Perlu diperhatikan, ada virus melalui email dengan subject "I LOVE YOU".

Bila anda mendapatkannya, MOHON TIDAK DIBUKA, dan LANGSUNG DELETE.

Informasi lengkap tentang virus dimaksud terlampir.

salam,
Eriyawan

====================

DARI CNET (www.cnet.com):

Virus Alert: I Love You and fwd: Joke
A deadly computer virus is spreading like wildfire via email messages. The
worm, which includes the message "I Love You" or "Love Letter" in the
subject line, also arrives under the names fwd: Joke and Very Funny. It
arrives in an email that includes an attachment called "Love-Letter-For-You"
or "Very Funny." The worm targets users of Microsoft Outlook and sends
messages with the virus to every person listed in that user's address book.
If a user opens the included attachment, the virus overwrites existing local
script and HTML files, as well as picture and music files, with its own
code. Files with extensions .jpg, .jpeg, .mp3, and .mp2 are overwritten.
Read the full story

How to Protect Yourself
1. Do not open any attachments to messages with the subject "I Love You,"
"Love Letter," "fwd: Joke," or any other suspicious attachments. Delete
these messages immediately.
2. To further prevent infection, download the latest version of your
antivirus software.
 McAfee and Norton VBS/Loveletter Fixes
3. Install Microsoft's Outlook Security Update. This patch does not stop the
worm, but alerts you with a warning message before you launch a potentially
dangerous attachment.
 Microsoft Outlook Email Attachment Security Updates

================


"Love" email bug hits companies across globe
By Melanie Austria Farmer, Joe Wilcox, and Paul Festa
Staff, CNET News.com
May 4, 2000, 4:00 p.m. PT
update A computer virus that experts warn could be more disruptive than the
notorious Melissa virus has hit computers in Asia and Europe and is quickly
spreading across the United States via email.

The virus, which includes the message "I Love You" or "Love Letter" in the
email subject line, was first spotted in Asia early this morning, according
to security systems firm F-Secure.


According to security analyst Elias

 Levy of Security Focus, the virus contained a possible clue to the source
of the infection that points to the Philippines.

Levy said the worm contains the following comment: "rem
barok -loveletter(vbe) <i hate go to school> rem by: spyder /
[EMAIL PROTECTED] / @GRAMMERSoft Group / Manila,Philippines."

Attempts by CNET News.com to contact "ispyder" were unsuccessful.

Mail.com declined to comment on whether it had an email address
"[EMAIL PROTECTED]" But the company did say that an internal investigation
determined that the company's email servers were not implicated in the
launch of the virus.

"In the virus comments system it did reference '[EMAIL PROTECTED],' but it
wasn't in the 'to' or 'from' line," said Mail.com spokeswoman Kathy Holmes
Robb. "We investigated it pretty thoroughly and found no evidence that the
virus originated from any of our email accounts."

Holmes Robb declined to say whether Mail.com had been contacted by the FBI
or any other outside entity investigating the virus.

Antivirus experts were amazed by the power of the virus. "I've been doing
antivirus research for the past nine years, and it hasn't been this bad,"
said Mikko Hypponen, a research manager at F-Secure, who also noted that the
first report received of the virus came in at around 9:00 a.m. GMT (2 a.m.
PT) today from Norway. "It's spreading so fast, so globally, and twice as
widespread as the Melissa virus."

By 1 p.m. GMT (6 a.m. PT), F-Secure had reports from more than 20 countries,
Hypponen said.

The virus arrives in an email that includes an attachment called
"Love-Letter-For-You," according to F-Secure. The virus targets people who
use Microsoft�s Outlook email program--a widely used default email client at
companies--to send messages with the virus to everyone listed in that
person's address book.

Hypponen, who called the Love virus "destructive," said the most damage
could be to media houses--including radio stations, magazines and
advertising agencies--that have lost photo archives and music files, as the
virus directly attacks those types of files.

"A large publishing house that got hit with the virus this morning lost
their complete photo archives," Hypponen said. "The problem is it
automatically deletes your (image and music) files. (Antivirus upgrades) can
remove the virus but can't undo the damage. If you don't have backups to
your files, you lose."

Several security sites have posted instructions for removing the virus, but
many were not easily accessible, presumably because of heavy traffic. Those
sites include:

� http://download.mcafee.com/http://www.datafellows.com/download-purchase/updates.htmlhttp://www.antivirus.com/download/pattern.asphttp://www.sophos.com/downloads/ide/index.html#loveletahttp://www.thepope.org/index.pl?node_id=140

One midsized Web site reported that the worm wreaked havoc on its computers
today, but that the public site was spared the Windows-specific worm because
it is served off a Linux computer.

"It was taking any MP3 files and it was making duplicates of itself with a
VBScript extension, and any '.jpg' files on our server were being
transformed to VBScript," said the site's administrator, who did not want
the site identified. "We've got an employee who got nailed heavily, and
every '.jpg' graphic has been converted to a '.vbs' file."

One site heavily dependent on the integrity of its MP3 files--MP3.com--has
apparently weathered the Love bug unscathed. A representative said the
company's information systems administrators sent a warning to employees
about the worm early in the day, and no damage had yet been reported.

Sources said that several government organizations in the Washington, D.C.,
area, including the Pentagon, the Federal Reserve, the Coast Guard and the
Defense Department, have been hit by the email virus.

"We certainly have seen scattered instances of it throughout the Defense
Department, but I don't have any overall assessment at this time," said
department spokeswoman Susan Hansen. "Our joint task force on computer
network defense has this under consideration. I can confirm that, like many
other organizations, we too...have seen this virus."

An FBI representative said that "the FBI is currently assessing any impact
this has had both nationally and internationally." The representative would
not say whether the agency had been infected by the virus, however.

The National Infrastructure Protection Center, which has helped coordinate
the investigation into denial-of-service attacks, today issued a warning
about the virus.

Last year, the Melissa virus clogged corporate email servers across the
country, causing more than $80 million in damage. A New Jersey resident,
David Smith, was arrested and charged with disseminating the original
Melissa virus.

=================



---------------------------------------------------------------------
Mulai langganan: kirim e-mail ke [EMAIL PROTECTED]
Stop langganan: kirim e-mail ke [EMAIL PROTECTED]
Archive ada di http://www.mail-archive.com/[email protected]

Kirim email ke