Joonja's Realm | home
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]()
**NOTE: If you have not yet viewed the disclaimer for this site, then you are not welcome in this site.
![]() ![]() |
Virus Alerts & Solutions
Last upadted 10/17/2000![]() ![]() ![]() ![]()
Keep your system protected against viruses, security flaws and software bugs with these alerts,
and solutions. Some patches are available for some viri.
Back to the top
Back to the top Pretty Park Trojan Horse New! March 6, 2000 It's back. The W32/Pretty.worm.unp (a.k.a. W32.PrettyPark) is back as a variant containing an unpacked version of the executable. Masquerading as an image of Kyle from the Comedy Central series South Park, the W32/Pretty.worm.unp is a fairly standard e-mail worm, that forwards itself to everyone in your e-mail address book. While the virus is not destructive, it can cause surges in e-mail volume, which in turn can cause bandwidth problems if many computers on the same network are infected. Pretty Park arrives as a message from someone who has your e-mail address in his or her address book, the attached file shows up with a picture of Kyle from South Park for an icon. That this virus arrives as an attachment from someone you know, you might be tempted to let down your guard and open the attached program. Don't. In general, unless you're expecting a file, don't ever open an e-mail attachment, especially an executable file. And, to be safe, you should scan every e-mail attachment you receive, regardless of the source.
Back to the top Trinoo Becomes A PC Trojan Horse February 25, 2000 Last week, antivirus vendors announced the discovery of the latest upgrade to Trinoo, one of a class of tools linked to recent distributed denial of service (DDoS) attacks on ZDNet, Yahoo, CNN, and other major Web sites. Unlike prior versions, which have only been detected on Unix-based machines, the new Trinoo daemon runs on Windows PCs, giving DDoS attackers potential access to millions of additional computers. Even worse, the daemon has been rewritten as a trojan horse. Previously, Trinoo users have been forced to gain root access to a computer before manually installing the daemon; now, a would-be DDoS attacker can randomly distribute the trojan, counting on some portion of its recipients to inadvertently activate it. Although it is often accompanied by separate "backdoor" programs like Back Orifice, Trinoo itself actually presents almost no direct threat to those infected. That doesn't mean that it's not a major issue, however; Trinoo's real targets are large Internet servers and routers. By giving would-be attackers easy access to such large numbers of machines, Trinoo significantly raises the potential for damage from future DDoS attacks. What It Does The Trinoo package consists of two separate components: the server or "master", which runs on the attacker's computer, and multiple daemons or "slaves." Prior to launching a DDoS attempt, the attacker covertly installs daemons on as many "innocent" computers as possible. He or she can then initiate the DDoS using the server application by sending a command to some or all of the daemons designating the intended target. The daemons, in turn, send a "flood" of UDP traffic at the target. The new Trinoo daemon may be installed on a Windows PC in two different ways. An attacker who can break into the PC using Back Orifice or other cracking tools can install the software manually. Alternatively, the attacker can hide the Trinoo trojan horse in email attachments or web page downloads. In either case, once activated, the daemon launches a process called "Services," which listens for commands from the Trinoo server on port 34555. It also copies a file named "SERVICE.EXE" into the C:\WINDOWS\SYSTEM directory and adds a registry entry, ensuring the process launches on reboot. The best defense against any trojan is common sense and caution. Always be suspicious of e-mail attachments and software downloaded from the web. Never open any file received from an unknown or untrusted source. Always keep anti-virus software installed, active, and update. Schedule regular, frequent scans of your drives. As of this writing, anti-virus products from Trend Micro, Network Associates, and Symantec will detect the Trinoo trojan; others should have updates available soon. If necessary, the daemon can be detected and removed manually. Pressing CTRL-ALT-DEL once will call up the task dialog box; infected machines will have a process called "Services" in this dialog. Existence of a file at "C:\WINDOWS\SYSTEM\SERVICE.EXE" is also an indication of infection. To disinfect your PC:
Take your computer offline, physically disconnecting your modem or ethernet port if necessary.
From the Start/Run Menu, launch REGEDIT.EXE, and select HKEY_LOCAL_MACHINE\Software\Microsoft \Windows\CurrentVersion\Run.
