Parts Catalog Accessories Catalog How To Articles Tech Forums
Call Pelican Parts at 888-280-7799
Shopping Cart Cart | Project List | Order Status | Help



Go Back   PeachParts Mercedes-Benz Forum > General Discussions > Off-Topic Discussion

Reply
 
LinkBack Thread Tools Display Modes
  #1  
Old 02-17-2004, 01:57 PM
Botnst's Avatar
Banned
 
Join Date: Jun 2003
Location: There castle.
Posts: 44,601
Virus that attacks Notes

Full text from our IT.

Botnst

To All Staff,

There's a new mass-mailing worm on the loose and it's name is W32.Alua@mm. All indications are that it is spreading very fast throughout the Internet. It has been seen moving throughout the USGS Notes email system.

DO NOT OPEN MESSAGES with the following characteristics:

Subject: ID <6 random characters>... thanks
Attachment: <7 random characters>.exe

If you receive emails similar to this description, simply delete it without attempting to open or save the attachment. If you have already made this mistake, contact the Help Desk ASAP. Please read below for further details.



To: USGS Security Points of Contact
From: IT Security Operations Team
Date: February 17, 2004

ITSOT Advisory 2004-0007: W32.Alua@mm: Immediate Attention Required !

Threat Level:
High - Immediate Attention Required - compliance date 02/17/2004

--/ Vulnerable /--

Microsoft Windows 95/98/ME/NT/2000/XP

--/ Task and Purpose --/

Immediately notify users of this threat, using out-of-band communication channels if necessary.
Update virus definitions on ALL Windows computers as soon as possible.

*** A list of potentially internal infected hosts is being prepared. If you are notified that a host on your network is exhibiting behavior associated with being infected, take the identified host(s) offline immediately.***

--/ Briefing /--

*** Blocks have been put in place on the Lotus servers to defer delivery of potentially infected messages. ***

W32.Alua@mm is a mass-mailing worm that opens a backdoor on TCP port 8866.

DO NOT OPEN MESSAGES with the following characteristics.

The email has the following characteristics:

Subject: ID <6 random characters>... thanks
Attachment: <7 random characters>.exe

--/ Details /--

W32.Alua@mm
Discovered on: February 17, 2004

When W32.Alua@mm is executed, it performs the following actions:

1. Launches sndrec32.exe, the Windows Sound Recorder.

2. Copies itself to %System%\au.exe.

3. Adds the value:

"au.exe"="%System%\au.exe"

to the registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

so that the worm runs when you start Windows.

4. Adds the key:

HKEY_CURRENT_USER\SOFTWARE\Windows2000

5. Opens a backdoor on TCP port 8866.

6. Sends an HTTP GET request to the following Web sites on TCP port 80:

· www.strato.de/1.php
· www.strato.de/2.php
· www.47df.de/wbboard/1.php
· www.intern.games-ring.de/2.php

7. Scans files with the following attachments:

· .wab
· .txt
· .htm
· .html

8. Uses its own SMTP engine to send itself to email addresses found in step 6.

The email has the following characteristics:

· Subject: ID <6 random characters>... thanks
· Body:
· Yours ID <9 random characters>
o -
· Thank
· Attachment: <7 random characters>.exe

--/ Solution /--

Update virus definitions on ALL Windows computers. To protect against this threat, virus definitions should be dated 02/17/2004 or later.

Symantec Security Response will post certified LiveUpdate definitions and Intelligent Updaters containing detection for W32.Alua@mm after 0900 Pacific Time 02/17/2004 (Noon Eastern).

Symantec Security Response has posted Rapid Release definitions containing detection for W32.Alua@mm with build sequence number 27975. These can be downloaded from
http://securityresponse.symantec.com/avcenter/beta.download.html

--/ Questions ? /--

If you have questions about this threat, please contact the IT Security Operations Team, gs_itsot@usgs.gov

Information regarding Lotus servers can be found at: http://notes.usgs.gov/current_events.txt

--/ References /--
http://securityresponse.symantec.com/
http://www.symantec.com/avcenter/venc/data/w32.alua@mm.html

--/ Timeframe /--

Inform users immediately. Push virus definitions to clients using your parent antivirus server as soon as possible. Unmanaged clients should be visited to have their definitions updated manually.

Reply With Quote
  #2  
Old 02-17-2004, 02:42 PM
Registered User
 
Join Date: Jan 2002
Posts: 3,126
Here we go again.....time for LiveUpdate
Reply With Quote
  #3  
Old 02-17-2004, 07:55 PM
Registered User
 
Join Date: Jul 2003
Posts: 336
Is this really a Notes-specific one? It looks like it's pretty general from the posted e-mails.

Yes, here we go again. I really wish these virus writers would get a life. I also wish microsoft made a decent operating system... We've got those lab computers running windows, but I'm way too busy to screw with them anymore. Maybe I'll just tell our lab coordinator to update the virus definitions, etc.
Reply With Quote
  #4  
Old 02-18-2004, 08:03 AM
Botnst's Avatar
Banned
 
Join Date: Jun 2003
Location: There castle.
Posts: 44,601
Quote:
Originally posted by jpb5151
Is this really a Notes-specific one? It looks like it's pretty general from the posted e-mails.

You're right. Sorry for the misleading header.

B

Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On
Trackbacks are On
Pingbacks are On
Refbacks are On




All times are GMT -4. The time now is 12:41 AM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Search Engine Optimization by vBSEO 3.6.0
Copyright 2024 Pelican Parts, LLC - Posts may be archived for display on the Peach Parts or Pelican Parts Website -    DMCA Registered Agent Contact Page