RE: New Virus Alert

2001-09-21 Thread Lefkovics, William
Title: Message



Why? Is their Exchange Server having issues?

-Original Message-From: Greg Page 
[mailto:[EMAIL PROTECTED]]Sent: Wednesday, September 19, 2001 6:35 
PMTo: MS-Exchange Admin IssuesSubject: RE: New Virus 
Alert
Probably out at the Mustang Ranch. I would be there giving the 
circumstances.

Greg

  
  -Original Message-From: Clark, Steve 
  [mailto:[EMAIL PROTECTED]] Sent: Tuesday, September 18, 2001 
  11:34 PMTo: MS-Exchange Admin IssuesSubject: RE: New 
  Virus Alert
  
  Was 
  beginning to wonder if you took the day 
  off?
  
  Steve 
  Clark
  Clark 
  Systems Support, LLC
  AVIEN 
  Charter Member
  www.clarksupport.com
   
  301-610-9584 voice
   
  240-465-0323 Efax
  
  -Original 
  Message-From: Lefkovics, 
  William [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 11:31 
  PMTo: MS-Exchange Admin 
  IssuesSubject: RE: New Virus 
  Alert
  
  If it's any 
  consolation Lance, it's banging the hell out of me also.
  
  Well, 
  that's a little personal Stephen.
  
  CAI claims 
  the viruspattern files I updated this morning before the attack takes 
  care of it!
  
  bigassumption
  Well... 
  it seems we know who wrote it, then...
  /bigassumption
  
  If anyone 
  knows exactly how this works, and I mean exactly, I'd sure like to know. 
  
  
  It seems 
  many are still up trying to determine that 100%
  
  deleting 
  load.exe
  
  I've 
  learned it not usually prudent to lose your load on a 
  computer.
  
   
  Good luck.
  
  Thank 
  you. You as well.
  
  
  
  -Original 
  Message-From: Stephen J. 
  Norton [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 8:28 
  PMTo: MS-Exchange Admin 
  IssuesSubject: RE: New Virus 
  Alert
  If it's 
  any consolation Lance, it's banging the hell out of me also. Seems to 
  replicate richad20.dll and *.eml files on servers. I'm talking hundreds of 
  thousands of the suckers. Worst is, CAI claims the viruspattern files I 
  updated this morning before the attack takes care of it! Another load of horse 
  manure form an already suspect company. If anyone knows exactly how this 
  works, and I mean exactly, I'd sure like to know. Even with all workstations 
  shut down, it still replicates itself on my PDC as fast as I can delete the 
  dll and eml files. On infected workstations, repairing the sys.ini file and 
  deleting load.exe from the \\windows\system directory does not help. 
  On reboot, the sys.ini is modified again and the load.exe is back in place. 
  Making the system.ini file read only seems to help. Good 
  luck.
  Oh 
  yeah-tried calling Computer Associates tech support for two hours today. Was 
  kept in a holding pattern for 30 minutes and then disconnected. Nice people. 
  
  -Original 
  Message-From: Lance 
  -a-lot [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 11:07 
  PMTo: MS-Exchange Admin 
  IssuesSubject: RE: New Virus 
  Alert
  Thanks. It's killing us. NAI seems to 
  have numerous update, as well as, MS. Some get fixed, some don't. Half the 
  network is down due this bad boy. Be careful with this one, especially 
  software companies running IIS.From: "Zangara, Jim" [EMAIL PROTECTED]Reply-To: 
  "MS-Exchange Admin Issues" [EMAIL PROTECTED]To: 
  "MS-Exchange Admin Issues" [EMAIL PROTECTED]Subject: 
  RE: New Virus AlertDate: Tue, 18 Sep 2001 10:47:03 
  -0700W32/Nimda.A@mm - just 
  came in from antigen.Virus 
  Name:---W32/Nimda.A@mmAlias:---W32/Nimda-AW32/Nimda-mmE-mail 
  Subject:---NoneE-mail 
  Body:---NoneE-mail 
  Attachments:---README.EXEDescription:---This 
  worm will enter a computer in one out of possibly two ways - it 
  willeither be received as an email with an attachment, and it seems 
  that it willalso attempt to break into machines running the 
  web server software IIS(Internet Information Server), through a 
  security hole known as a "directorytraversal 
  exploit".When the file is run, it will copy itself to the system 
  directory as ahidden file called LOAD.EXE. This file is called from 
  the file SYSTEM.INI sothat it is run from 
  startup.At the Present time a Filter Rule for : 
  Readme.exe (all types) will removethis from your email 
  serverWe will be releasing AV Engine Updates when they are 
  made available.Thank You,Sybari Software, 
  Inc.Jim Zangara, MCSE+ISpecial Projects 
  EngineerPremiere Radio NetworksA Division of Clear Channel 
  Communications15260 Ventura Blvd Suite 500Sherman Oaks, CA 
  91403Direct: (818) 461-8620mailto:[EMAIL PROTECTED]-Original 
  Message-From: Lance -a-lot [mailto:[EMAIL PROTECTED]]Sent: 
  Tuesday, September 18, 2001 9:51 AMTo: MS-Exchange Admin 
  IssuesSubject: Re: New Virus AlertDo you know 
  the name of the virus? From: "Zangara, Jim" [EMAIL PROTECTED] 
  Reply-To: "MS-Exchange Admin Issues"

RE: New Virus Alert

2001-09-19 Thread Dahl, Peter

Symantec gives the following synopsis on what the virus does.  There are
some more details on the site regarding detection and removal that I did not
copy over so I have provided the link at the beginning.

