Προς το περιεχόμενο

Sobig.C worm outbreak sends mails as bill@microsof


support

Προτεινόμενες αναρτήσεις

Sobig.C was first seen on Sunday, 1st of June. The very same date that was set to be the end of Sobig.B life. Since then it has been spreading at an increasing pace.

 

The worm spreads via e-mail attachments and Windows network shares. The e-mails sent by the worm pretend to come from addresses collected from the users' machines and they contain the message text "Please see the attached file.".

 

In addition to the e-mail spreading, Sobig.C will search for Windows machines within the infected Local Area Network and will try to copy itself to their Startup folder. This will fail unless users are sharing their Windows directories with write access a thing that should never be done.

 

After spreading, Sobig.C will try to download additional code from a web pages located at Geocities.com and run it. F-Secure has been in touch with various security response organizations and has received confirmation from Geocities that the pages used by the worm have been closed.

 

The Sobig.C worm wont spread for long. It has been programmed to stop spreading on the 8th of June, 2003. It will still continue to send infected e-mails from machines that have their clock set wrong.

 

Virusinfo for Sobig.C

 

Συνδέστε για να σχολιάσετε
Κοινοποίηση σε άλλες σελίδες

Αρχειοθετημένο

Αυτό το θέμα έχει αρχειοθετηθεί και είναι κλειστό για περαιτέρω απαντήσεις.

  • Δημιουργία νέου...