Locate and delete the SERVICE.EXE file. (Do NOT delete SERVICES.EXE, which is a legitimate file on Windows NT and 2000).
Press CTRL-ALT-DEL once, select "Services" from the task list, and end that task.
Remember, while Trinoo may not do any damage to your machine, it does threaten the Internet community at large. Be a good neighborkeep your system Trinoo-free. Back to the top New Spin On Old Trojan Horse February 23, 2000 A new AOL-specific Trojan Horse worm has been identified; it operates as an Internet worm, stealing user passwords and forwarding "buddy-list" addresses to the virus' author. Identified near the first of the year, APSTrojan.qa has been designated as medium risk to end-users and low-risk to business users because most business users do not use AOL to access the Internet.
What You Can Do Getting this worm off of your system is a challenging prospect without an anti-virus program. You best bet is to update your virus software to the latest release. If, on the other hand, you're feeling adventurous, you can fix your own system. First, you must get the system to boot into "safe mode." To get into safe mode, use the run command on the start menu to execute MSCONFIG.EXE. Now head over to the general tab, select the advanced button, and select the "Enable Startup Menu" option. Reboot. Choose safe mode from the menu that appears as your computer boots. Once safely into safe mode, you have to find all signs of the Trojan and eradicate them. Start by using the start button's run command to execute REGEDIT.EXE. Once the registry file is loaded search for the key msdos98.exe. Delete the entire entry as specified above. Close the registry editor, take another trip to the run command and type in SYSEDIT.EXE. Find the WIN.INI file, and then look for the [Windows] section. Under that should be the line "RUN=uninstallms.exe". If you don't see this line, be sure to scroll the window all the way to the right, as there are reports that the Trojan tries to hide the run command by moving it the far right side of the window. Last, fire up the Windows explorer and search for the files mentioned above. To be ultra-safe, make sure you include a search for the MINE.* which will give you all forms of the virus. Finding the other files will be a snap, but depending on how many programs you've loaded, the search for README.TXT may be a bit frustrating. The best way to find both of the text files associated with the virus is to use the search dialog to scan for the text strings: "Did you like it? Write Back ok?" and some of the text from the virus' e-mail message. Last delete the mail message from AOL. When all of this is done, you can shutdown and reboot your system. If you don't want the hassle of seeing the menu, go back to MSCONFIG.EXE, select the advanced button on the general tab, and unclick the "Show Startup Menu" option. Back to the top Myna Macro Virus February 14, 2000 The latest Word macro virus, Myna, is relatively lightweight in the world of viruses. Myna infects Word documents (similar to Melissa), but carries no malicious payload. However, the only truly safe method of dealing with these unwelcome and often dangerous bits of code is eradication. W97M/Myna is also known as W97M.Myna, and has at least five variants ranging from W97M/MynaA through W97M/MynaE. The worrisome issue with Myna is the range of hosts it can infect. At present, Myna will infect Microsoft Word 97including Word 97 with service release one (SR1) and aboveand Word 2000. The infection site is the NORMAL.DOT template, and the virus infects when an infected document is loaded. After infection, Myna will infect on closing, opening, and creating new documents.
Back to the top Haiku Worm February 10, 2000 Since the dawn of e-mail worms, it seems like a new one crops up almost daily. Mostly non-malicious, these worms are far more a headache for network administers who must deal with the bandwidth they eat up than a real problem for users. Now there's even a worm with some entertainment value. W95/Haiku.Worm, a.k.a. I-Worm.Haiku, Win32/Haiku.worm, and W95.Haiku.16384.Worm, is a not so typical e-mail worm with a twist: it creates haikus, plays a sound file, and delivers an interesting lecture on how to create a haiku. Another twist that is worrisome is that this virus is Internet-aware: it contains all the code needed to send e-mail messages without an e-mail program, as well as to download files from the Web.
