Of The Solution, There's Good Money To Be Made In Prolonging The Problem.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: RonF
I've not seen a answer to that ten thousand dollar question. It all seems to be quite hush-hush.
10 posted on 08/27/2003 8:51:33 AM PDT by FourPeas
[ Post Reply | Private Reply | To 8 | View Replies]

To: AppyPappy
That assumes that there *are* HK security admins and that the network is not administered from the states. It also assumes that the network admins have a clue. I'm not sure either one is a valid assumption.
11 posted on 08/27/2003 9:01:07 AM PDT by FourPeas
[ Post Reply | Private Reply | To 9 | View Replies]

To: RonF
Those 20 machines were infected as well... I do not believe the owners had a clue.
12 posted on 08/27/2003 9:07:12 AM PDT by bigcheese (And the geeks shall internet the earth...)
[ Post Reply | Private Reply | To 8 | View Replies]

To: FourPeas
That's what we did. We checked the HK websites, found the virus parameters and used them to clean Exchange.
13 posted on 08/27/2003 11:08:16 AM PDT by AppyPappy (If You're Not A Part Of The Solution, There's Good Money To Be Made In Prolonging The Problem.)
[ Post Reply | Private Reply | To 11 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson