Forum Moderators: phranque
The BBC is quoting some experts as saying it is bigger than Sobig with 1 in every 12 emails affected, compared to Sobig's 1 in 17 and it is not showing any signs of slowing.
When people talk about using AV software on the server level - any recommendations?
Mailwasher only works on a per domain basis on the server right?
I want something that will work on a server basis for all the domains on that server, and will either simply delete any emails with the .exe .pif etc attachments or just reject them.
http://australianit.news.com.au/articles/0,7204,8515154%5E15841%5E%5Enbv%5E,00.html
Described as a "cornered rat" by Linux creator Linus Torvalds, SCO is in an apparently never-ending legal battle over intellectual property rights related to the System V Unix code.
http://www.computerworld.com/securitytopics/security/virus/story/0,10801,89470,00.html
PC or MAC, won't make a difference while drowning in mail
Once again, we have a virus that attacks windows system files and folders, and comes in the form of windows executable...
Open that attachment in Windows and then the virus is in.. open in any other system and it only will give an error message like "unreconized mime type", "file data corrupted", "uncomplete file", or get it open with an editor showing a lot of binnary instructions in ASCII. But it only can run in windows (is there somebody who uses linux and opens attachs with DOSemu? XD), so if you use a mac, don't problem. But if you use a PC, even if you need to work under windows, you can have a multibooting system and put a linux in the same PC where a Windows is installed, so you can open mail much more securely.
The difference is not between PC or MAC, but between Win32 and anything else...
Windows or not Windows... this is the question
not windows: this is the answer ;) :P
Greetings,
Herenvardö
My Norton Antivirus is doing a great job however it had to block one that came as a .htm attachment. I see no reference to this on any Anti Virus web sites.
I am blocking all the .exe .scr .pif .zip and others because I dont require people to send these to me. However with Norton Anti Virus blocking a .htm that got through it shows that it could easily open up with out you opening the attachment.
So far all is well, just have be careful.
If you want to do any more than delete them then check the whois on the sending IP and contact the abuse email at that ISP and ask them to take the infected user's outgoing email offline until their computer is cleaned.
The "incorrect bounces" are just as time wasting as the real thing imho.
user's outgoing email offline until their computer is cleaned.
Yes but their computer may be clean. I have blocked this virus from my own domain name with words like peter@mydomain.com or john@mydomain.com and we don't have these addresses at all.
Somehow its finding a domain name and putting and name like "peter" in the front to appear as the sender but the email address does not exsist.
95% of mine still getting blocked at the server thank goodness then Norton Anti Virus picks up the remaining 5%
Definetly the most fastest virus ever!
The point is it will only slow when infected machines stop transmitting .. and when the false bounces stop coming as a result of that or the admins realising that they are contributing to the noise around the virus.
I have contacted 3 ISP so far whose users have caused about 300 infected emails which I know about so they probably sent out thousands of infected emails through that ISPs network.
IMO the ISPs are the folks who could kill this off the fastest as they monitor all sent mail at source so can identify infected machines the fastest.
I think this is the right response:
If you are adequately protected .. i.e. if your av software is sterelising the emails then check the sending IP address from the email headers (that of the original infected email).
visit [network-tools.com...]
to find the ISP who is responsible for that user .. find their abuse@ email addess and send them a couple of example copies of the emails (as text in a text email only) asking them to take the outgoing email service of their infected user offline to stop the flow.
I think you may find it to be just one or two infected users who are causing the most of your particular influx any infected machine will be likley to be sending out piles of this junk.
But I have no idea how many emails to non-existing addresses my hosting company may have bounced. I disabled the catch all function long time ago. It caught nothing but spam.
Unfortunately I don't understand viruses that much, and I don't get how spoofed addresses are helping spread this virus. I mean, I thought it was exploiting e-mail address books, and shouldn't that mean it's being sent from valid addresses?
I've been hit with the virus just seven times since yesterday afternoon. NAV has stopped it cold each time. Best investment I ever made for my computer! ;)
What we did was to divert the common subject lines like hello, hi, etc directly to our delete box on the mail server.
We then go in once an hour and delete them 20 at a time while scanning for legit mail. They are easy to recognise because they are all the same size and have an attachment.
(1) If the To field contains "@domain.com" and not "name1@domain.com" and not "name2@domain.com" then mark the message as mail to be deleted.
[This marks messages to bogus addresses for deletion for each domain that I own.]
(2) If the Subject field is "Error" or "Failure Notice" or "Hello" or "Hi" or "Mail Delivery System" or "Mail Transaction Failed" or "Server Report" or "Status" or "Test" or "Failure Delivery" then mark the message as mail to be deleted.
These filters mark the messages to be deleted and allows me to review the messages and delete with one click. You have to be careful though since a few of these subjects may be used in valid emails.
I got a couple of these Monday before I even saw any mention of the worm. The spoofed emails used two encoded email addresses that were on my domain. I immediately changed the htm files and replaced those encoded email addresses with new encoded addresses. Within 20 minutes I started getting more spoofed emails using these two new addreses!
I had not sent any emails out myself in hours, but I ran Norton just to be sure. Nothing found. I've run Norton twice more - just to be sure.
These were brand new email addresses that were never used before so no one could have them in their address books and they weren't, and still aren't, in my address book either.
I also use Mailwasher and delete probably 90% of emails from the server. Sometimes I get busy and there are so many emails on the server that I don't download any of them until I get time to preview them in Mailwasher where I delete the majority. When these started showing up I hadn't dowloaded any mail from the server since early Saturday!
I'm perplexed, anyone have any ideas how this could happen so fast.
I did a search for SPF (Sender Permitted From) and couldn't find any post here. Does anyone know about this. My host is supposed to be implementing this soon. From what I read about it, it looks like it could be a big help against spammers and spoofers.
One last note, I haven't gotten any for the two newly created emails since mid Tuesday, but I am still getting them for three other valid addresses that are encoded on my site, plus a number of other discontinued email addresses.
But sometimes I need to open attachments. To me the real question is why are email attachments allowed to write to system files in windows in the first place.
because you have a system setup such that your account
has those privileges.
if you setup a user account without those privileges,
then it cannot do this.
this is a recommended security practice, however
it is a huge pain to operate this way.
linux and mac osx users need not feel smug. if
*everyone* switched over, so would the virus writers.