What You Can Do It is true that worms are bad news and violate both legal and ethical conventions. On the other hand, in this day of gigabyte sized programs, you really have to admire a 16KB program that includes a rules-based haiku generator, a dictionary of words, a how-to on haiku writing, a mail engine, and a disk-search engine. Still, self-propagating spam-generating programs are a serious problem. It's exactly this approach, taken to the nth degree that constitutes a denial of service attack. Make this worm a bit more infectious and vicious, and you could easily manage to tie up a company's data connection with thousands off junk e-mail messages. Cleanup is a snap. You can either search for and delete every instance of HAIKU.EXE or HAIKUG.EXE, and then search your registry and WIN.INI file for references to the aforementioned program, or you can download a patch. Because this virus is so new, all you'll find at this time is warning messages on major virus vendor Web sites. An update should be available within a week, or you can use our instructions to delete the offending files. Back to the top Plage2000 January 14, 2000 Computer Associates International on Thursday warned of a new computer worm on the horizon, the "Plage2000", which could threaten computer e-mail systems as well as e-business infrastructures. The worm has been reported to be "in the wild" by customers of Computer Associates, the company said. A worm is a computer program that replicates itself and spreads from computer to computer and infects an entire system. A computer virus, spreads from file to file. A worm can spread without human intervention. The Plage2000 arrives as a reply to an e-mail previously sent by the user. The original e-mail will be quoted completely in the reply. The arriving e-mail says: P2000 Mail auto-reply: ' I'll try to reply as soon as possible. Take a look to the attachment and send me your opinion! ' Get your FREE P2000 Mail now! The worm is attached to the message under one of the following names: pics.exe, images.exe, joke.exe, PsPGame.exe, newsdoc.exe, hamster.exe, tamagotxi.exe, searchURL.exe, SETUP.EXE, Card.EXE, billgt.exe, midsong.exe, s3msong.exe, docs.exe, humor.exe, or fun.exe. Self-extracting file On execution, the worm will present itself as a self-extracting WinZip file. Extracting this will cause one of the following 2 messages to be displayed: WinZip self-Extractor ZIP damaged: file worm name: Bad CRC number. Possible cause: file transfer error Or, WinZip self-Extractor - worm name:worm name - Application Error The exception unknown software exception (0xc00000fd) occurred in the application .... In the background the worm copies itself to the Windows directory under the name INETD.EXE and adds itself to the registry: "HKEYCURRENTUSER\Software\Microsoft\Windows NT\CurrentVersion\Windows\run WindowsDir\INETD.EXE". Every five minutes the worm tries to establish a connection to a running Outlook or Exchange client. When new e-mails are received it will reply to the unread e-mails with an e-mail like the one above. The original messages remain unread. Although the worm does not have a destructive payload, its e-mail propagation mechanism poses a threat to any eExchange e-mail infrastructure since it can overload and take down mail servers. Back to the top NewApt Worm December 14, 1999
Description W32.NewApt.Worm was discovered on December 14, 1999 in Italy. W32.NewApt.Worm is a multi-threaded worm that propagates by email. The worm has its own SMTP (email) engine to email itself. The worm will search various files on the hard drive to find email address that it sends itself out to. The worm will send an email that contains one of the two following messages (depending on HTML support in the email client). HTML compatible email clients:
http://stuart.= messagemates.com/index.html
Hypercool Happy New Year 2000 funny
programs and animations
We attached our recent animation from
this site in our mail! Check it out!
Non-HTML compatible email client:
he, your lame client cant read HTML, haha.
click attachment to see some stunningly
HOT stuff
The email attachment may have one of the following file names.:
g-zilla.exe, cooler3.exe, cooler1.exe, copier.exe, video.exe, pirate.exe, goal1.exe, hog.exe, party.exe, saddam.exe, monica.exe, boss.exe, farter.exe, chestburst.exe, panther.exe, theobbq.exe, goal.exe, baby.exe, bboy.exe, cupid2.exe, fborfw.exe, casper.exe, irnglant.exe, or gadget.exe
Also, the above mentioned files have no association with Message Mates products, which the email may suggest. When the attached file is executed it will display the following error message: The dynamic link library giface.dll could not be found in specified path: D:\sample:;C:\WINDOWS\SYSTEM; C:\WINDOWS;C:\WINDOWS\COMMAND The worm will add the following registry key to load itself each time the computer is booted.
