DASAV     Bibliography     Mayerson    

As of March 19, 2007:

The Hackenblog has moved to http://hackenblog.hackenbush.org/ or www.hackenblog.com.

Please update your links, thank you.
Hello Readers! If you're liking what you're reading here, you can help out with the webhosting bill with a donation, if you are so inclined. In addition to my eternal gratitude, you'll have the comfort of knowing I won't be spending it on frivolous things like food or the electric bill or something.

[Previous entry: "The Ginger Mayerson Fifty Films, 28/50 - A Fine Madness"] [Main Index] [Next entry: "EWIVVG"]

03/14/2004 Entry: "Email warning about email virus (sigh)"

New virus scam, don't fall for it, especially people with liheliso.com email:

"Dear user of e-mail server 'Gingermayerson.com',

"We warn you about some attacks on your e-mail account. Your computer may contain viruses, in order to keep your computer and e-mail account safe, please, follow the instructions.

"For more information see the attached file.

"Attached file protected with the password for security reasons. Password is 25548.

"Sincerely,
"The Gingermayerson.com team"

Here's the scoop from McAfee:

"From: (address is spoofed)
Subject:
-- E-mail account security warning.
-- Notify about using the e-mail account.
-- Warning about your e-mail account.
-- Important notify about your e-mail account.
-- Email account utilization warning.
-- Notify about your e-mail account utilization.
-- E-mail account disabling warning."
Virus Advisory: Network Associates McAfee AVERT Raises Risk Assessment To Medium on New W32/Bagle.n@MM Virus

Sigh.

Virus Advisory: Network Associates McAfee AVERT Raises Risk Assessment To Medium on New W32/Bagle.n@MM Virus
Saturday March 13, 10:33 pm ET
McAfee AVERT Researchers Discover W32/Bagle.n@MM

BEAVERTON, Ore., March 13 /PRNewswire-FirstCall/ -- Network Associates, Inc. (NYSE: NET - News) the leading provider of intrusion prevention solutions, today announced that McAfee® AVERT(TM) (Anti-Virus and Vulnerability Emergency Response Team), the world-class anti-virus and vulnerability research division of Network Associates®, raised the risk assessment to medium on the recently discovered W32/Bagle.n@MM, also known as Bagle.n. This new variant is a mass-mailing worm that constructs outgoing messages with various attachments including password-protected .RAR files, with the password included in the message body or in an image file attached to the message. The worm has many of the same functionalities as its Bagle predecessors, effectively customizing each email to make it appear to be a legitimate warning notification. McAfee AVERT verified the discovery of the new threat while working closely with a researcher partner in the United States, where the virus first appeared. Currently, McAfee AVERT has had over 110 reports of the virus -- a fairly high number for a weekend when most businesses are closed.

Most of the Bagle.n samples that McAfee AVERT has seen are from the virus itself, which uses a common spoofing process, and not from the infected customers, who have also sent in samples. This has been the case with the three most prevalent viruses at the moment, which include the Mydoom, Bagle and Netsky families.

Symptoms

The Bagle.n worm is a mass mailing polymorphic threat, which means the virus has the ability to change its signature every time it infects. The worm harvests addresses from local files and then uses the harvested addresses in the 'From' field to send itself. The worm copies itself to folders that have the phrase 'shar' in the name, such as common peer-to-peer applications. The worm then proceeds into the remote access component of the virus, which listens on a random TCP port for remote connections. Users should delete any email containing the following:

From: (address is spoofed)
Subject:
-- E-mail account security warning.
-- Notify about using the e-mail account.
-- Warning about your e-mail account.
-- Important notify about your e-mail account.
-- Email account utilization warning.
-- Notify about your e-mail account utilization.
-- E-mail account disabling warning.

Body Text:
Greeting -
-- Dear user of (user's domain),
-- Dear user of (user's domain) gateway e-mail server,
-- Dear user of e-mail server "(user's domain),"
-- Hello user of (user's domain) e-mail server,
-- Dear user of "(user's domain) " mailing system,
-- Dear user, the management of (user's domain) mailing system wants to
let you know that,

From: (the address may be spoofed, using the recipient's domain name and a
user name taken from the following list, or another address found
on the local system)
-- management@
-- administration@
-- staff@
-- noreply@
-- support@
-- other address found on the system

Subject:
-- Account notify
-- E-mail account disabling warning.
-- E-mail account security warning.
-- Email account utilization warning.
-- Email report
-- E-mail technical support message.
-- E-mail technical support warning.
-- E-mail warning
-- Encrypted document
-- Fax Message Received
-- Forum notify
-- Hidden message
-- Important notify
-- Important notify about your e-mail account.
-- Incoming message
-- Notify about using the e-mail account.
-- Notify about your e-mail account utilization.
-- Notify from e-mail technical support.
-- Protected message
-- Re: Document
-- Re: Hello
-- Re: Hi
-- Re: Incoming Fax
-- Re: Incoming Message
-- Re: Msg reply
-- RE: Protected message
-- RE: Text message
-- Re: Thank you!
-- Re: Thanks :)
-- Re: Yahoo!
-- Request response
-- Site changes
-- Warning about your e-mail account.

