Forum Moderators: phranque
Greetings,
Herenvardö
Simply download it and drag it to the program it's supposed to be open with, and it won't be able to exe, only will be read.
This will NOT protect you from all viruses.
Some viruses (for instance Word macro viruses) want you to open them in the "program it's supposed to be opened with" - that is how they spread.
Many emails are coming to address@mydomain.com - yet the only place that this email appears is in the message header of emails we send & I think about 5 have been sent in total with that address so why might that domain be getting hammered?
All clues welcome :)
J
I have a manager here who runs the mail on the night shift.. i just KNOW he is going to click on it.. he just cannot resist.. i hope the virus software he has caught it, or i am going to do some mopping up today. (sigh)
So an online virus check is turning this thing up all over my system. The boss says he didn't open anything in the mail, but let's see... yes, I want to bed yesterday long before this thing started to hit, and I found tons of infected mail this morning... some of them already opened.
Oh well, looks like Monday all over again.
Thank goodness I'm not the paranoid type, I might be feeling like someone was out to ruin my day :)
grandpa
McAfee calls theirs "W32/Mydoom@MM"
Remote Access ComponentThe worm (this functionality is in the dropped DLL) opens a connection on TCP port 3127 (if that fails it opens next available port up to port 3198). The worm can accept a specially crafted TCP transmissions. On receipt of one kind of such a transmission it will save the embedded binary into a temporary file and execute it. Then the temporary file is deleted.
Denial of Service Payload
On the first system startup on February 1st or later, the worm changes its behavior from mass mailing to initiating a denial of service attack against the sco.com domain. This denial of service attack will stop on the first system startup of February 12th or later, and thereafter the worm's only behavior is to continue listening on TCP port 3127.
Symantec calls theirs "W32.Novarg.A@mm"
W32.Novarg.A@mm is a mass-mailing worm that arrives as an attachment with the file extension .bat, .cmd, .exe, .pif, .scr, or .zip. When a computer is infected, the worm will set up a backdoor into the system by opening TCP ports 3127 thru 3198. This can potentially allow an attacker to connect to the computer and use it as a proxy to gain access to its network resources. In addition, the backdoor has the ability to download and execute arbitrary files.The worm will perform a DoS starting on February 1, 2004. It also has a trigger date to stop spreading on February 12, 2004.
Are we talking about two, or one?
Why doesn't everyone do this? :P
No Norton AV pro 2004 machines infected as far as I can tell but one mcafee machine was and its most relevant domain is being hit hard now by this worm.
So glad there are others affected .. I thought some spotty teenager with a keyboard had just decided to waste my time .. specifically me!
CommTouch Software Inc
Email: stopspam@commtouch.com
Web Site: [commtouch.com...]
Hollywood - SEO
pendanticist: Are we talking about two, or one?
This latest virus goes by the following names:
W32.Novarg.A@mm [Symantec], W32/Mydoom@MM [McAfee], WORM_MIMAIL.R [Trend], and others...
There's been talk of the big AV companies co-ordinating their Virus names lately. On big outbreaks computer users often hear of more than one name of a virus outbreak and it causes even more panic...
:0 B :
* 1^0 ^AAEANgAAACZYAAAAAA==$
* 1^0 ^ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAuc2NyUEsFBgAAAAABAAEAhAAAAHRYAAAAAA==$
/dev/null
(Watch for line wrap, the second and third line both start with "* 1^1" and end with "==$")
So far I have seen them with two variations of the payload, and the patterns above are the last line (base64 encoded) of each one. I checked my mail archives to estimate the risk that any legitimate attachment would include one of those lines, and didn't find anything. Your mileage may vary.