HKLM/Software/Microsoft/Windows/
CurrentVersion/Run/tpawen
The worm appears to have a payload that triggers at midnight on Dec 25, 1999. When the payload activates, it will attempt to make a connection (and disconnect after a successful connection) to a specific corporate web site on port 80 (HTTP) every three seconds. The owner of this corporate web site has been notified. Please note the worm will modify the registry to enable auto-dial. This modification will allow connections to the Internet to occur automatically. On June 12, 2000, the worm will try to remove itself from the registry when certain other conditions are meet. These conditions are dependent upon random calculations and may not always occur. Variant Information The W32.NewApt.B.Worm and W32.NewApt.C.Worm variant were discovered on Dec 22, 1999 and have the exact same file size (69,632 bytes) as the original version. A noticeable difference was the modified payload trigger date from the original version. The variants will trigger at midnight on Feb 2, 2000. The payload is identical and will attempt to make a connection to the same web site as the original version every three seconds. These variants will also attempt to remove themselves one month after the original version. On July 12, 2000, the worm will try to remove itself from the registry when certain other conditions are meet. These conditions are dependent on random calculations and may not always occur. The W32.NewApt.D.Worm variant was discovered on Jan 10, 2000. A noticeable difference is the modified payload trigger date from the original version. The "D" variant will trigger at midnight on March 2, 2000 and the name of the file attached to the email may contain sexually explicit references. Norton AntiVirus users can protect themselves from this virus by downloading the current virus definitions either through LiveUpdate or from the Download Virus Definition Updates page. Back to the top Verlor Virus December 6, 1999
Description W97M.Overlord is a macro virus, which infects Microsoft Word97 (including SR-1) and Word2000 documents. This virus places its code in a macro module named Module. The virus has stealth capabilities so, when opening the Visual Basic Editor or selecting Tools | Macro, the virus will remove all infectious code from open documents and the NORMAL.DOT and then will re-infect them at a later time. The virus may also insert these files into your Windows directory: OVERLORD.B.VBS, OVERLORD.B.DLL, TEMPAD.DLL, and TEMPNT.DLL. OVERLORD.B.DLL, TEMPAD.DLL, and TEMPNT.DLL cannot cause any viral infection. These files should be deleted. The virus may also add the registry key: HKLM\software\RegisteredOwner = "the Overlord" and may modify the WIN.INI, adding the line: run = <Windows directory>\overlord.b.vbs This virus has no other payload. Technical Description When opening documents, the virus appends the name of the document to the file C:\HIMEM.SYS. This allows the virus to keep track if opened documents were not infected so they can be infected at a later time. When closing documents, the virus infection routine is activated. The virus first checks if the files TEMPAD.DLL or TEMPNT.DLL exist in the Windows directory. These are temporary files created by the virus for its infection routine. If they exist, the files are deleted. The virus then turns off the macro virus protection feature. Next, the virus infects the NORMAL.DOT and active documents. In the process, the virus creates the temporary files TEMPAD.DLL and TEMPNT.DLL. These temporary files cannot cause any viral infection. Finally, the virus checks if the newly infected document filename exists in the file C:\HIMEM.SYS. If the filename exists, the line is removed signifying successful infection. The virus also contains stealth features. If a user opens the Visual Basic Editor in attempt to view the macrocode, the virus calls a stealth routine. The stealth routine first adds the registry key: HKLM/Software\registeredOwner = "the Overlord" Then, the virus opens the WIN.INI file and adds the line: run = <Windows directory>\overlord.b.vbs Next, the virus inserts the file OVERLORD.B.VBS that contains viral code. The virus also creates a file named OVERLORD.B.DLL. This file is a plain text file and cannot cause any viral infection. Finally, the actual stealth routine begins. The virus removes all the viral code in any open documents and the NORMAL.DOT, and the Visual Basic Editor is displayed. However, since the virus removed all the virus code, one may be fooled into believing they are not infected. The VBS file that is inserted into the system then performs a re-infection when the computer is restarted. The VBS file re-infects the NORMAL.DOT and any files, which were left uninfected when opening the Visual Basic Editor. The C:\HIMEM.SYS file is used to determine which files need to be re-infected. Also, when selecting the Tools | Macro menu, the virus removes all the viral code from the NORMAL.DOT and any open documents. After finishing with the Tools | Macro menu, the virus re-infects the NORMAL.DOT and open documents. This may lead one to believe they are not infected. Repair Notes The registry key: HKLM/Software\registeredOwner = "the Overlord" should be removed or corrected. The line: run = WINDOWS DIRECTORY\overlord.b.vbs should be removed from the WIN.INI file. The virus turns off the macro virus protection feature of Word97. This can be enabled by selecting Tools | Options | General | Macro Virus Protection. Any temporary files including OVERLORD.B.DLL, TEMPAD.DLL, and TEMPNT.DLL in the Windows directory may be deleted. The infectious file OVERLORD.B.VBS should be deleted. Back to the top LoveSong Virus December 29, 1999