Peter Dahl.

http:[EMAIL PROTECTED]

W32.Nimda.A@mm is a new mass-mailing worm that utilizes multiple methods to
spread itself. The worm sends itself out by email, searches for open network
shares, attempts to copy itself to unpatched or already vulnerable Microsoft
IIS web servers, and is a virus infecting both local files and files on
remote network shares. 

The worm uses the Unicode Web Traversal exploit. A patch and information
regarding this exploit can be found at
http://www.microsoft.com/technet/security/bulletin/ms00-078.asp. 

When the worm arrives by email, the worm uses a MIME exploit allowing the
virus to be executed just by reading or previewing the file. Information and
a patch for this exploit can be found at
http://www.microsoft.com/technet/security/bulletin/MS01-020.asp

Users visiting compromised Web servers will be prompted to download an .eml
(Outlook Express) email file, which contains the worm as an attachment. This
.eml file also uses the aforementioned MIME exploit. Users can disable 'File
Download' in their internet security zones to prevent compromise.

Also, the worm will create open network shares on the infected computer,
allowing access to the system. During this process the worm creates the
guest account with Administrator privileges.

-Original Message-
From: Stephen J. Norton [mailto:[EMAIL PROTECTED]] 
Sent: Tuesday, September 18, 2001 11:28 PM
To: MS-Exchange Admin Issues
Subject: RE: New Virus Alert


If it's any consolation Lance, it's banging the hell out of me also. Seems
to replicate richad20.dll and *.eml files on servers. I'm talking hundreds
of thousands of the suckers. Worst is, CAI claims the virus pattern files I
updated this morning before the attack takes care of it! Another load of
horse manure form an already suspect company. If anyone knows exactly how
this works, and I mean exactly, I'd sure like to know. Even with all
workstations shut down, it still replicates itself on my PDC as fast as I
can delete the dll and eml files. On infected workstations, repairing the
sys.ini file and deleting load.exe from the \\windows\system directory does
not help. On reboot, the sys.ini is modified again and the load.exe is back
in place. Making the system.ini file read only seems to help. Good luck.
Oh yeah-tried calling Computer Associates tech support for two hours today.
Was kept in a holding pattern for 30 minutes and then disconnected. Nice
people. 
-Original Message-
From: Lance -a-lot [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 18, 2001 11:07 PM
To: MS-Exchange Admin Issues
Subject: RE: New Virus Alert


Thanks. It's killing us. NAI seems to have numerous update, as well as, MS. 
Some get fixed, some don't. Half the network is down due this bad boy. Be 
careful with this one, especially software companies running IIS.


From: Zangara, Jim [EMAIL PROTECTED]
Reply-To: MS-Exchange Admin Issues 
[EMAIL PROTECTED]
To: MS-Exchange Admin Issues [EMAIL PROTECTED]
Subject: RE: New Virus Alert
Date: Tue, 18 Sep 2001 10:47:03 -0700

W32/Nimda.A@mm - just came in from antigen.


Virus Name:
---
W32/Nimda.A@mm


Alias:
---
W32/Nimda-A
W32/Nimda-mm



E-mail Subject:
---
None



E-mail Body:
---
None


E-mail Attachments:
---
README.EXE


Description:
---
This worm will enter a computer in one out of possibly two ways - it will
either be received as an email with an attachment, and it seems that it 
will
also attempt to break into machines running the web server software IIS
(Internet Information Server), through a security hole known as a 
directory
traversal exploit.
When the file is run, it will copy itself to the system directory as a
hidden file called LOAD.EXE. This file is called from the file SYSTEM.INI 
so
that it is run from startup.


At the Present time a Filter Rule for : Readme.exe (all types) will remove
this from your email server

We will be releasing AV Engine Updates when they are made available.

Thank You,

Sybari Software, Inc.


Jim Zangara, MCSE+I
Special Projects Engineer
Premiere Radio Networks
A Division of Clear Channel Communications
15260 Ventura Blvd Suite 500
Sherman Oaks, CA 91403
Direct: (818) 461-8620
mailto:[EMAIL PROTECTED]




-Original Message-
From: Lance -a-lot [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 18, 2001 9:51 AM
To: MS-Exchange Admin Issues
Subject: Re: New Virus Alert


Do you know the name of the virus?


 From: Zangara, Jim [EMAIL PROTECTED]
 Reply-To: MS-Exchange Admin Issues
 [EMAIL PROTECTED]
 To: MS-Exchange Admin Issues [EMAIL PROTECTED]
 Subject: New Virus Alert
 Date: Tue, 18 Sep 2001 09:32:37 -0700
 
 Hey folks we are getting nailed by this new virus - we had already
 blocked

RE: New Virus Alert

2001-09-19 Thread Greg Page
Title: Message



Probably out at the Mustang Ranch. I would be there giving the 
circumstances.

