Re: [JAWS-Users] virus article about storm us news world report
Hi Marilyn, just a friendly reminder. smile >From the list guidelines: Please try to keep subject lines relevant and descriptive as possible. Also any news letters except those that directly pertain to JAWS should not be posted to the list prior to receiving moderator approval. After checking with the management team, this would actually be better suited for the blind-computing list. Thanks, Richard Justice-list moderator www.jaws-users.com Richard Justice-website ownner www.blind-computing.com - Original Message - From: "Marilyn Walker" <[EMAIL PROTECTED]> To: Cc: <[EMAIL PROTECTED]> Sent: Monday, October 22, 2007 1:28 PM Subject: [JAWS-Users] virus article about storm us news world report > Hi, all. Thought this article was worth passing along and hope I don't > get > in trouble with the moderators. marilyn > > Worming Into Your Hard Drive > A growing computer virus is proving unusually hard to beat > > By Chris Wilson > > Posted October 19, 2007 > > 'Hello, this is an investor alert." The female voice drones on for 15 > seconds about a new stock that is a "huge success in Canada" and expecting > big returns > in the United States. But anyone who opened Elvis.mp3 or its variants, > which > appeared last week as an attachment to a spam E-mail, has actually just > invited > a cutting-edge computer virus to come live on his hard drive and spread. > The > audio file is just the newest delivery vehicle for a diabolically clever > virus > that has amazed analysts with its ability to flood the Internet with spam > while protecting itself-and its creators -from detection. > > Related News > list of 5 items > . Blog: Microsoft Extends Windows XP's Life (Oct. 5) > . Apple's Mac Sales Are Surging (Sep. 26) > . New Websites Emphasize Civility of Conversation (Jun. 10) > . Vista's Lesson in Bad Buzz (May 15) > . Video: National News > list end > > The virus is called Storm Worm, and since it showed up in January under > the > E-mail subject line of "230 dead as storm batters Europe," it has infected > what > most experts say is at least 1 million computers and what some estimate is > 10 million. The infection represents the future of cyberthreats, they say, > proving > the need for new ways to protect information online. > > Storm is not the most damaging of computer viruses, but it may be the most > sophisticated. Unlike some viruses, Storm's goal is not to destroy its > host > computer. > "Any good parasite wants to keep its host alive," says Don Jackson of the > cybersecurity firm SecureWorks. Instead, the virus commandeers the > computer's > resources to attack competing viruses or to send out billions of pieces of > junk E-mail, all the while looking for new hosts to infect. > > Once Storm installs, it secretly receives orders from its controllers. > But, > in a twist, most copies of the virus don't contact the controllers > directly; > instead commands are relayed through other infected computers to conceal > the > source. It is this method of diffusing control that has prevented > authorities > from tracing Storm back to its authors. > > Quick-change tricks. A battery of other defenses makes the virus uniquely > impregnable. It quickly adapts as authors update it with new E-mail > subject > lines > that mimic the news or pop-culture alerts-"A killer at 11, he's free at > 21" > or "Dude, this is not even on MTV yet." And recently it has been spreading > through YouTube's internal message service by creating fraudulent messages > from other users. > > Experts say Storm Worm's creators are capable of using it for more > nefarious > means, such as flooding a website with so much traffic that it shuts down > or > downloading software that attacks the user's machine. Storm also points to > a > worrisome trend: The virus makers are starting to cooperate with each > other. > "We've seen a couple of these families really branch out as the trend > goes from individual authors to small confederations to large teams," says > Jackson. > Meanwhile, the virus has begun splitting into smaller pieces, allowing its > authors to sell its services to even more cybercriminals at once. > > Antivirus companies have caught some versions of Storm, and Microsoft > reported removing about 275,000 cases in September. Still, says Vinny > Gullotto, who > tracks infections for Microsoft, keeping on top of Storm Worm requires > updates every day. > > MORE BAD BUGS > > Other innovative viruses that, like Storm Worm, are finding new ways to > cause trouble. > > IRS scam: Targe
[JAWS-Users] virus article about storm us news world report