Description W95.LoveSong.998 is a memory resident Windows 95/98 virus discovered in Korea. Once an infected file is executed, the virus will load into memory and will infect files that are accessed. The virus code will be inserted into the .reloc section of the 32-bit executable. If this section of the file is not large enough, it may corrupt the file. The technique used to hook the file access is based on the method used in the W95.CIH virus. But W95.LoveSong.998 will not split its code like the W95.CIH virus. The virus has a payload that plays a popular commercial Korean song on the PC speaker. From analyzing the payload routine, the virus will trigger after Feb 16, 2000 with exception of the 30th of each month when certain criteria are meet. The virus contains the text love and because of its payload, the virus was named LoveSong. Back to the top "Hi 2000" Worm Reported December 6, 1999
Description W32.HLLW.Soft6 is a worm that was discovered on Dec. 6, 1999. The worm propagates automatically through the network and displays the message "Hi 2000" between 9am and 12pm. The worm only infects Windows NT systems. ![]() Technical Description The worm consists of two files named instals.exe and servicess.exe. The worm will only propagate over the network when the worm program (instals.exe) is executed using Administrator or equivalent rights. When instals.exe is executed, the worm will search for other Windows NT machines and copy both files into the SYSTEM32 directory. The registry on these machines will be modified and set to launch instals.exe every time the machine boots as well as loading servicess.exe as a service. Once these changes are made, the worm will reboot the newly infected machine automatically to load the worm. The worm will run as a service named "service". Between the hours of 9am and 12pm, the worm will continuously display a "Hi 2000" message on the screen. The newly infected machine will also try to find more Windows NT machines to repeat the propagation process. After some time, both instal.exe and servicess.exe will become zero bytes and the worm will no longer function correctly. Symptoms of the worm are:
The worm can be removed manually by following these steps.
Terminate and remove the service named "service" from the Service Manager.
Remove the registry entry, which refers to instals.exe in:
HKEY_LOCAL_MACHINE \Software\Microsoft\
Windows\CurrentVersion\Run
Delete the files instals.exe and servicess.exe from the SYSTEM32 directory. (If the files are still in use, you may need to reboot first or kill the process using Task Manager/Process View).
Reboot the computer.
Norton AntiVirus users can protect themselves from this worm by downloading the current virus definitions either through LiveUpdate or from the Download Virus Definition Updates page Back to the top Babylonia Virus December 17, 1999 A new Trojan horse/virus program, dubbed W95.Babylonia by the virus trackers at the Symantec AntiVirus Research Center, is spreading across the Internet, propagated primarily by users of the popular mIRC Internet Relay Chat program. While the virus is currently more annoying than destructive, it may become more harmful in the future How Does It Spread? W95.Babylonia is so far known to have spread in two ways: via Usenet News and via IRC. According to Symantec, the virus was originally posted to an Internet newsgroup inside a Windows Help file named serialz.hlp. This file was claimed to be a list of serial numbers for "Warez" (pirated commercial software). But if the help file is opened, it exploits a little-known feature of Microsoft Windows which allows help files to contain executable programs. Merely opening the help file causes the Trojan horse program to be released within user's computer system and begin wreaking its mischief. Antivirus firm Trend Micro reports that at least one version of W95.Babylonia has been spreading itself, like the Happy99 virus, via an e-mail through an attachment named X-MAS.EXE. (This file can be recognized by name or by the icon it displays: a picture of Father Christmas.) The primary mode of propagation, however, is IRC, or Internet Relay Chat. W95.Babylonia uses IRC in a way similar to that in which Melissa and Happy99 use e-mail. If an "infected" user runs mIRC and connects to an IRC "channel" (or chat room), W95.Babylonia will broadcast itself to everyone on the channel as if the user herself had sent it. The accompanying message proclaims the program to be to be