Greg

  
  -Original Message-From: Clark, Steve 
  [mailto:[EMAIL PROTECTED]] Sent: Tuesday, September 18, 2001 
  11:34 PMTo: MS-Exchange Admin IssuesSubject: RE: New 
  Virus Alert
  
  Was 
  beginning to wonder if you took the day 
  off?
  
  Steve 
  Clark
  Clark 
  Systems Support, LLC
  AVIEN 
  Charter Member
  www.clarksupport.com
   
  301-610-9584 voice
   
  240-465-0323 Efax
  
  -Original 
  Message-From: Lefkovics, 
  William [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 11:31 
  PMTo: MS-Exchange Admin 
  IssuesSubject: RE: New Virus 
  Alert
  
  If it's any 
  consolation Lance, it's banging the hell out of me also.
  
  Well, 
  that's a little personal Stephen.
  
  CAI claims 
  the viruspattern files I updated this morning before the attack takes 
  care of it!
  
  bigassumption
  Well... 
  it seems we know who wrote it, then...
  /bigassumption
  
  If anyone 
  knows exactly how this works, and I mean exactly, I'd sure like to know. 
  
  
  It seems 
  many are still up trying to determine that 100%
  
  deleting 
  load.exe
  
  I've 
  learned it not usually prudent to lose your load on a 
  computer.
  
   
  Good luck.
  
  Thank 
  you. You as well.
  
  
  
  -Original 
  Message-From: Stephen J. 
  Norton [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 8:28 
  PMTo: MS-Exchange Admin 
  IssuesSubject: RE: New Virus 
  Alert
  If it's 
  any consolation Lance, it's banging the hell out of me also. Seems to 
  replicate richad20.dll and *.eml files on servers. I'm talking hundreds of 
  thousands of the suckers. Worst is, CAI claims the viruspattern files I 
  updated this morning before the attack takes care of it! Another load of horse 
  manure form an already suspect company. If anyone knows exactly how this 
  works, and I mean exactly, I'd sure like to know. Even with all workstations 
  shut down, it still replicates itself on my PDC as fast as I can delete the 
  dll and eml files. On infected workstations, repairing the sys.ini file and 
  deleting load.exe from the \\windows\system directory does not help. 
  On reboot, the sys.ini is modified again and the load.exe is back in place. 
  Making the system.ini file read only seems to help. Good 
  luck.
  Oh 
  yeah-tried calling Computer Associates tech support for two hours today. Was 
  kept in a holding pattern for 30 minutes and then disconnected. Nice people. 
  
  -Original 
  Message-From: Lance 
  -a-lot [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 11:07 
  PMTo: MS-Exchange Admin 
  IssuesSubject: RE: New Virus 
  Alert
  Thanks. It's killing us. NAI seems to 
  have numerous update, as well as, MS. Some get fixed, some don't. Half the 
  network is down due this bad boy. Be careful with this one, especially 
  software companies running IIS.From: "Zangara, Jim" [EMAIL PROTECTED]Reply-To: 
  "MS-Exchange Admin Issues" [EMAIL PROTECTED]To: 
  "MS-Exchange Admin Issues" [EMAIL PROTECTED]Subject: 
  RE: New Virus AlertDate: Tue, 18 Sep 2001 10:47:03 
  -0700W32/Nimda.A@mm - just 
  came in from antigen.Virus 
  Name:---W32/Nimda.A@mmAlias:---W32/Nimda-AW32/Nimda-mmE-mail 
  Subject:---NoneE-mail 
  Body:---NoneE-mail 
  Attachments:---README.EXEDescription:---This 
  worm will enter a computer in one out of possibly two ways - it 
  willeither be received as an email with an attachment, and it seems 
  that it willalso attempt to break into machines running the 
  web server software IIS(Internet Information Server), through a 
  security hole known as a "directorytraversal 
  exploit".When the file is run, it will copy itself to the system 
  directory as ahidden file called LOAD.EXE. This file is called from 
  the file SYSTEM.INI sothat it is run from 
  startup.At the Present time a Filter Rule for : 
  Readme.exe (all types) will removethis from your email 
  serverWe will be releasing AV Engine Updates when they are 
  made available.Thank You,Sybari Software, 
  Inc.Jim Zangara, MCSE+ISpecial Projects 
  EngineerPremiere Radio NetworksA Division of Clear Channel 
  Communications15260 Ventura Blvd Suite 500Sherman Oaks, CA 
  91403Direct: (818) 461-8620mailto:[EMAIL PROTECTED]-Original 
  Message-From: Lance -a-lot [mailto:[EMAIL PROTECTED]]Sent: 
  Tuesday, September 18, 2001 9:51 AMTo: MS-Exchange Admin 
  IssuesSubject: Re: New Virus AlertDo you know 
  the name of the virus? From: "Zangara, Jim" [EMAIL PROTECTED] 
  Reply-To: "MS-Exchange Admin Issues" [EMAIL PROTECTED] 
  To: "MS-Exchange Admin Issues" [EMAIL PROTECTED] 
  Subject: New Virus Alert Date: Tue, 18 Sep 2001 09:32:37 
  -0700  Hey folks we are getting nailed by this new 
  virus - we had already

RE: New Virus Alert

2001-09-18 Thread RZorz
Title: Message



Panda 
sucks. I need Antigen.

