trendmicro claims that only a reformat and reinstall will completely remove
nimda.

we block all exe attachments at our mail gateway.


Steve Spence
Subscribe to the Renewable Energy Newsletter:
http://www.webconx.com/subscribe.htm

Renewable Energy Pages - http://www.webconx.com
Mirror Site http://www.webconx.dns2go.com/
[EMAIL PROTECTED]
(212) 894-3704 x3154 - voicemail/fax
We do not inherit the earth from our ancestors,
we borrow it from our children.

----- Original Message -----
From: "Newton, Daniel A" <[EMAIL PROTECTED]>
To: <biofuel@yahoogroups.com>
Sent: Tuesday, September 25, 2001 10:51 AM
Subject: RE: [biofuel] The Flood - unlurking with answers


> Un-lurking.
>
> This may help shed some light on what is going on.  More information can
be
> found at www.mcaffee.com The worm is most likely W32.Nimda which started
> propagating 9/17/01 and is still an issue "Out-in-the-Wild" and affects
> Microsoft operating systems.  Mcaffee has a cleaning solution using their
> 4.5 scan engine with Service Pack1 and 4162 dat files.
>
> "Mcaffee:
> VirusScan 4.03 and VirusScan 4.50 will detect the W32/[EMAIL PROTECTED] virus 
> if
> utilizing the correct engine and dat files in all cases, except when the
> virus comes on to a machine across a network share. VirusScan 4.03 and
> VirusScan 4.50 intercept calls made on the system to open files, read
files,
> write files, etc. when made from the local machine. VirusScan 4.03 and
> VirusScan 4.50 do not intercept these calls when they are being made via a
> remote machine as happens when W32/[EMAIL PROTECTED] infects machines via 
> network
> shares.
>
> In order to resolve this issue computers must be updated to a minimum of
> VirusScan 4.50 Service Pack 1, current engine, and current Dats and also
> ensure that all machines on the network are running virus protection that
> will detect and clean this virus. The ability of the virus to travel via
> network shares is due to unprotected machines on the network."
>
> More detailed information enclosed below.
>
> Thanks,
> Daniel Newton
> Systems Administrator
> MCSE SCSA CNA
>
> P.S. I'm looking to brew my first batch for my tow vehicle, a 6.2 diesel
> Suburban.  Thanks for the wealth of information and keep up the good work.
>
>
> <snip>
> -----Original Message-----
> From: Russ [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, September 18, 2001 11:21 AM
> To: [EMAIL PROTECTED]
> Subject: Alert: Some sort of IIS worm seems to be propagating
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> There have been numerous reports of IIS attacks being generated by
> machines over a broad range of IP addresses. These "infected"
> machines are using a wide variety of attacks which attempt to exploit
> already known and patched vulnerabilities against IIS.
>
> It appears that the attacks can come both from email and from the
> network.
>
> A new worm, being called w32.nimda.amm, is being sent around. The
> attachment is called README.EXE and comes as a MIME-type of
> "audio/x-wav" together with some html parts. There appears to be no
> text in this message when it is displayed by Outlook when in
> Auto-Preview mode (always a good indication there's something not
> quite right with an email.)
>
> The network attacks against IIS boxes are a wide variety of attacks.
> Amongst them appear to be several attacks that assume the machine is
> compromised by Code Red II (looking for ROOT.EXE in the /scripts and
> /msadc directory, as well as an attempt to use the /c and /d virtual
> roots to get to CMD.EXE). Further, it attempts to exploit numerous
> other known IIS vulnerabilities.
>
> One thing to note is the attempt to execute TFTP.EXE to download a
> file called ADMIN.DLL from (presumably) some previously compromised
> box.
>
> Anyone who discovers a compromised machine (a machine with ADMIN.DLL
> in the /scripts directory), please forward me a copy of that .dll
> ASAP.
>
> Also, look for TFTP traffic (UDP69). As a safeguard, consider doing
> the following;
>
> edit %systemroot/system32/drivers/etc/services.
>
> change the line;
>
> tftp 69/udp
>
> to;
>
> tftp 0/udp
>
> thereby disabling the TFTP client. W2K has TFTP.EXE protected by
> Windows File Protection so can't be removed.
>
> More information as it arises.
>
> Cheers,
> Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGP Personal Privacy 6.5.2
>
> iQCVAwUBO6dmcRBh2Kw/l7p5AQHJCgQA1JHwqF5RjJX+QVMMDUChVqn6yReQXqEH
> Tm8Ujms5+6ia0tcT1qmZWJV48eHYNzV3+AyyO6Gn8ds/NVYJUupDHB1Yy1DY/po6
> iycY2qnARDJP6KNmHI0bAdBUBtsnVo5P9itElIoqKbAorQjamKI2eqd4TdE0yfIO
> hSW7yN2lhJc=
> =YAwc
> -----END PGP SIGNATURE-----
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> Its been an exhaustive couple of days, for you all I'm sure.
>
> The Problem
> - -----------
> I've just gotten off the phone with numerous experts from the major
> companies (including AV experts and CARO members) in an effort to
> answer the question; "Is it possible to trust a cleansed server?"
>
> See, due to the things Nimda does, it may well leave your machine
> open to easy access. Even if the virus/worm components have been
> removed/cleansed, if another attack occurs that exploits the open
> shares (for example) who knows what the attack might do or leave
> behind. The effects of such an attack are not going to be obvious to
> an AV product.
>
> Basically, cleansers available now do not address some of the more
> insidious components of Nimda;
>
> - - Guest account being enabled. In the case of an infected Domain
> Controller, this means the account is enabled in the Domain.
>
> - - Guest account being added to the Administrators group. Again, on
> DCs the Guest user is added to the Domain Admins group.
>
> - - Modification to registry keys. Some reports say that values under
> LanManServer\Parameters are deleted, in an effort to remove any
> AutoShareServer value that might prevent the availability of C$,
> etc...), while other reports talk only of the creation of new shares
> (C$, D$, etc...) under that key.
>
> - - Numerous critical system files are modified, including files in the
> dllcache directory, and its questionable whether or not these can be
> restored to good health by an untested cleanser (the suggestion that
> SSL functionality might not work after cleansing.)
>
> Then there is the question as to whether or not all of the effects of
> Nimda have actually been determined. With its buggy operation, its
> possible it might do other things inconsistently, in a way that might
> leave cleansers lacking.
>
> Testing we performed today suggested that cleansers that were
> available all did a reasonable job of disinfecting an infected file,
> but the testing was limited to that since cleansing infected systems
> would require an extremely wide variety of installations.
>
> Additional Threats
> - ------------------
>
> With the open shares available, it would be possible for an attacker
> to gain entry to your system and retrieve or deposit other tools or
> data (like copying your SAM). These effects will be undetectable as
> part of AV Nimda cleansing, and could only be uncovered as a result
> of an extensive forensic effort.
>
> You should seriously consider the possibility that this has already
> happened to machines which might hold sensitive information if you
> have left them connected, or reconnect prior to a comprehensive
> cleansing and inspection.
>
> Decision Time
> - -------------
>
> The bottom line folks is that as of the time of writing, you have to
> make a decision;
>
> a) I need the system up and running now!
>
> Fine, disconnect it from infection vectors, restore it from tape or
> reformat and install fresh, patch it. Restore the data (even if its
> infected), run the currently available cleanser, and scan it again
> with your AV product. If it passes, reconnect it to the 'net and
> carry on.
>
> b) I can leave the machine turned off until Friday.
>
> Better, wait for a comprehensive cleanser from your AV Vendor
> (assuming they make one.) McAfee may already have one available and
> Symantec will have one shortly. Other AV Vendors may/will probably
> also produce one. The complexity of this thing has been such that
> multiple versions of cleansers have been required in order to do it
> "right". The same may be true of these additional cleansers.
>
> The Problem with Rebooting
> - --------------------------
>
> We noticed in our testing one cleanser that only worked if the
> machine was rebooted. Problem is that with a fully infected system, a
> reboot is not likely to bring up a live system. Depending on which
> files have been infected, a system might fail a reboot completely,
> partially, or succeed completely. Its probably safe to assume that