a Y2K bug fix for the mIRC program. As with e-mail Trojan horses, the fact that the message seems to have come from a known (and possibly trusted) source may make recipients feel comfortable about running the attached program. But if recipients take the bait and do so, W95.Babylonia infects their machines and propagates itself from them in turn. Once W95.Babylonia has been activated on a computer, it can infect any of the executable files and Windows help files on that machine. Symantec does not report any incidents in which the infection has spread to shared disks via Microsoft's "Network Neighborhood" feature. However, since this mode of propagation is likely, special precautions should be taken if even one machine on a network with file sharing is infected. The safest procedure is to disable the LAN and scan all machines on the network for the infection before reconnecting them
Back to the top Mypics.Worm Strikes December 3, 1999 Anti-virus companies are scrambling to fix a potentially malicious worm masquerading as a Y2K glitch that packs a double-punch. The W32/Mypics.worm comes in an e-mail without a subject line and contains a message that reads "Here's some pictures for you!" At first, the worm acts like Melissa, immediately sending itself to as many as 50 listings in a user's Outlook address book. The mass-mailing will not be triggered if the virus recipient doesn't use Outlook. But the e-mail also contains an executable attachment, labeled Pics4You.exe, which infects the user's PC with the worm if it is opened. Once opened, on Jan. 1, 2000, the worm also overwrites part of the hard drive of the infected PC. If that PC is rebooted anytime after the New Year, the worm has the potential to completely reformat the hard drive, causing a loss of data. The glitch will try to disguise itself as a Y2K problem. The worm also changes the home page of Internet Explorer users to a Geocities Web page containing a visitor counter and the words "Dave's Web Page: Brought to You By the Cave!" The site also contains a link to adult content. 5,000 visitors to Dave's Web Page It's unclear whether the creator of Web page is related to the worm's distribution or creation, according to anti-virus researchers. As of Thursday night, the site had logged more than 3,000 visitors. That number had increased to more than 5,000 Friday morning. Some of those hits may come from people affected by Mypics, but others could be from people who've heard about the worm and are merely curious. Researchers at Symantec Corp.'s AntiVirus Research Center said they will have new software to combat the worm on their site sometime Friday. Marian Merrit, a group product manager for Symantec's Norton AntiVirus software, said researchers had rated the worm a medium risk. "We didn't want people to run around and get hysterical," she said. However, she said MyPics could be upgraded to a higher risk category as the company gets more reports of it. Merritt also called MyPics the "scariest" Y2K-related worm or virus she's seen so far. In recent months, researchers have discovered several other viruses created to take advantage of the date change. Trojan.polyglot was sent out in September, purporting to be a Microsoft Corp. e-mail touting a Y2K fix. If a person installed the virus, it could steal information from their computer. However, there have been few reports of it. But people have seen worm.fix200, which comes with an e-mail containing the subject line "Internet problem year 2000" and a message in Spanish urging people to update their Y2K software. An attachment in the e-mail could overwrite a user's hard drive. Still, Carey Nachenberg, Chief Researcher at Symantec's AntiVirus Research Center, said he hasn't seen as many Y2K-inspired viruses and worms as he expected. "There's been very little activity," he said. "People have been very calm." Back to the top MiniZip Virus December 1, 1999 They call it, MiniZip. Virus researchers at Network Associates Inc. and Symantec Corp. warned Tuesday evening that a new version of the ExploreZip virus, which wipes out information on a hard drive, has hit at least 12 companies so far, six of them high-tech manufacturing companies. Several thousand PCs are believed to have been hit. The ExploreZip variant, also called ExploreZip.worm.pak, is 120 KB, about half the size of its predecessor. But other than its diminutive size, MiniZip acts exactly like ExploreZip, which both wipes out files on hard drives and can spread via e-mail. For instructions on how to protect your PC against the virus, see our original coverage Inside the Worm.ExploreZip Virus. Compression conundrum MiniZip is so small because the virus's author compressed the original ExploreZip code. Compressing it changes the bits, meaning that anti-virus software has trouble identifying the new virus. MiniZip first appeared last week, so most anti-virus makers have updated their software to detect its code. While anti-virus makers issued notice of the new updates, it appears that many companies have not updated their antivirus software, allowing Tuesday's outbreak.
