This site is no longer active and is available for archival purposes only. Registration and login is disabled.

New email worm


Postby damian » May 21, 2003 @ 12:57pm

damian
pm Insider
 
Posts: 3960
Joined: Sep 3, 2002 @ 7:59pm
Location: Acton, MA (home), NYC (school)


Postby Fish » May 21, 2003 @ 5:34pm

User avatar
Fish
pm Member
 
Posts: 225
Joined: Feb 27, 2002 @ 9:58pm


Postby Dihnekis » May 21, 2003 @ 7:43pm

Careful, don't get crushed under the weight of my stupidity... the think hurts
Dihnekis
pm Member
 
Posts: 1752
Joined: Dec 30, 2002 @ 8:35pm
Location: St. Augustine, Florida


Postby Cameron » May 21, 2003 @ 10:14pm

Just got this in the mail from my ISP:

"Dear Customer,

The Department for Homeland Security has released the
following statement about a new and potentially dangerous
computer virus. We ask that you please take them time to
make sure that your computers anti-virus software is up to
date. The following is taken from an email sent to us from
the Department of Homeland Security.

Department of Homeland Security - ADVISORY 03-023

W32/Fizzer@MM Worm

13 May 2003

SYSTEMS AFFECTED
Windows 95 Windows 98
Windows NT Windows 2000
Windows ME Windows XP

OVERVIEW

There is a mass-mailing worm that is delivered as an e-mail
attachment. This worm arrives as an e-mail attachment and uses
various common executable file extensions to install itself on
local systems. The worm connects to various locations via Internet Relay Chat (IRC) connections and AOL Instant Messenger
(AIM) connections to await instructions from a remote attacker. This worm is reported to contain a keystroke logger. This worm could be used as part of a botnet-controlled Denial-of-Service
(DoS) against specific targets.

IMPACT

Given the widespread use of Windows OS-based systems within the
government and the private sectors, a widespread propagation of
this worm and its successful utilization in DoS attacks, the
potential impact is high.

DETAILS

The "from" address in the infected e-mails can be forged, so that
the actual sender is obscured and the e-mail appears to be from a
familiar source. The subject line is also designed to entice the
recipient to read the e-mail and execute the attachment, which will
activate the virus on the local system. Examples of some of the
"from" addresses and subject lines can be found at the URLs included
below.

The worm attachment uses various common executable extensions to
install itself on the local system, once the recipient has opened
the attachment. These extensions can include .com, .exe, .pif,
and .scr. Delivery and propagation/replication methods of the
infected attachments can include:

1) mass-mailing ability:

a) MS Outlook Contacts lists;

b) Windows Address Book (WAB);

c) Addresses on local systems;

d) Randomly-generated e-mail addresses;

2) Internet Relay Chat (IRC);

3) AOL Instant Messenger (AIM);

4) KaZaa file-sharing services (ftp).

Components of the worm can include:

1) An SMTP engine;

2) HTTP services (via port 81);

3) Self-updating mechanisms (via the IRC functions noted);

4) Anti-virus software process terminations (to prevent
detection/removal by AV services).

Symptoms include but are not limited to:

1) Unexpected traffic on port 6667 (port use confirmed);
additional IRC ports in 6660-6669 range possible
(currently unconfirmed);

2) Unexpected traffic on port 5190 (AIM);

3) Unauthorized HTTP traffic on port 81.

RECOMMENDATIONS/SOLUTIONS

The DHS is working with other government agencies, network
security experts, and industry representatives to define,
prioritize, and mitigate these vulnerabilities. The DHS
suggests that you implement industry "best practices."
Additionally, manual removal instructions, current virus definitions, and updated information may be found at the
following URLS:

CERT-CC (Carnegie-Mellon University) - http://www.cert.org/current/current_activity.html#peido


McAfee (W32/Fizzer@MM) - http://vil.nai.com/vil/content/v_100295.htm

Symantec (W32.HLLW.Fizzer@mm) - http://www.symantec.com/avcenter/venc/d ... er@mm.html



The DHS encourages individuals to report information
concerning suspicious or criminal activity to a Homeland
Security watch office. Individuals may report incidents
online at http://nipc.gov/incident/cirr.html , and Federal agencies/departments may report incidents online at http://www.fedcirc.gov/reportform.html. Contact number for
the IAIP watch centers are: for private citizens and companies,
(202) 323-3205, 1-888-585-9078, or nipc.watch@fbi.gov; for the
telecom industry, (703) 607-4950 or ncs@ncs.gov; and for Federal
agencies/departments, 1 (888) 282-0870 or fedcirc@fedcirc.gov.

If you have any questions feel free to contact your local office.

Thanks,

Insight Communications"
<a href="http://www.therockboat.com/" ><img src="http://www2.pdai.org/cam/trb.gif" /></a>
User avatar
Cameron
pm Insider
 
Posts: 2352
Joined: Nov 22, 2001 @ 12:58pm
Location: Indianapolis, Indiana


Postby sponge » May 21, 2003 @ 10:39pm

holy internets batman.
User avatar
sponge
Not sponge
 
Posts: 12779
Joined: Jan 13, 2002 @ 8:04am
Location: New Hampshire


Postby ktemkin » May 23, 2003 @ 4:09am

User avatar
ktemkin
pm Member
 
Posts: 1209
Joined: May 21, 2002 @ 9:51pm
Location: Smithtown, NY


Previous

Return to Anything Discussion


Sort


Forum Description

Post all off-topic messages here, almost anything goes.

Moderators:

Dan East, sponge, David Horn, Kevin Gelso, RICoder

Forum permissions

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

cron