  -Original Message-From: Arnold, Jamie 
  [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 
  9:46 AMTo: MS-Exchange Admin IssuesSubject: RE: New 
  Virus Alert
  It's been hitting for hours. New worm, IIS exploit, very hard 
  hitting..fast...
  
  Ck Securityfocus.com, Incidents.
  Jamie
  

-Original Message-From: Zangara, Jim 
[mailto:[EMAIL PROTECTED]] Sent: Tuesday, September 18, 
2001 12:33 PMTo: MS-Exchange Admin IssuesSubject: New 
Virus Alert
Hey folks we are getting nailed by this new virus - we had 
already blocked the exe extension but there are two new extensions causing 
the windows media player to start - and share your C drive and propagate 
itself. We are now blocking the *.EML and *.NWS per 
Antigen.
Just wanted to spread the word - not the virus :) 

Good luck. 
Jim Zangara, MCSE+I Special Projects 
Engineer Premiere Radio Networks A Division of Clear Channel Communications 15260 Ventura Blvd Suite 500 Sherman Oaks, CA 
91403 Direct: (818) 461-8620 mailto:[EMAIL PROTECTED] 

-Original Message- From: 
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] 
Sent: Tuesday, September 18, 2001 9:21 AM 
To: Zangara, Jim Subject: Re: 
(ROB)RE: Antigen 
Jim, 
Here is a copy of what Sophios is saying in case you have 
not seen this yet: 
Name: W32/Nimda-A Type: W32 
executable file virus Date: 18 September 2001 

A virus identity file (IDE) which provides protection is 
available now from our website and will be incorporated into the November 
2001 (3.51) release of Sophos Anti-Virus.
Sophos has received many reports of this virus from the 
wild. 
Description: 
W32/Nimda-A is an email-aware virus that spreads using an 
attached filename of README.EXE. 
Sophos researchers are continuing to examine the virus and 
will be posting a more detailed description of the virus on the Sophos 
website once the analysis is complete.
Use the file filter that I told you about earlier, 
README.EXE on all file types. 
Robert McCarthy Sybari Software, 
Inc. E-mail: [EMAIL PROTECTED] Phone: 631-630-8500 Option # 23 http://www.sybari.com 

Please respond to [EMAIL PROTECTED] List Charter 
and FAQ 
  at:http://www.sunbelt-software.com/exchange_list_charter.htmList 
  Charter and FAQ 
  at:http://www.sunbelt-software.com/exchange_list_charter.htm
List Charter and FAQ at:
http://www.sunbelt-software.com/exchange_list_charter.htm





RE: New Virus Alert

2001-09-18 Thread Stephen J. Norton



If 
it's any consolation Lance, it's banging the hell out of me also. Seems to 
replicate richad20.dll and *.eml files on servers. I'm talking hundreds of 
thousands of the suckers. Worst is, CAI claims the viruspattern files I 
updated this morning before the attack takes care of it! Another load of horse 
manure form an already suspect company. If anyone knows exactly how this works, 
and I mean exactly, I'd sure like to know. Even with all workstations shut down, 
it still replicates itself on my PDC as fast as I can delete the dll and eml 
files. On infected workstations, repairing the sys.ini file and deleting 
load.exe from the \\windows\system 
directory does not help. On reboot, the sys.ini is modified again and the 
load.exe is back in place. Making the system.ini file read only seems to help. 
Good luck.
Oh 
yeah-tried calling Computer Associates tech support for two hours today. Was 
kept in a holding pattern for 30 minutes and then disconnected. Nice people. 