Back to the top Prilissa Virus November 22, 1999 It's called the W97M/Prilissa virus. But a better name for it would be the Grinch virus. Anti-virus researchers at Network Associates Inc. said Friday that 10 Fortune 500 companies on three continents have been hit with a new virus called W97/Prilissa. Prilissa is a nasty variant on two better known attacks -- the Melissa worm and the PRI virus. The virus depends on the Windows 95 and 98 operating systems and the Word 97 word processing application. If opened, it will e-mail itself to the first 50 names on a computer's Outlook or Outlook Express e-mail client. "This is probably the fastest infection rate we've seen since Melissa," said Sal Viveros, antivirus product manager at Network Associates, in Santa Clara, Calif. The virus uses macro commands similar to those of Melissa to replicate itself. But the virus itself won't go off until Christmas day. That means it won't have much of an impact on companies, which aren't likely to be open on that day, even if it should go undetected. But there is a big threat to home PC users, particularly unsuspecting children logging onto the computer to play with their new games on Christmas. The Dr. Suess analogies are endless. What It Does The virus itself looks for a registry key to verify if the local system has been infected. If it hasn't, the virus creates a Microsoft Outlook e-mail message with the subject line "Message From (Office 97 user name)" and a message body that says "This document is very Important and you've GOT to read this!!!" The first 50 listings from all address books are selected, along with an attachment - the infected document, whatever it is. If the date is December 25, the virus runs a destructive payload to overwrite the existing C:/AUTOEXEC.BAT file with the instructions: "@echo off" "@echo Vine...Vide...Vice...Moslem Power Never End..." "@echo Your Computer Have Just Been Terminated By -= CyberNET-= Virus !!!" "ctty nul" "Formate c:/autotest/q /u" The virus will not run on Windows NT. Another message is displayed on Word 97, adding: "You Dare Rise Against Me... The Human Era is Over, The CyberNET Era Has Come!!!" Most antivirus vendors are expected to have a definition update and fix prepared within the next few hours. It's unclear who will carve the roast beast. Back to the top FunLove Virus Warning November 11, 1999 There's nothing tender about the new FunLove virus. The virus, technically called W32.FunLove, brought down the servers of a large company in Europe and has been detected in companies in the U.S., as well, according to researchers at Symantec Corp's AntiVirus Research Center. The good news is that it shouldn't spread all that fast because it doesn't have the ability to e-mail itself like the Melissa virus, said Charles Renert, director of research at SARC. The bad news is that it uses a new way to attack the file security system of the Windows NT operating system. The virus may also use the network to spread itself. "It's a little bit of an evolution as far as virus writing is concerned," said Renert.
Back to the top Bubbleboy Worm Alert! November 9, 1999 Prepare to unlearn everything you've learned about computer viruses. An anonymous virus writer who is apparently an avid "Seinfeld" fan has created a virus -- actually a self-replicating worm -- that can spread itself through a user's Microsoft Outlook or Outlook Express client. The worm, called "BubbleBoy" in an apparent reference to a "Seinfeld" episode, is unlike anything that anti-virus software vendors have seen to this point. It doesn't rely on an attachment. Instead, all a user has to do is open an e-mail. An embedded Visual Basic Script command attaches itself to the Outlook address book and mails the e-mail to everyone in the address list. "Historically, anti-virus vendors have always told users, 'If you don't open the attachment, you won't have a problem,' " said Sal Viveros, marketing manager for Total Virus Defense at Network Associates Inc. in Santa Clara, Calif. "This changes that." For Outlook Express users, it's particularly troubling. Simply using the preview function of Outlook Express will allow the worm to replicate.
