C
C.News
Anybody? we just had an outbreak and we have symantec corp 8 def dated aug 4
2004
2004
C.News said:Anybody? we just had an outbreak and we have symantec corp 8 def dated aug 4
2004
C.News said:Anybody? we just had an outbreak and we have symantec corp 8 def dated aug 4
2004
C.News said:Anybody? we just had an outbreak and we have symantec corp 8 def dated aug 4
2004
Anybody? we just had an outbreak and we have symantec corp 8 def dated aug 4
2004
Anybody? we just had an outbreak and we have symantec corp 8 def dated aug 4
2004
Duane Lambe said:C.News said:Anybody? we just had an outbreak and we have symantec corp 8 def dated aug 4
2004
Subject: VIRUS (Trojan.JS.RunMe, Trojan.JS.RunMe, Trojan.RunMe) FROM
<?@[xxx.xxx.xxx.xxx]>
3 viruses were found.
A banned name (price_new.zip) was found.
Scanner detecting a virus: Clam Antivirus-clamd
The mail originated from: <?@[xxx.xxx.xxx.xxx]>
According to the 'Received:' trace, the message originated at:
1JC1741.com (avignon-ext.ilog.com [xxx.xxx.xxx.xxx] (may be forged)
Notification to sender will not be mailed.
The message WAS NOT delivered to:
<[email protected]>:
250 2.7.1 Ok, discarded, id=30490-53 - VIRUS: Trojan.JS.RunMe,
Trojan.JS.RunMe, Trojan.RunMe
Virus scanner output:
/opt/amavis/work/amavis-20040809T164804-30490/parts/part-00000:
Trojan.JS.RunMe FOUND
/opt/amavis/work/amavis-20040809T164804-30490/parts/part-00003:
Trojan.JS.RunMe FOUND
/opt/amavis/work/amavis-20040809T164804-30490/parts/part-00004:
Trojan.RunMe FOUND
The message has been quarantined as:
/var/amavis/virusmails
Symantec identifies it as W32Beagle.AO@mmGary said:Trendmicro A/V now reports the virus TROJ_BAGLE.AC in price\price.exe
The latest A/v Signature file was dated 1:04 this afternoon.
Gary
dated aug
4
I just used 'Intelligent Updater' and now Symantec picks it up.
I had just tried the regulat Update button, but it didn't download the
latest def dated 9Aug04.
C'mon Symantec.
D. T. said:You can say that again! Symantec was really asleep at the wheel today.
After all their competitors already had defs out for this one, Symantec
finally got it together. Here's my experience:
1. email arrives this morning with "new_price.zip" attachment and not
much else...Norton blissfully ignores it on the way in, so I carefully
save the Zip file to my Desktop and try a scan....nothing...so I extract
the "price.exe" to the Desktop (I like living dangerously) and scan
it...nothing. (see below for interesting aside about the source of this
first copy...especially if you're a Bank One - J.P. Morgan Chase & Co.
customer...)
2. I check sarc.com, and no mention of a new worm...I then scanned
Google and "Google groups" and nothing...I try a LiveUpdate and it still
thinks that my 8/4 defs are just fine.
3. Another infected message arrives, so this time, I go to sarc.com and
do a full "Intelligent Update" (8/9/2004 rev. 19) and scan the
files....nothing.
4. By now, McAfee has identified this as a new Bagle variant....another
infected message arrives, so I go to another computer on my network and
this time, I can do a Live Update and actually get something dated
today, so I go back to my own PC and try Live Update...nothing...but I
see that the Intelligent Update rev. number has changed so I grab that.
Now all I had to do was touch the live files on my Desktop with my
cursor and NAV deleted them with a dire warning....about time!
Here's the scoop on the Bank One connection....the first copy of this
new Bagle worm that I received came from a computer at Sigma Marketing
in NY, and it was sent to an address that I have only given to Bank One
for online access to their site, so I went to the sigmamarketing.com
site and look at their clients list, and there's Bank One. That means
that some idiot
at Sigma clicked on the darn ZIP file and executed the
EXE, and then their computer proceeded to spew worms "From" one Bank One
customer's email address "To" another customer address. I called them
and got them to confess, and then I reported it to Bank One's Corportate
Security folks...I don't think they're having a very good Monday...
I had a similar thing happen with the address that I only gave to the
Bank of America for their "portal" -- back in May, I received a worm at
that address and so I did some digging and found that the worm
originated in India, on the computer of an employee of "Yodlee," a
company that does "aggregation" of financial info for many banks. They
were all in denial for a long time about that one, but I had
incontrovertible proof abuout the origin of the infection.
I guess the security procedures for both of those big banks need a
little overhaul.
DT in AZ
Yes, I've received two zipped email attackments today with names
price.zip and price1.zip.
Netuser said:What were the files inside the zip files?
Duane Lambe said:Same thing here, few systems internally have it (those that aren't 100%
"good" at recognition yet . No news yet, but both SAV Corp 9, and
Frisk on our mail server missed it.
Our defs are the same as yours, rev 34, and they're ineffective against
whatever this is - all that's known is that's it's a mass-mailer.