Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: LayoutGuru2
Some details from Symantec regarding today's W32.Novarg.A@mm email worm:

Copies itself to KaZaA download directory as one of the following files:


184 posted on 01/26/2004 5:18:20 PM PST by LayoutGuru2 (Hi Daleel, EOM and Andreas Whackered)
[ Post Reply | Private Reply | To 138 | View Replies ]


To: LayoutGuru2
Bump. a widespread fast spreading net attack.

Something to raise paranoia, if even "just" hackers, not jihadis.
186 posted on 01/26/2004 5:35:10 PM PST by swarthyguy
[ Post Reply | Private Reply | To 184 | View Replies ]

To: JustPiper; FairOpinion; tubavil; Reactionary; Oorang; TexKat; yonif; Dog; liz44040; Sabertooth; ...
Additional details from Symantec regarding the W32.Novarg.A@mm (aka Mydoom) email worm:

When a computer is infected, the worm will set up a backdoor into the system by opening TCP ports 3127 through 3198, which can potentially allow an attacker to connect to the computer and use it as a proxy to gain access to its network resources.

In addition, the backdoor can download and execute arbitrary files.

The worm will perform a Denial of Service (DoS) starting on February 1, 2004. It also has a trigger date to stop spreading on February 12, 2004. These two events will only occur if the worm is run between or after those dates.


Notes:

From TrendMicro:

If the system date is later than February 12, 2004, this worm discontinues running all of its routines except its backdoor functionalities.

This worm is packed under UPX. Besides being compressed, the strings inside its body are encrypted.

1,159 posted on 01/28/2004 9:09:37 AM PST by LayoutGuru2 (Hi Daleel, EOM and Andreas Whackered)
[ Post Reply | Private Reply | To 184 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson