| We hope you enjoy your visit. You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free. Join our community! Visit Website If you're already a member please log in to your account to access all of our features: |
| ANOTHER WORM WARNING!!; Please read | |
|---|---|
| Tweet Topic Started: Jan 27 2004, 12:38 PM (83 Views) | |
| Seoul Survivor | Jan 27 2004, 12:38 PM Post #1 |
|
Thanks Jay!
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Print This Article Close This Window New Worm Spreading Rapidly Across Internet -Experts Mon January 26, 2004 07:05 PM ET SAN FRANCISCO (Reuters) - Security experts warned on Monday about a new virus outbreak that was spreading quickly across the Internet. The new virus, dubbed MyDoom or Novarg, is a mass-mailing worm that arrives as an attachment with an .exe, .scr, .zip or .pif extension and can have a subject line of "test" or "status." It mails itself out to addresses in the victim's computer and is clogging mail servers and degrading network performance at companies, experts said. "Mailboxes at large corporations are infected and reporting multiple infections throughout their entire organizations," said David Perry, global education director at Trend Micro. The worm was discovered on Monday afternoon and spread so quickly that Trend Micro, Network Associates, Symantec and other anti-virus companies were rating it a "high" outbreak. Security experts said they were still analyzing the virus to discover what it does to the victim computers. © Reuters 2004. All rights reserved. Users may download and print extracts of content from this website for their own personal and non-commercial use only. Republication or redistribution of Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Reuters. Reuters and the Reuters sphere logo are registered trademarks or trademarks of the Reuters group of companies around the world. ************* And this: E-Mail Worm Clogging Network Traffic Email this Story Jan 27, 5:18 AM (ET) By MATTHEW FORDAHL SAN JOSE, Calif. (AP) - Network administrators were working to stop a fast-spreading e-mail worm that looks like a normal error message but actually contains a malicious program that spreads itself and installs a program that leaves an open door to infected computers. The worm - called "Mydoom,""Novarg" or "WORM_MIMAIL.R" - was replicating itself so quickly that some corporate networks were clogged with infected traffic within hours of its appearance Monday. Its mail engine could send out 100 infected e-mail messages in 30 seconds, experts said. It runs on computers running Microsoft Corp. (MSFT)'s Windows operating systems, though other computers were affected by slow network and a flood of bogus messages. About 3,800 infections were confirmed within 45 minutes of its initial discovery, according to the security firm Central Command. "This has all the characteristics of being the next big one," said Steven Sundermeier, Central Command's vice president of products and services. It appeared to first target large companies in the United States - and their computers' large address books - and quickly spread internationally, said David Perry, global director of education at the antivirus software firm Trend Micro. "As far as I can tell right now, it's pretty much everywhere on the planet," said Vincent Gullotto, vice president of Network Associates' antivirus emergency response team. Unlike other mass-mailing worms, Mydoom does not attempt to trick victims by promising nude pictures of celebrities or mimicking personal notes. Instead, one of its messages reads: "The message contains Unicode characters and has been sent as a binary attachment." "Because that sounds like a technical thing, people may be more apt to think it's legitimate and click on it," said Steve Trilling, senior director of research at the computer security company Symantec. Subject lines also vary but can include phrases like "Mail Delivery System" and "Mail Transaction Failed." The attachments have ".exe,"".scr,"".cmd" or ".pif" extensions, and may be compressed as a Zip file. Besides sending out tainted e-mail, the program appears to open up a backdoor so that hackers can take over the computer later. Symantec said the worm appeared to contain a program that logs keystrokes on infected machines. It could collect username and passwords of unsuspecting users and distribute them to strangers. Network Associates, however, did not find the keylogging program. The worm also appears to deposit its payload into folders open to users of the Kazaa file-sharing network. Remote users who download those files and run them could be infected. Symantec also found code that would flood The SCO Group Inc.'s Web site with requests in an attempt to crash its server, starting Feb. 1. SCO's site has been targeted in other recent attacks because of its threats to sue users of the Linux operating system in an intellectual property dispute. An SCO spokesman did not return a telephone call for comment Monday. Microsoft offers a patch of its Outlook e-mail software to warn users before they open such attachments or prevent them from opening them altogether. Antivirus software also stops infection. Christopher Budd, a security program manager with Microsoft, said the worm does not appear to take advantage of any Microsoft product vulnerability. "This is entirely a case of what we would call social engineering - enticing users to take actions that are not in their best interest," he said. Mydoom isn't the first mass-mailing virus of the year. Earlier this month, a worm called "Bagle" infected computers but seemed to die out quickly. So far, it's too early to say whether Mydoom will continue to be a problem or peter out, experts said. "Over the next 24 to 48 hours, we'll have a much better sense," Trilling said. "Right now, the trend is only up." --- On the Net: Microsoft security tips: http://www.microsoft.com/security/protect/default.asp |
![]() |
|
| Angel | Jan 27 2004, 02:18 PM Post #2 |
![]()
C_Beyond ((chunsa oppa))
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
thanks vic! |
| |
![]() |
|
| Seoul Survivor | Jan 27 2004, 03:14 PM Post #3 |
|
Thanks Jay!