Body Text:
Greeting -
-- Dear user of %s ,
-- Dear user of %s e-mail server gateway,
-- Hello user of %s e-mail server,
-- Dear user, the management of %s mailing system wants to let you know
that,
(Where %s is the user's domain is chosen from the To: address. For example
the user's domain for user@mail.com would be "mail.com")

Main message body -
-- Your e-mail account has been temporary disabled because of unauthorized
access.
-- Our main mailing server will be temporary unavailable for next two
days, to continue receiving mail in these days you have to configure
our free auto-forwarding service.
-- Your e-mail account will be disabled because of improper using in next
three days, if you are still wishing to use it, please, resign your
account information.
-- We warn you about some attacks on your e-mail account. Your computer
may contain viruses, in order to keep your computer and e-mail account
safe, please, follow the instructions.
-- Our antivirus software has detected a large amount of viruses outgoing
from your email account, you may use our free anti-virus tool to clean
up your computer software.
-- Some of our clients complained about the spam (negative e-mail content)
outgoing from your e-mail account. Probably, you have been infected by
a proxy-relay trojan server. In order to keep your computer safe,
follow the instructions.


Pathology

After being executed, Bagle.n emails itself to addresses found on the infected host as an .EXE, .PIF, .ZIP, or .RAR file type. The virus may also attach an image file (.BMP, .JPG, .GIF) to the message that contains the password to a password-protected zip file. The worm also contains an icon in the form of what looks to be a True Type Font. The virus listens on a random TCP port for remote connections. It attempts to notify the author that the infected system is ready to accept commands. Like its predecessors, this worm checks the system date. If it is December 31, 2005 or later, the worm deactivates itself by deleting its registry run key.

Cure

Immediate information and cure for this worm can be found online at the Network Associates McAfee AVERT site located at http://vil.nai.com/vil/content/v_101095.htm. McAfee AVERT is advising its customers to update to the 4337 DATs to stay protected from all the current Bagle threats.

Network Associates McAfee® Protection-in-Depth(TM) Strategy delivers the industry's only complete set of system and network protection solutions differentiated by intrusion prevention technology that can detect and block these types of attacks. This allows customers to protect themselves while they plan their patch deployment strategy.

McAfee AVERT Labs is one of the top-ranked anti-virus and vulnerability research organizations in the world, employing more than 100 researchers in offices on five continents. McAfee AVERT protects customers by providing cures that are developed through the combined efforts of McAfee AVERT researchers and McAfee AVERT AutoImmune technology, which applies advanced heuristics, generic detection, and ActiveDAT technology to generate cures for previously undiscovered viruses.

About Network Associates

With headquarters in Santa Clara, California, Network Associates, Inc. (NYSE: NET - News) creates best-of-breed computer security solutions that prevent intrusions on networks and protect computer systems from the next generation of blended attacks and threats. Offering two families of products, McAfee System Protection Solutions, securing desktops and servers, and McAfee Network Protection Solutions, ensuring the protection and performance of the corporate network, Network Associates offers computer security to large enterprises, governments, small and medium sized businesses, and consumers. For more information, Network Associates can be reached at 972-963-8000 or on the Internet at http://www.networkassociates.com/.

NOTE: Network Associates, McAfee and AVERT are either registered trademarks or trademarks of Network Associates, Inc. and/or its affiliates in the United States and/or other countries. All other registered and unregistered trademarks herein are the sole property of their respective owners.

 

 

 

Powered By Greymatter

Hello Readers! If you're still liking what you're reading here, you can help out with the webhosting bill with a donation, if you are so inclined. In addition to my eternal gratitude, you'll have the comfort of knowing I won't be spending it on frivolous things like food or the electric bill or something.

One of the best deals anywhere.


Donations to keep us going are very welome!

Donate towards our web hosting bill!

Our webhost, is a really good deal and is probably having a huge sale on something as we speak. If you're looking for webhosting, I recommend them very much.

BugMeNot.com for passwords to online sites.

Who links to me?

Updated: April 8, 2006

Reviews you can use at J LHLS Reviews

This is a page in a larger site called Hackenbush.org. Click here to go there.

© Copyright, Head Designs 2003
All rights reserved.


referer referrer referers referrers http_referer