Offshoreonly.com

Offshoreonly.com (https://www.offshoreonly.com/forums/)
-   General Boating Discussion (https://www.offshoreonly.com/forums/general-boating-discussion-51/)
-   -   Hey OSO Steve: You have the bug! (https://www.offshoreonly.com/forums/general-boating-discussion/70897-hey-oso-steve-you-have-bug.html)

CigDaze 02-04-2004 06:43 AM

Hey OSO Steve: You have the bug!
 
Looks like you have the new virus.
It's a nasty one.

CigDaze 02-04-2004 07:05 AM

I got an e-mail from [email protected] with the telltale subject line "hi," the body of the message was a bunch of garbage ascii text and a *.zip file.

Antivirus companies say latest e-mail worm spreading fast
MATTHEW FORDAHL, AP Technology Writer
Monday, January 26, 2004
©2004 Associated Press

URL: sfgate.com/article.cgi?file=/news/archive/2004/01/26/financial2102EST0374.DTL


(01-26) 21:09 PST SAN JOSE, Calif. (AP) --

A malicious program attached to seemingly innocuous e-mails was spreading quickly over the Internet on Monday, clogging network traffic and potentially leaving hackers an open door to infected personal computers.

The worm, called "Mydoom" or "Novarg" by antivirus companies, usually appears to be an e-mail error message. A small file is attached that, when launched on computers running Microsoft Corp.'s Windows operating systems, can send out 100 infected e-mail messages in 30 seconds to e-mail addresses stored in the computer's address book and other documents.

The attack was first noticed Monday afternoon. Within hours, thousands of e-mails were clogging networks, said Vincent Gullotto, vice president of Network Associates' antivirus emergency response team.

Besides sending out e-mail, the program appears to open up a backdoor so that hackers can take over the computer later.

"As far as I can tell right now, it's pretty much everywhere on the planet," Gullotto said.

Security software experts were scrambling to decrypt the details of the malicious program and were arriving at different conclusions.

Symantec, an antivirus company, said the worm appeared to contain a program that logs keystrokes on infected machines. It could collect username and passwords of unsuspecting users and distribute them to strangers.

Network Associates did not find the keylogging program.

The worm also appears to deposit its payload into folders open to users of the Kazaa file-sharing network. Remote users who download those files and run them could be infected.

Symantec also found code that would flood The SCO Group Inc.'s Web site with requests in attempt to crash its server, starting Feb. 1. SCO's site has been targeted in other recent attacks because of its threats to sue users of the Linux operating system in an intellectual property dispute. A SCO spokesman did not return a telephone call seeking comment Monday.

Overall, the computer security firm Central Command confirmed 3,800 infections within 45 minutes of initial discovery.

"This has all the characteristics of being the next big one," said Steven Sundermeier, Central Command's vice president of products and services.

It appeared to first target large companies in the United States -- and their large address books -- but quickly spread internationally, said David Perry, global director of education at the antivirus software firm Trend Micro.

Unlike other mass-mailing worms, Mydoom does not attempt to trick victims by promising nude pictures of celebrities or mimicking personal notes. Instead, one of its messages reads: "The message contains Unicode characters and has been sent as a binary attachment."

"Because that sounds like a technical thing, people may be more apt to think it's legitimate and click on it," said Steve Trilling, Symantec's senior director of research.

Subject lines also vary. The attachments have ".exe," ".scr," ".cmd" or ".pif" extensions, and may be compressed as a Zip file.

CigDaze 02-04-2004 07:08 AM

A fix is available here, for those who may have it:

http://securityresponse.symantec.com...oval.tool.html

cuda 02-04-2004 07:33 AM

I remember recieving an email with binary codes. I didn't open it. How can I tell if I have the bug?

CigDaze 02-04-2004 07:36 AM

The most noticible clue is if you are receiving emails from your internet provider stating either "message undeliverable," or "message cannot be processed," or something to that effect.

Basically, unbeknownst to you, your system is sending out messages to everyone in your e-mail address book and once in a while one will get rejected or bounced back, delivering to you one of the messages above.

But the best way to be absolutely certain is to run the tool in my above post. It can't hurt anything and will only take a few minutes.

ChrisK 02-04-2004 07:58 AM

I have not gotten an email from OSO...

OffshoreOnly 02-04-2004 08:06 AM

Does his one go through your e-mail list like most of the others?

PhantomChaos 02-04-2004 08:21 AM

It doesn't mean the email came from him. The return address could have been "spoofed" and the email came from some other infected machine.

cuda 02-04-2004 08:22 AM

When I click on removal tool,it keeps cycling me back around to where I was.

MnFastBoat 02-04-2004 08:26 AM

just because it is an email that LOOKS like it came from OSO does not really mean it came from them

It could actually have infected YOUR computer and is using YOUR address book.
Once it sends email out using your addresses, it comes back to you saying undeliverable, then you click on it, open the worm and walla you just infected yourself.

It is at work right now, :( and who only knows when it will happen


All times are GMT -5. The time now is 09:34 AM.


Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Use of this site indicates your consent to the Terms of Use.