  -Original Message-From: Lance -a-lot 
  [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 
  11:07 PMTo: MS-Exchange Admin IssuesSubject: RE: New 
  Virus AlertThanks. It's killing us. NAI seems to have 
  numerous update, as well as, MS. Some get fixed, some don't. Half the 
  network is down due this bad boy. Be careful with this one, especially 
  software companies running IIS.From: "Zangara, Jim" [EMAIL PROTECTED]Reply-To: 
  "MS-Exchange Admin Issues" [EMAIL PROTECTED]To: 
  "MS-Exchange Admin Issues" [EMAIL PROTECTED]Subject: 
  RE: New Virus AlertDate: Tue, 18 Sep 2001 10:47:03 
  -0700W32/Nimda.A@mm - just 
  came in from antigen.Virus 
  Name:---W32/Nimda.A@mmAlias:---W32/Nimda-AW32/Nimda-mmE-mail 
  Subject:---NoneE-mail 
  Body:---NoneE-mail 
  Attachments:---README.EXEDescription:---This 
  worm will enter a computer in one out of possibly two ways - it 
  willeither be received as an email with an attachment, and it seems 
  that it willalso attempt to break into machines running the 
  web server software IIS(Internet Information Server), through a 
  security hole known as a "directorytraversal 
  exploit".When the file is run, it will copy itself to the system 
  directory as ahidden file called LOAD.EXE. This file is called from 
  the file SYSTEM.INI sothat it is run from 
  startup.At the Present time a Filter Rule for : 
  Readme.exe (all types) will removethis from your email 
  serverWe will be releasing AV Engine Updates when they are 
  made available.Thank You,Sybari Software, 
  Inc.Jim Zangara, MCSE+ISpecial Projects 
  EngineerPremiere Radio NetworksA Division of Clear Channel 
  Communications15260 Ventura Blvd Suite 500Sherman Oaks, CA 
  91403Direct: (818) 461-8620mailto:[EMAIL PROTECTED]-Original 
  Message-From: Lance -a-lot [mailto:[EMAIL PROTECTED]]Sent: 
  Tuesday, September 18, 2001 9:51 AMTo: MS-Exchange Admin 
  IssuesSubject: Re: New Virus AlertDo you know 
  the name of the virus? From: "Zangara, Jim" [EMAIL PROTECTED] 
  Reply-To: "MS-Exchange Admin Issues" [EMAIL PROTECTED] 
  To: "MS-Exchange Admin Issues" [EMAIL PROTECTED] 
  Subject: New Virus Alert Date: Tue, 18 Sep 2001 09:32:37 
  -0700  Hey folks we are getting nailed by this new 
  virus - we had already blocked the exe extension but there are two 
  new extensions causing the windows media player to start - and 
  share your C drive and propagate itself. We are now blocking the 
  *.EML and *.NWS per Antigen.  Just wanted to spread 
  the word - not the virus :)  Good luck. 
   Jim Zangara, MCSE+I Special Projects 
  Engineer Premiere Radio Networks A Division of Clear 
  Channel Communications 15260 Ventura Blvd Suite 500 
  Sherman Oaks, CA 91403 Direct: (818) 461-8620 mailto:[EMAIL PROTECTED] 
   -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] 
  Sent: Tuesday, September 18, 2001 9:21 AM To: Zangara, 
  Jim Subject: Re: (ROB)RE: Antigen  
Jim,  Here is a copy of 
  what Sophios is saying in case you have not seen this yet: 
   Name: W32/Nimda-A Type: W32 executable file 
  virus Date: 18 September 2001  A virus 
  identity file (IDE) which provides protection is available now 
  from our website and will be incorporated into the November 2001 
  (3.51) release of Sophos Anti-Virus.  
  Sophos has received many reports of this virus from the wild. 
   Description:  W32/Nimda-A is an 
  email-aware virus that spreads using an attached filename of 
  README.EXE.  Sophos researchers are continuing to 
  examine the virus and will be posting a 
  more detailed description of the virus on the Sophos website once 
  the analysis is complete.   
  Use the file filter that I told you about earlier, README.EXE on 
  all file types.  Robert McCarthy 
  Sybari Software, Inc. E-mail: [EMAIL PROTECTED] Phone: 
  631-630-8500 Option # 23 http://www.sybari.com  
  Please respond to [EMAIL 

RE: New Virus Alert

2001-09-18 Thread Clark, Steve









Was beginning
to wonder if you took the day off?



Steve Clark

Clark Systems Support, LLC

AVIEN Charter Member

www.clarksupport.com

  301-610-9584
voice

  240-465-0323 Efax



-Original
Message-
From: Lefkovics, William
[mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 18, 2001
11:31 PM
To: MS-Exchange Admin Issues
Subject: RE: New Virus Alert



If it's any
consolation Lance, it's banging the hell out of me also.



Well, that's a little
personal Stephen.



CAI claims the
viruspattern files I updated this morning before the attack takes care of
it!



bigassumption

Well... it seems we know
who wrote it, then...

/bigassumption



If anyone knows
exactly how this works, and I mean exactly, I'd sure like to know. 



It seems many are still
up trying to determine that 100%



deleting load.exe



I've learned it not
usually prudent to lose your load on a computer.



 Good luck.



Thank you. You as
well.







-Original
Message-
From: Stephen J. Norton
[mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 18, 2001
8:28 PM
To: MS-Exchange Admin Issues
Subject: RE: New Virus Alert

If it's any consolation
Lance, it's banging the hell out of me also. Seems to replicate richad20.dll
and *.eml files on servers. I'm talking hundreds of thousands of the suckers.
Worst is, CAI claims the viruspattern files I updated this morning before
the attack takes care of it! Another load of horse manure form an already
suspect company. If anyone knows exactly how this works, and I mean exactly,
I'd sure like to know. Even with all workstations shut down, it still replicates
itself on my PDC as fast as I can delete the dll and eml files. On infected
workstations, repairing the sys.ini file and deleting load.exe from the \\windows\system directory does not help. On
reboot, the sys.ini is modified again and the load.exe is back in place. Making
the system.ini file read only seems to help. Good luck.

