Re: [JAWS-Users] virus article about storm us news world report

2007-10-22 Thread Moderator
Hi Marilyn,
just a friendly reminder. smile
>From the list guidelines:
Please try to keep subject lines relevant and descriptive as possible. Also
any news letters except those that directly pertain to JAWS should not be
posted
to the list prior to receiving moderator approval.
After checking with the management team, this would actually be better 
suited for the blind-computing list.
Thanks,
Richard Justice-list moderator
www.jaws-users.com
Richard Justice-website ownner
www.blind-computing.com
- Original Message - 
From: "Marilyn Walker" <[EMAIL PROTECTED]>
To: 
Cc: <[EMAIL PROTECTED]>
Sent: Monday, October 22, 2007 1:28 PM
Subject: [JAWS-Users] virus article about storm us news world report


> Hi, all.  Thought this article was worth passing along and hope I don't
> get
> in trouble with the moderators.  marilyn
>
> Worming Into Your Hard Drive
> A growing computer virus is proving unusually hard to beat
>
> By Chris Wilson
>
> Posted October 19, 2007
>
> 'Hello, this is an investor alert." The female voice drones on for 15
> seconds about a new stock that is a "huge success in Canada" and expecting
> big returns
> in the United States. But anyone who opened Elvis.mp3 or its variants,
> which
> appeared last week as an attachment to a spam E-mail, has actually just
> invited
> a cutting-edge computer virus to come live on his hard drive and spread.
> The
> audio file is just the newest delivery vehicle for a diabolically clever
> virus
> that has amazed analysts with its ability to flood the Internet with spam
> while protecting itself-and its creators -from detection.
>
> Related News
> list of 5 items
> . Blog: Microsoft Extends Windows XP's Life (Oct. 5)
> . Apple's Mac Sales Are Surging (Sep. 26)
> . New Websites Emphasize Civility of Conversation (Jun. 10)
> . Vista's Lesson in Bad Buzz (May 15)
> . Video: National News
> list end
>
> The virus is called Storm Worm, and since it showed up in January under
> the
> E-mail subject line of "230 dead as storm batters Europe," it has infected
> what
> most experts say is at least 1 million computers and what some estimate is
> 10 million. The infection represents the future of cyberthreats, they say,
> proving
> the need for new ways to protect information online.
>
> Storm is not the most damaging of computer viruses, but it may be the most
> sophisticated. Unlike some viruses, Storm's goal is not to destroy its
> host
> computer.
> "Any good parasite wants to keep its host alive," says Don Jackson of the
> cybersecurity firm SecureWorks. Instead, the virus commandeers the
> computer's
> resources to attack competing viruses or to send out billions of pieces of
> junk E-mail, all the while looking for new hosts to infect.
>
> Once Storm installs, it secretly receives orders from its controllers.
> But,
> in a twist, most copies of the virus don't contact the controllers
> directly;
> instead commands are relayed through other infected computers to conceal
> the
> source. It is this method of diffusing control that has prevented
> authorities
> from tracing Storm back to its authors.
>
> Quick-change tricks. A battery of other defenses makes the virus uniquely
> impregnable. It quickly adapts as authors update it with new E-mail
> subject
> lines
> that mimic the news or pop-culture alerts-"A killer at 11, he's free at
> 21"
> or "Dude, this is not even on MTV yet." And recently it has been spreading
> through YouTube's internal message service by creating fraudulent messages
> from other users.
>
> Experts say Storm Worm's creators are capable of using it for more
> nefarious
> means, such as flooding a website with so much traffic that it shuts down
> or
> downloading software that attacks the user's machine. Storm also points to
> a
> worrisome trend: The virus makers are starting to cooperate with each
> other.
> "We've seen a couple of these  families really branch out as the trend
> goes from individual authors to small confederations to large teams," says
> Jackson.
> Meanwhile, the virus has begun splitting into smaller pieces, allowing its
> authors to sell its services to even more cybercriminals at once.
>
> Antivirus companies have caught some versions of Storm, and Microsoft
> reported removing about 275,000 cases in September. Still, says Vinny
> Gullotto, who
> tracks infections for Microsoft, keeping on top of Storm Worm requires
> updates every day.
>
> MORE BAD BUGS
>
> Other innovative viruses that, like Storm Worm, are finding new ways to
> cause trouble.
>
> IRS scam: Targe

