Perlu diperhatikan, ada virus melalui email dengan subject "I LOVE YOU". Bila anda mendapatkannya, MOHON TIDAK DIBUKA, dan LANGSUNG DELETE. Informasi lengkap tentang virus dimaksud terlampir. salam, Eriyawan ==================== DARI CNET (www.cnet.com): Virus Alert: I Love You and fwd: Joke A deadly computer virus is spreading like wildfire via email messages. The worm, which includes the message "I Love You" or "Love Letter" in the subject line, also arrives under the names fwd: Joke and Very Funny. It arrives in an email that includes an attachment called "Love-Letter-For-You" or "Very Funny." The worm targets users of Microsoft Outlook and sends messages with the virus to every person listed in that user's address book. If a user opens the included attachment, the virus overwrites existing local script and HTML files, as well as picture and music files, with its own code. Files with extensions .jpg, .jpeg, .mp3, and .mp2 are overwritten. Read the full story How to Protect Yourself 1. Do not open any attachments to messages with the subject "I Love You," "Love Letter," "fwd: Joke," or any other suspicious attachments. Delete these messages immediately. 2. To further prevent infection, download the latest version of your antivirus software. McAfee and Norton VBS/Loveletter Fixes 3. Install Microsoft's Outlook Security Update. This patch does not stop the worm, but alerts you with a warning message before you launch a potentially dangerous attachment. Microsoft Outlook Email Attachment Security Updates ================ "Love" email bug hits companies across globe By Melanie Austria Farmer, Joe Wilcox, and Paul Festa Staff, CNET News.com May 4, 2000, 4:00 p.m. PT update A computer virus that experts warn could be more disruptive than the notorious Melissa virus has hit computers in Asia and Europe and is quickly spreading across the United States via email. The virus, which includes the message "I Love You" or "Love Letter" in the email subject line, was first spotted in Asia early this morning, according to security systems firm F-Secure. According to security analyst Elias Levy of Security Focus, the virus contained a possible clue to the source of the infection that points to the Philippines. Levy said the worm contains the following comment: "rem barok -loveletter(vbe) <i hate go to school> rem by: spyder / [EMAIL PROTECTED] / @GRAMMERSoft Group / Manila,Philippines." Attempts by CNET News.com to contact "ispyder" were unsuccessful. Mail.com declined to comment on whether it had an email address "[EMAIL PROTECTED]" But the company did say that an internal investigation determined that the company's email servers were not implicated in the launch of the virus. "In the virus comments system it did reference '[EMAIL PROTECTED],' but it wasn't in the 'to' or 'from' line," said Mail.com spokeswoman Kathy Holmes Robb. "We investigated it pretty thoroughly and found no evidence that the virus originated from any of our email accounts." Holmes Robb declined to say whether Mail.com had been contacted by the FBI or any other outside entity investigating the virus. Antivirus experts were amazed by the power of the virus. "I've been doing antivirus research for the past nine years, and it hasn't been this bad," said Mikko Hypponen, a research manager at F-Secure, who also noted that the first report received of the virus came in at around 9:00 a.m. GMT (2 a.m. PT) today from Norway. "It's spreading so fast, so globally, and twice as widespread as the Melissa virus." By 1 p.m. GMT (6 a.m. PT), F-Secure had reports from more than 20 countries, Hypponen said. The virus arrives in an email that includes an attachment called "Love-Letter-For-You," according to F-Secure. The virus targets people who use Microsoft�s Outlook email program--a widely used default email client at companies--to send messages with the virus to everyone listed in that person's address book. Hypponen, who called the Love virus "destructive," said the most damage could be to media houses--including radio stations, magazines and advertising agencies--that have lost photo archives and music files, as the virus directly attacks those types of files. "A large publishing house that got hit with the virus this morning lost their complete photo archives," Hypponen said. "The problem is it automatically deletes your (image and music) files. (Antivirus upgrades) can remove the virus but can't undo the damage. If you don't have backups to your files, you lose." Several security sites have posted instructions for removing the virus, but many were not easily accessible, presumably because of heavy traffic. Those sites include: � http://download.mcafee.com/ � http://www.datafellows.com/download-purchase/updates.html � http://www.antivirus.com/download/pattern.asp � http://www.sophos.com/downloads/ide/index.html#loveleta � http://www.thepope.org/index.pl?node_id=140 One midsized Web site reported that the worm wreaked havoc on its computers today, but that the public site was spared the Windows-specific worm because it is served off a Linux computer. "It was taking any MP3 files and it was making duplicates of itself with a VBScript extension, and any '.jpg' files on our server were being transformed to VBScript," said the site's administrator, who did not want the site identified. "We've got an employee who got nailed heavily, and every '.jpg' graphic has been converted to a '.vbs' file." One site heavily dependent on the integrity of its MP3 files--MP3.com--has apparently weathered the Love bug unscathed. A representative said the company's information systems administrators sent a warning to employees about the worm early in the day, and no damage had yet been reported. Sources said that several government organizations in the Washington, D.C., area, including the Pentagon, the Federal Reserve, the Coast Guard and the Defense Department, have been hit by the email virus. "We certainly have seen scattered instances of it throughout the Defense Department, but I don't have any overall assessment at this time," said department spokeswoman Susan Hansen. "Our joint task force on computer network defense has this under consideration. I can confirm that, like many other organizations, we too...have seen this virus." An FBI representative said that "the FBI is currently assessing any impact this has had both nationally and internationally." The representative would not say whether the agency had been infected by the virus, however. The National Infrastructure Protection Center, which has helped coordinate the investigation into denial-of-service attacks, today issued a warning about the virus. Last year, the Melissa virus clogged corporate email servers across the country, causing more than $80 million in damage. A New Jersey resident, David Smith, was arrested and charged with disseminating the original Melissa virus. ================= --------------------------------------------------------------------- Mulai langganan: kirim e-mail ke [EMAIL PROTECTED] Stop langganan: kirim e-mail ke [EMAIL PROTECTED] Archive ada di http://www.mail-archive.com/[email protected]