Oh yeah-tried calling
Computer Associates tech support for two hours today. Was kept in a holding
pattern for 30 minutes and then disconnected. Nice people. 

-Original
Message-
From: Lance -a-lot
[mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 18, 2001
11:07 PM
To: MS-Exchange Admin Issues
Subject: RE: New Virus Alert

Thanks. It's killing us. NAI seems to have
numerous update, as well as, MS. 
Some get fixed, some don't. Half the network is down due this bad boy. Be 
careful with this one, especially software companies running IIS.


From: Zangara, Jim [EMAIL PROTECTED]
Reply-To: MS-Exchange Admin Issues 
[EMAIL PROTECTED]
To: MS-Exchange Admin Issues [EMAIL PROTECTED]
Subject: RE: New Virus Alert
Date: Tue, 18 Sep 2001 10:47:03 -0700

W32/Nimda.A@mm - just came in from
antigen.


Virus Name:
---
W32/Nimda.A@mm


Alias:
---
W32/Nimda-A
W32/Nimda-mm



E-mail Subject:
---
None



E-mail Body:
---
None


E-mail Attachments:
---
README.EXE


Description:
---
This worm will enter a computer in one out of possibly two ways - it will
either be received as an email with an attachment, and it seems that it 
will
also attempt to break into machines running the web server software IIS
(Internet Information Server), through a security hole known as a 
directory
traversal exploit.
When the file is run, it will copy itself to the system directory as a
hidden file called LOAD.EXE. This file is called from the file SYSTEM.INI 
so
that it is run from startup.


At the Present time a Filter Rule for : Readme.exe (all types) will remove
this from your email server

We will be releasing AV Engine Updates when they are made available.

Thank You,

Sybari Software, Inc.


Jim Zangara, MCSE+I
Special Projects Engineer
Premiere Radio Networks
A Division of Clear Channel Communications
15260 Ventura Blvd Suite 500
Sherman Oaks, CA 91403
Direct: (818) 461-8620
mailto:[EMAIL PROTECTED]




-Original Message-
From: Lance -a-lot [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 18, 2001 9:51 AM
To: MS-Exchange Admin Issues
Subject: Re: New Virus Alert


Do you know the name of the virus?


 From: Zangara, Jim [EMAIL PROTECTED]
 Reply-To: MS-Exchange Admin Issues
 [EMAIL PROTECTED]
 To: MS-Exchange Admin Issues [EMAIL PROTECTED]
 Subject: New Virus Alert
 Date: Tue, 18 Sep 2001 09:32:37 -0700
 
 Hey folks we are getting nailed by this new virus - we had already
 blocked the exe extension but there are two new extensions causing the
 windows media player to start - and share your C drive and propagate
 itself. We are now blocking the *.EML and *.NWS per Antigen.
 
 Just wanted to spread the word - not the virus :)
 
 Good luck.
 
 Jim Zangara, MCSE+I
 Special Projects Engineer
 Premiere Radio Networks
 A Division of Clear Channel Communications
 15260 Ventura Blvd Suite 500
 Sherman Oaks, CA 91403
 Direct: (818) 461-8620
 mailto:[EMAIL PROTECTED]
 
 -Original Message-
 From: [EMAIL

RE: New Virus Alert

2001-09-18 Thread Lefkovics, William



Our 
ISP apparently has many an IIS server yet to be patched from October of 
2000.

The 
inbound and outbound traffic toasted our connection. We had a trickling of 
inbound emails and that is all. No successful HTTP browsing (read: not 
able to research this worm thingie). Outbound emails sat in the IMS 
queues.

Then 
we had someone internally [1]get the readme.exe possibly from 
Hotmail? 12,500 *.eml filesand 1750 
*.dll'slater

[1] an 
associated company

Otherwise 
perfectly alright, given the circumstances.

You 
probably weren't asking, but that's the scoop, nonetheless.

William

-Original Message-From: Clark, Steve 
[mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 8:34 
PMTo: MS-Exchange Admin IssuesSubject: RE: New Virus 
Alert

Was 
beginning to wonder if you took the day off?

Steve 
Clark
Clark 
Systems Support, LLC
AVIEN 
Charter Member
www.clarksupport.com
 
301-610-9584 voice
 
240-465-0323 Efax

-Original 
Message-From: Lefkovics, 
William [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 11:31 
PMTo: MS-Exchange Admin 
IssuesSubject: RE: New Virus 
Alert

If 
it's any consolation Lance, it's banging the hell out of me 
also.

Well, 
that's a little personal Stephen.

CAI claims the 
viruspattern files I updated this morning before the attack takes care of 
it!

bigassumption
Well... it 
seems we know who wrote it, then...
/bigassumption

If 
anyone knows exactly how this works, and I mean exactly, I'd sure like to know. 


It seems 
many are still up trying to determine that 100%

deleting 
load.exe

I've 
learned it not usually prudent to lose your load on a 
computer.

 
Good luck.

Thank 
you. You as well.