> rebooting an infected server is going to lead to a complete system
> failure and cause to re-install the OS.
>
> Without rebooting it may not be possible to cleanse all of the files
> that might cause re-infection. McAfee's recommendation is to stop IIS
> and all running applications and install patches, many of those
> patches require a reboot to install.
>
> So you see the Catch-22.
>
> Definitions
> - -----------
>
> For the purposes here, an infected system is one where Admin.dll or
> readme.exe has actually run locally. In the case of servers, this is
> most likely an IIS box infected from the network via one of the IIS
> vulnerabilities. It may, unfortunately, be the result of surfing the
> web or reading email from a server (really dumb things to do). I've
> had reports of Exchange Servers, Outlook Web Access Servers, IIS
> Servers, SQL Servers, Proxy Servers, SMS Servers, Domain Controllers,
> and File and Print Servers all being infected.
>
> If the box is actively TFTP'ing (inbound or outbound), issuing
> numerous HTTP requests (when you're not surfing), or if your AV
> product says you're infected, then you are. If the box has Admin.dll
> in the /scripts or root directory, has an enabled Guest account, or
> has Guest in the Administrators group (or Domain Admins group), then
> you're infected.
>
> The simple presence of .eml/.nws files, or copies of readme.exe, does
> not in and of itself indicate an infected machine. If the files are
> put there because of an infected client through a file share, they
> may not have been run on the server yet.
>
> Summary
> - -------
>
> More than a few people have offered perl scripts and other small
> programs designed to clean out the javascript from altered web pages.
> While this might seem like a good idea, the fact is that an infected
> web server can/will quickly re-add the code back to those pages if
> its still infected. Because of the virus behavior of Nimda, if you
> don't remove it completely there's not much you can do to prevent
> such re-infections. Obviously its not just a matter of removing
> files.
>
> I apologize for the delay in getting more information to those
> hundreds of you who have been pleading for help in cleansing your
> systems. I had hoped that the AV cleansers made available today would
> have solved the problems, but as the day wore on it became clearer
> that this wasn't going to happen as quickly as we all want.
>
> Cheers,
> Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGP Personal Privacy 6.5.2
>
> iQCVAwUBO6lXDRBh2Kw/l7p5AQHrPQQAxbgWKP8rGiVfHFJVTokzJMzGi851/hOt
> At1JKz8e+cTB1iLdfNb7KspV9VpbByBaI+dwZkoZe63pq4OGs1tuBB4PG9h8D4uw
> A/iH7Y/OkamrPM9mm4603xougdBs7n4cxwbMvE67kmK39849LWi7SkRGZq9obfKN
> dEB3tg6kYws=
> =9OVI
> -----END PGP SIGNATURE-----
>
> </snip>
>
>
> -----Original Message-----
> From: greg [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, September 25, 2001 7:12 AM
> To: biofuel@yahoogroups.com
> Subject: Re: [biofuel] The Flood
>
>
> it works for me
> ----- Original Message -----
> From: "steve spence" <[EMAIL PROTECTED]>
> To: <biofuel@yahoogroups.com>
> Sent: Tuesday, September 25, 2001 5:58 AM
> Subject: Re: [biofuel] The Flood
>
>
> > that doesn't work either....
> >
> > Steve Spence
> > Subscribe to the Renewable Energy Newsletter:
> > http://www.webconx.com/subscribe.htm
> >
> > Renewable Energy Pages - http://www.webconx.com
> > Mirror Site http://www.webconx.dns2go.com/
> > [EMAIL PROTECTED]
> > (212) 894-3704 x3154 - voicemail/fax
> > We do not inherit the earth from our ancestors,
> > we borrow it from our children.
> >
>
>
>
> Biofuel at Journey to Forever:
> http://journeytoforever.org/biofuel.html
> Please do NOT send "unsubscribe" messages to the list address.
> To unsubscribe, send an email to:
> [EMAIL PROTECTED]
>
> Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
>
>
>


------------------------ Yahoo! Groups Sponsor ---------------------~-->
FREE COLLEGE MONEY
CLICK HERE to search
600,000 scholarships!
http://us.click.yahoo.com/47cccB/4m7CAA/ySSFAA/FGYolB/TM
---------------------------------------------------------------------~->

Biofuel at Journey to Forever:
http://journeytoforever.org/biofuel.html
Please do NOT send "unsubscribe" messages to the list address.
To unsubscribe, send an email to:
[EMAIL PROTECTED] 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 


Reply via email to