Patching For Protection Who's Affected? BubbleBoy requires Internet Explorer 5.0 with Windows Scripting Host installed, which is standard on Windows 98 and Windows 2000. It doesn't run on Windows NT or on the default settings of Windows 95. Setting IE 5.0 to its maximum security setting would prevent it from doing anything. Users won't know they have been infected until the initial e-mail blast. After that, the worm changes the registered owner to BubbleBoy and the organization to "Vandelay Industries." The body of the message simply says, "The BubbleBoy incident, pictures and sounds." Vandelay Industries, like the BubbleBoy whose bubble burst during a tense game of Trivial Pursuit, was a long-running joke on "Seinfeld." George, Jerry's often-unemployed sidekick, was fond of saying he worked for the fictitious Vandelay Industries. The BubbleBoy worm may be taking advantage of a Microsoft security hole for which there is a patch. Symantec anti-virus researchers in Santa Monica, Calif., are trying to determine if BubbleBoy is taking advantage of an IE 5.0 security flaw discovered in August. Patch That App In a security bulletin dated August 31, Microsoft posted a patch that eliminates the security vulnerabilities in two Active X controls of IE 5.0. The net effect of the vulnerabilities, according to Microsoft, was that a Web page could take control of a user's computer without the user knowing it. Grab the update to patch IE 5.0. Researchers add that BubbleBoy is further proof that, as anti-virus technology improves, virus writers are getting smarter, particularly when it comes to VBS. "BubbleBoy in of itself is not very dangerous," said Narender Mangalam, director of security products at Computer Associates in Islandia, N.Y. "The reason we are all very interested in this is because it is a proof of concept." Back to the top Badass Virus Infects Outlook One of two new e-mail-based worm viruses, Badass, has begun spreading across the Internet. The virus, which originated in Holland, does not damage files, but does create large volumes of e-mail traffic and could cause network slowdowns. Fortunately, Badass' bark is far worse than its bite, and the cure is relatively simple. Virus experts have deduced that this worm which likely originated in a bank in the Netherlands is a rather inelegant kluge of the codes of the Melissa and Win.Stupid virii. A worm is so named because it roots into your system and then makes copies of itself, in effect, perpetuating its existence. Internet worms are particularly pernicious, because they use a host computer to make copies, and then take advantage of the host computers Internet connection to send copies of themselves to other computers. What Badass Looks Like Like all e-mail-based viruses, Badass exists as an attachment to an e-mail message and will not execute unless you open the attached file. That's good. Prudent computing dictates that you should never open an unknown file, or a file from an unknown user. It's important to bear in mind that e-mail viruses cannot execute unless you open the attached file. In the case of Badass, the particular e-mail message, 24,576 bytes in size, comes with two possible subject lines, both: =?Windows-1252?B?TW9n+2guLg==?=, and a variation which starts with the characters "Moguh " have been reported. The body of the message reads, in Dutch, ""Dit is wel grappig! :-),"which translates into, "This is funny! :-)." It's the attachment, however, BADASS.EXE that does the damage. When you open this file, either by double-clicking on the icon in the mail message, or by right-clicking on the attachment icon in your e-mail program and selecting open, the program launches What Badass Does The first thing you'll see is a dialog box with a particularly juvenile and vulgar message, "An error has occurred because your ___ smells bad." The code of the virus is programmed so that you cannot click the No button-a rip-off of Win.Stupid code. When you click yes, you're informed, "Contact your local supermarket for toilet paper and soap to solve this problem." From here on out, it's pretty much all Melissa. The virus spreads out over your hard drive looking for Microsoft Outlook. If you don't have Microsoft Outlook, nothing will happen; if Outlook is installed, however, Badass will recreate its message, and attach a copy of BADASS.EXE to that message, and then send that message to everyone in your address book. Badass also adds a registry key: HK\Current User\SoftWare\VB and VBA Program Settings\Windows\CurrentVersion with the value "CMCTL32"="00 00 00 01" One caveat - it is not known if Badass is capable of working it's pernicious sleight-of-hand without the aforementioned subject line, message contents, and file name. In other words, it is possible that someone could rename the virus and change the message and subject and continue the worm's spread Prevention and Cure Prevention and cure are quite simple. Don't open unknown files, or files from unknown persons. Use virus-scanning software that is capable of checking e-mail attachments, such as, McAfee's VirusScan, or Symantec's Norton AntiVirus-Norton has released an update to deal with Badass. If you get the Badass email, don't just delete the message. Make sure that you use Windows' Explorer to go to the directory where your e-mail program stores attachments and delete the file BADASS.EXE. If you're not sure what directory your e-mail program uses, press F2 in the Windows Explorer, and type BADASS.EXE in the file name box. Be sure to search all your hard drives. If you don't find the files, your e-mail program deleted the attachment when you deleted the message. After doing all this, be certain to empty the deleted items folder in both your e-mail program and on the Windows Desktop
|