-Original 
Message-From: Stephen J. 
Norton [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 8:28 
PMTo: MS-Exchange Admin 
IssuesSubject: RE: New Virus 
Alert
If it's 
any consolation Lance, it's banging the hell out of me also. Seems to replicate 
richad20.dll and *.eml files on servers. I'm talking hundreds of thousands of 
the suckers. Worst is, CAI claims the viruspattern files I updated this 
morning before the attack takes care of it! Another load of horse manure form an 
already suspect company. If anyone knows exactly how this works, and I mean 
exactly, I'd sure like to know. Even with all workstations shut down, it still 
replicates itself on my PDC as fast as I can delete the dll and eml files. On 
infected workstations, repairing the sys.ini file and deleting load.exe from the 
\\windows\system directory does not help. 
On reboot, the sys.ini is modified again and the load.exe is back in place. 
Making the system.ini file read only seems to help. Good 
luck.
Oh 
yeah-tried calling Computer Associates tech support for two hours today. Was 
kept in a holding pattern for 30 minutes and then disconnected. Nice people. 

-Original 
Message-From: Lance -a-lot 
[mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 11:07 
PMTo: MS-Exchange Admin 
IssuesSubject: RE: New Virus 
Alert
Thanks. It's killing us. NAI seems to have 
numerous update, as well as, MS. Some get fixed, some don't. Half the 
network is down due this bad boy. Be careful with this one, especially 
software companies running IIS.
List Charter and FAQ at:
http://www.sunbelt-software.com/exchange_list_charter.htm





RE: New Virus Alert

2001-09-18 Thread Clark, Steve









Always nice to hear someone else’s pain. Makes my day a little better.



Amazing that regardless of explaining the whole hotmail/ yahoo threat –
people still do it and then sound “AMAZED” when you explain it, again.



Have a happy.



Steve Clark

Clark Systems Support, LLC

AVIEN Charter Member

www.clarksupport.com

  301-610-9584
voice

  240-465-0323 Efax



-Original
Message-
From: Lefkovics, William
[mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 18, 2001
11:37 PM
To: MS-Exchange Admin Issues
Subject: RE: New Virus Alert



Our ISP apparently has
many an IIS server yet to be patched from October of 2000.



The inbound and outbound
traffic toasted our connection. We had a trickling of inbound emails and
that is all. No successful HTTP browsing (read: not able to research this
worm thingie). Outbound emails sat in the IMS queues.



Then we had someone
internally [1]get the readme.exe possibly from Hotmail? 12,500
*.eml filesand 1750 *.dll'slater



[1] an associated company



Otherwise perfectly
alright, given the circumstances.



You probably weren't
asking, but that's the scoop, nonetheless.



William



-Original
Message-
From: Clark, Steve
[mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 18, 2001
8:34 PM
To: MS-Exchange Admin Issues
Subject: RE: New Virus Alert

Was beginning to wonder if you took the day off?



Steve Clark

Clark Systems Support, LLC

AVIEN Charter Member

www.clarksupport.com

  301-610-9584
voice

  240-465-0323
Efax



-Original
Message-
From: Lefkovics, William
[mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 18, 2001
11:31 PM
To: MS-Exchange Admin Issues
Subject: RE: New Virus Alert



If
it's any consolation Lance, it's banging the hell out of me also.



Well,
that's a little personal Stephen.



CAI
claims the viruspattern files I updated this morning before the attack
takes care of it!



bigassumption

Well...
it seems we know who wrote it, then...

/bigassumption



If
anyone knows exactly how this works, and I mean exactly, I'd sure like to know.




It seems
many are still up trying to determine that 100%



deleting
load.exe



I've
learned it not usually prudent to lose your load on a computer.




Good luck.



Thank
you. You as well.







-Original
Message-
From: Stephen J. Norton
[mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 18, 2001
8:28 PM
To: MS-Exchange Admin Issues
Subject: RE: New Virus Alert

If it's any
consolation Lance, it's banging the hell out of me also. Seems to replicate
richad20.dll and *.eml files on servers. I'm talking hundreds of thousands of
the suckers. Worst is, CAI claims the viruspattern files I updated this
morning before the attack takes care of it! Another load of horse manure form
an already suspect company. If anyone knows exactly how this works, and I mean
exactly, I'd sure like to know. Even with all workstations shut down, it still
replicates itself on my PDC as fast as I can delete the dll and eml files. On
infected workstations, repairing the sys.ini file and deleting load.exe from
the \\windows\system directory does not
help. On reboot, the sys.ini is modified again and the load.exe is back in
place. Making the system.ini file read only seems to help. Good luck.

Oh
yeah-tried calling Computer Associates tech support for two hours today. Was
kept in a holding pattern for 30 minutes and then disconnected. Nice people. 

-Original Message-
From: Lance -a-lot
[mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 18, 2001
11:07 PM
To: MS-Exchange Admin Issues
Subject: RE: New Virus Alert

Thanks. It's killing us. NAI seems to have
numerous update, as well as, MS. 
Some get fixed, some don't. Half the network is down due this bad boy. Be 
careful with this one, especially software companies running IIS.