Hi, all. Thought this article was worth passing along and hope I don't get in trouble with the moderators. marilyn Worming Into Your Hard Drive A growing computer virus is proving unusually hard to beat By Chris Wilson Posted October 19, 2007 'Hello, this is an investor alert." The female voice drones on for 15 seconds about a new stock that is a "huge success in Canada" and expecting big returns in the United States. But anyone who opened Elvis.mp3 or its variants, which appeared last week as an attachment to a spam E-mail, has actually just invited a cutting-edge computer virus to come live on his hard drive and spread. The audio file is just the newest delivery vehicle for a diabolically clever virus that has amazed analysts with its ability to flood the Internet with spam while protecting itself-and its creators -from detection. Related News list of 5 items . Blog: Microsoft Extends Windows XP's Life (Oct. 5) . Apple's Mac Sales Are Surging (Sep. 26) . New Websites Emphasize Civility of Conversation (Jun. 10) . Vista's Lesson in Bad Buzz (May 15) . Video: National News list end The virus is called Storm Worm, and since it showed up in January under the E-mail subject line of "230 dead as storm batters Europe," it has infected what most experts say is at least 1 million computers and what some estimate is 10 million. The infection represents the future of cyberthreats, they say, proving the need for new ways to protect information online. Storm is not the most damaging of computer viruses, but it may be the most sophisticated. Unlike some viruses, Storm's goal is not to destroy its host computer. "Any good parasite wants to keep its host alive," says Don Jackson of the cybersecurity firm SecureWorks. Instead, the virus commandeers the computer's resources to attack competing viruses or to send out billions of pieces of junk E-mail, all the while looking for new hosts to infect. Once Storm installs, it secretly receives orders from its controllers. But, in a twist, most copies of the virus don't contact the controllers directly; instead commands are relayed through other infected computers to conceal the source. It is this method of diffusing control that has prevented authorities from tracing Storm back to its authors. Quick-change tricks. A battery of other defenses makes the virus uniquely impregnable. It quickly adapts as authors update it with new E-mail subject lines that mimic the news or pop-culture alerts-"A killer at 11, he's free at 21" or "Dude, this is not even on MTV yet." And recently it has been spreading through YouTube's internal message service by creating fraudulent messages from other users. Experts say Storm Worm's creators are capable of using it for more nefarious means, such as flooding a website with so much traffic that it shuts down or downloading software that attacks the user's machine. Storm also points to a worrisome trend: The virus makers are starting to cooperate with each other. "We've seen a couple of these families really branch out as the trend goes from individual authors to small confederations to large teams," says Jackson. Meanwhile, the virus has begun splitting into smaller pieces, allowing its authors to sell its services to even more cybercriminals at once. Antivirus companies have caught some versions of Storm, and Microsoft reported removing about 275,000 cases in September. Still, says Vinny Gullotto, who tracks infections for Microsoft, keeping on top of Storm Worm requires updates every day. MORE BAD BUGS Other innovative viruses that, like Storm Worm, are finding new ways to cause trouble. IRS scam: Targets business executives with bogus tax or business complaints. If opened, it installs viruses that collect personal information sent through Internet Explorer. Bubbles: Spreads through the messaging service on Skype, a popular Internet phone service. It then disables security software. Renos: Displays a bogus security alert that connects PCs to a malicious server and downloads harmful software. Visit the JAWS Users List home page at: http://www.jaws-users.com Address for the list archives: http://www.mail-archive.com/jaws-users-list@jaws-users.com To post to this group, send email to jaws-users-list@jaws-users.com To unsubscribe from this group, send an email to [EMAIL PROTECTED] For help from Mailman with your account Put the word help in the subject or body of a blank message to: [EMAIL PROTECTED] Use the following form in order to contact the management team http://www.jaws-users.com/managers.php If you wish to join the Blind Computing list send a blank email to the following address: [EMAIL PROTECTED]