Just FYI.

-Chris

---------- Forwarded message ----------
Date: Tue, 27 Nov 2001 11:56:05 -0800 (PST)
From: Milton Takei <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: Listowners listserv <[EMAIL PROTECTED]>
Subject: Stripping attachments

To the listowners list:

        Does anybody on this list know the listproc command to strip
attachments, as suggested in the message below?
                                        --Milton Takei




---------- Forwarded message ----------
Date: Tue, 27 Nov 2001 10:33:14 -0500
From: Ishgooda <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]/TROJAN  ALERT

I have receivedsixcopies of this virus in the past three days.  It appears
to change the email address to another address in the infected person's
address book (ex. "[EMAIL PROTECTED]" will read "[EMAIL PROTECTED]"  and
actually sent from a verizon account).  This makes it extremely difficult
to back track an infected sender as routers don't support the fact it
comes from the address shown.

It appears to arrive as an embedded file rather than an attachment.  For
those using hotmail, this means you "may" infect yourself simply by
viewing it.  For those of you who are listowners..set your list to strip
attachments and permit text files only.

Check your system under "help" in order to learn how to disable MAPI.  In
Eudora go to Tools/Options/MAPI and check the box to disable it.  If you
have any problems this can be re-enabled in the same settings area.

In light of the recent developments from the FBI, a newly developed trojan
called Magic Lantern under the Cyber Knights program, this trojan
functions very similarly. Ishgooda thanks to Jordan for the following link
and info:

W32.Badtrans.B@mm
http:[EMAIL PROTECTED]

                  Discovered on: November 24, 2001
                  Last Updated on: November 26, 2001 at 12:46:58 PM PST



                  Due to the increased rate of submissions, we have updated the threat 
level of this worm from level 3 to level 4. 

                  W32.Badtrans.B@mm is a MAPI worm that emails itself out as one of 
several different file names. This worm
                  also creates a DLL in \Windows\System directory as Kdll.dll. It uses 
functions from this DLL to log keystrokes.

                  Type: Worm 

                  Virus Definitions: November 24, 2001 

                  Threat Assessment: 





                    Wild: 
                     High 
                            Damage: 
                              Low 
                                     Distribution:

                                       High 



                  Wild: 

                      Number of infections: More than 1000 
                      Number of sites: 3 - 9 
                      Geographical distribution: Low 
                      Threat containment: Easy 
                      Removal: Easy 

                  Damage: 

                      Payload: 
                          Large scale e-mailing: Uses MAPI commands to send email. 
                          Compromises security settings: Installs keystroke logging 
Trojan horse. 

                  Technical description: 

This worm arrives as an email with one of several attachment names and a combination 
of two appended extensions.

                  The list of possible file names is:
                  HUMOR
                  DOCS
                  S3MSONG
                  ME_NUDE
                  CARD
                  SEARCHURL
                  YOU_ARE_FAT!
                  NEWS_DOC
                  IMAGES
                  PICS

The first extension that is appended to the file name is one of the following:
                  .DOC
                  .MP3
                  .ZIP

The second extension that is appended to the file name is one of the following:
                  .pif
                  .scr

The resulting file name would look something like this:
                  CARD.DOC.PIF
                  NEWS_DOC.MP3.SCR
                  etc.

                  When executed, this worm copies itself as kernel32.exe in the 
"\windows\system" directory. It then adds the
                  following registry value:

                  
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Kernel32=kernel32.exe.

                  Prevention methods:

                  1. Corporate email filtering systems should block all email that 
have attachments with the extensions .scr and .pif.

                  2. Users should not open any emails with an attachment that matches 
the names listed above. Any email that has
                  such an attachment should be deleted.

                  Removal instructions: 
http://securityresponse.symantec.com/avcenter/refa.html#removal

                      1. Run LiveUpdate to make sure that you have the most recent 
virus definitions.

                      2. Start Norton AntiVirus (NAV), and make sure that NAV is 
configured to scan all files. For instructions on
                      how to do this, read the document How to configure Norton 
AntiVirus to scan all files.

                      3. Run a full system scan.

                      4. Delete all files that are detected as W32.Badtrans.B@mm.

                      5. Remove the registry value listed above. 

Reply via email to