[JAWS-Users] virus article about storm us news world report

2007-10-22 Thread Marilyn Walker
Hi, all.  Thought this article was worth passing along and hope I don't get 
in trouble with the moderators.  marilyn

Worming Into Your Hard Drive
A growing computer virus is proving unusually hard to beat

By Chris Wilson

Posted October 19, 2007

'Hello, this is an investor alert." The female voice drones on for 15 
seconds about a new stock that is a "huge success in Canada" and expecting 
big returns
in the United States. But anyone who opened Elvis.mp3 or its variants, which 
appeared last week as an attachment to a spam E-mail, has actually just 
invited
a cutting-edge computer virus to come live on his hard drive and spread. The 
audio file is just the newest delivery vehicle for a diabolically clever 
virus
that has amazed analysts with its ability to flood the Internet with spam 
while protecting itself-and its creators -from detection.

Related News
list of 5 items
. Blog: Microsoft Extends Windows XP's Life (Oct. 5)
. Apple's Mac Sales Are Surging (Sep. 26)
. New Websites Emphasize Civility of Conversation (Jun. 10)
. Vista's Lesson in Bad Buzz (May 15)
. Video: National News
list end

The virus is called Storm Worm, and since it showed up in January under the 
E-mail subject line of "230 dead as storm batters Europe," it has infected 
what
most experts say is at least 1 million computers and what some estimate is 
10 million. The infection represents the future of cyberthreats, they say, 
proving
the need for new ways to protect information online.

Storm is not the most damaging of computer viruses, but it may be the most 
sophisticated. Unlike some viruses, Storm's goal is not to destroy its host 
computer.
"Any good parasite wants to keep its host alive," says Don Jackson of the 
cybersecurity firm SecureWorks. Instead, the virus commandeers the 
computer's
resources to attack competing viruses or to send out billions of pieces of 
junk E-mail, all the while looking for new hosts to infect.

Once Storm installs, it secretly receives orders from its controllers. But, 
in a twist, most copies of the virus don't contact the controllers directly;
instead commands are relayed through other infected computers to conceal the 
source. It is this method of diffusing control that has prevented 
authorities
from tracing Storm back to its authors.

Quick-change tricks. A battery of other defenses makes the virus uniquely 
impregnable. It quickly adapts as authors update it with new E-mail subject 
lines
that mimic the news or pop-culture alerts-"A killer at 11, he's free at 21" 
or "Dude, this is not even on MTV yet." And recently it has been spreading
through YouTube's internal message service by creating fraudulent messages 
from other users.

Experts say Storm Worm's creators are capable of using it for more nefarious 
means, such as flooding a website with so much traffic that it shuts down or
downloading software that attacks the user's machine. Storm also points to a 
worrisome trend: The virus makers are starting to cooperate with each other.
"We've seen a couple of these  families really branch out as the trend 
goes from individual authors to small confederations to large teams," says 
Jackson.
Meanwhile, the virus has begun splitting into smaller pieces, allowing its 
authors to sell its services to even more cybercriminals at once.

Antivirus companies have caught some versions of Storm, and Microsoft 
reported removing about 275,000 cases in September. Still, says Vinny 
Gullotto, who
tracks infections for Microsoft, keeping on top of Storm Worm requires 
updates every day.

MORE BAD BUGS

Other innovative viruses that, like Storm Worm, are finding new ways to 
cause trouble.

IRS scam: Targets business executives with bogus tax or business complaints. 
If opened, it installs viruses that collect personal information sent 
through
Internet Explorer.

Bubbles: Spreads through the messaging service on Skype, a popular Internet 
phone service. It then disables security software.

Renos: Displays a bogus security alert that connects PCs to a malicious 
server and downloads harmful software.



Visit the JAWS Users List home page at:
http://www.jaws-users.com
Address for the list archives:
http://www.mail-archive.com/jaws-users-list@jaws-users.com
To post to this group, send email to 
jaws-users-list@jaws-users.com
To unsubscribe from this group, send an email to 
[EMAIL PROTECTED]
For help from Mailman with your account Put the word help in the subject or 
body of a blank message to:
[EMAIL PROTECTED]
Use the following form in order to contact the management team
http://www.jaws-users.com/managers.php
If you wish to join the Blind Computing list send a blank email to the 
following address:
[EMAIL PROTECTED]