List Charter
and FAQ at:
http://www.sunbelt-software.com/exchange_list_charter.htm




List Charter and FAQ at:
http://www.sunbelt-software.com/exchange_list_charter.htm







RE: New Virus Alert

2001-09-18 Thread Brian Bauer ** Network Technician



NAI 
again has another DAT file. I don't think anyone knows what this thing 
really does yet 

Thank 
god for mailsweeper for smtp, and blocking exe's!

  -Original Message-From: Clark, Steve 
  [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 
  11:42 PMTo: MS-Exchange Admin IssuesSubject: RE: New 
  Virus Alert
  
  Always 
  nice to hear someone else’s pain. Makes my day a little 
  better.
  
  Amazing 
  that regardless of explaining the whole hotmail/ yahoo threat – people still 
  do it and then sound “AMAZED” when you explain it, 
  again.
  
  Have a 
  happy.
  
  Steve 
  Clark
  Clark 
  Systems Support, LLC
  AVIEN 
  Charter Member
  www.clarksupport.com
   
  301-610-9584 voice
   
  240-465-0323 Efax
  
  -Original 
  Message-From: Lefkovics, 
  William [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 11:37 
  PMTo: MS-Exchange Admin 
  IssuesSubject: RE: New Virus 
  Alert
  
  Our ISP 
  apparently has many an IIS server yet to be patched from October of 
  2000.
  
  The 
  inbound and outbound traffic toasted our connection. We had a trickling 
  of inbound emails and that is all. No successful HTTP browsing (read: 
  not able to research this worm thingie). Outbound emails sat in the IMS 
  queues.
  
  Then we 
  had someone internally [1]get the readme.exe possibly from 
  Hotmail? 12,500 *.eml filesand 1750 
  *.dll'slater
  
  [1] an 
  associated company
  
  Otherwise 
  perfectly alright, given the circumstances.
  
  You 
  probably weren't asking, but that's the scoop, nonetheless.
  
  William
  
  -Original 
  Message-From: Clark, 
  Steve [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 8:34 
  PMTo: MS-Exchange Admin 
  IssuesSubject: RE: New Virus 
  Alert
  Was 
  beginning to wonder if you took the day 
  off?
  
  Steve 
  Clark
  Clark 
  Systems Support, LLC
  AVIEN 
  Charter Member
  www.clarksupport.com
   
  301-610-9584 voice
   
  240-465-0323 Efax
  
  -Original 
  Message-From: Lefkovics, 
  William [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 11:31 
  PMTo: MS-Exchange Admin 
  IssuesSubject: RE: New Virus 
  Alert
  
  If it's any 
  consolation Lance, it's banging the hell out of me also.
  
  Well, 
  that's a little personal Stephen.
  
  CAI claims 
  the viruspattern files I updated this morning before the attack takes 
  care of it!
  
  bigassumption
  Well... 
  it seems we know who wrote it, then...
  /bigassumption
  
  If anyone 
  knows exactly how this works, and I mean exactly, I'd sure like to know. 
  
  
  It seems 
  many are still up trying to determine that 100%
  
  deleting 
  load.exe
  
  I've 
  learned it not usually prudent to lose your load on a 
  computer.
  
   
  Good luck.
  
  Thank 
  you. You as well.
  
  
  
  -Original 
  Message-From: Stephen J. 
  Norton [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 8:28 
  PMTo: MS-Exchange Admin 
  IssuesSubject: RE: New Virus 
  Alert
  If it's 
  any consolation Lance, it's banging the hell out of me also. Seems to 
  replicate richad20.dll and *.eml files on servers. I'm talking hundreds of 
  thousands of the suckers. Worst is, CAI claims the viruspattern files I 
  updated this morning before the attack takes care of it! Another load of horse 
  manure form an already suspect company. If anyone knows exactly how this 
  works, and I mean exactly, I'd sure like to know. Even with all workstations 
  shut down, it still replicates itself on my PDC as fast as I can delete the 
  dll and eml files. On infected workstations, repairing the sys.ini file and 
  deleting load.exe from the \\windows\system directory does not help. 
  On reboot, the sys.ini is modified again and the load.exe is back in place. 
  Making the system.ini file read only seems to help. Good 
  luck.
  Oh 
  yeah-tried calling Computer Associates tech support for two hours today. Was 
  kept in a holding pattern for 30 minutes and then disconnected. Nice people. 
  
  -Original 
  Message-From: Lance 
  -a-lot [mailto:[EMAIL PROTECTED]]Sent: Tuesday, September 18, 2001 11:07 
  PMTo: MS-Exchange Admin 
  IssuesSubject: RE: New Virus 
  Alert
  Thanks. It's killing us. NAI seems to 
  have numerous update, as well as, MS. Some get fixed, some don't. Half the 
  network is down due this bad boy. Be careful with this one, especially 
  software companies running IIS.
  List 
  Charter and FAQ 
  at:http://www.sunbelt-software.com/exchange_list_charter.htmList 
  Charter and FAQ 
  at:http://www.sunbelt-software.com/exchange_list_charter.htm
List Charter and FAQ at:
http://www.sunbelt-software.com/exchange_list_charter.htm