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Yeah, it hit us here at the office, and even our Norton Exchange server protection didn't catch it at first.(updates itself every four hours, but the worm made it through at first... So everyone do be careful of this one, too!! //Seoul |
![]() |
|
| lil miszy mi | Jan 27 2004, 06:04 PM Post #4 |
![]()
Member
![]() ![]() ![]() ![]()
|
o m g thanx for the information! |
| |
![]() |
|
| X6xKrnPrdx9X | Jan 27 2004, 06:22 PM Post #5 |
|
Advanced Member
![]() ![]() ![]() ![]() ![]() ![]()
|
HOLY SHITS! :cry: :cry: This is a new computer too!!!!!!!!!!!!!!! |
If you love someone let them go...If they return to you then stab them 8 times on the head with your sword............If they return to you again....then......just..............RUN!!!!!!!!![]() Damn this banner is my favorite one haha so sexxy There are three types of people..The ones that can count..and the ones that cant...:opps: <-----Supreme One's xanga! Check it out! :woohoo: | |
![]() |
|
| mIna* | Jan 28 2004, 02:46 AM Post #6 |
![]()
gOnn@ f3eL aLriGht, gOtt@ t@ke @ cH@nce!
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
thanks for the newz.. |
mIna*
| |
![]() |
|
| KiMcHiLOVE | Jan 28 2004, 10:45 AM Post #7 |
![]()
Tray-ish-ee
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
yeah, my Dad was complaining about this.... it's really bad at his work.... Another prime example of why you should use a Mac. I rest my case. :D Anyway, I hope they get this probelm fixed soon! |
![]() ![]() blinkie: moley.... set: kRaZiEgUrL | |
![]() |
|
| xRiceXcrYstaLx | Jan 29 2004, 02:27 AM Post #8 |
|
Advanced Member
![]() ![]() ![]() ![]() ![]() ![]()
|
HOLY CWAP.... I use Microsoft!! >_< ... this is gonna suck... freaking idiots who comes up with viruses... i'm gonna hunt them down someday and make them pay for all the comps they've ruined in my lifetime.... grrr... Thanks for the info pal!! |
![]() |
|
| Seoul Survivor | Jan 29 2004, 02:33 AM Post #9 |
|
Thanks Jay!
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
There are options. I use Mozilla (freeware) at mozilla.org, and Eudora (also free) for e-mail, instead of outlook. Apple products (the MAC) are far and away the superior product, but us cheapsters are stuck with Winders..... Note that the Virus has Morphed, so UPGRADE YOUR VIRUS SOFTWARE NOW!! //Seoul |
![]() |
|
| BUDDiE | Jan 29 2004, 06:32 PM Post #10 |
![]()
chee -- cina
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
wowies . . . thanks vic!!! i think my comp migh tbe infected b/c i got an e-mail about it too . . . phewies . . . >>>CiNa |
|
--Cina. BUT ORIGINALLY --Chee. | |
![]() |
|
| xRiceXcrYstaLx | Jan 29 2004, 10:43 PM Post #11 |
|
Advanced Member
![]() ![]() ![]() ![]() ![]() ![]()
|
eeK... i'm gonna be cautious about that virus thingy...it's pissing me off that so many viruses are going around... grrr... |
![]() |
|
| Seoul Survivor | Jan 29 2004, 10:49 PM Post #12 |
|
Thanks Jay!
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
You guys are welcome!! Stay tuned to the Babble section, and I will post anything I see. The problem is that these geeks are getting more and more clever. So I'll keep putting up as much as I can find. Your News Director! //The Seoul Survivor |
![]() |
|
| LazY MisS Ally | Jan 31 2004, 06:27 PM Post #13 |
|
Member
![]() ![]() ![]() ![]()
|
danx dude :) |
![]() |
|
| 1 user reading this topic (1 Guest and 0 Anonymous) | |
| « Previous Topic · General Chat · Next Topic » |





![]](http://z1.ifrm.com/static/1/pip_r.png)













8:32 PM Jul 10