New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 981
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image CyberCrime: Weekly Summaries: Weekly report on viruses and intrusions image
CyberCrime


For it is far better to know something about everything
than to know all about one thing. This universality is the best.
Blaise Pascal (1623-1662); French scientist and philosopher.

- Weekly report on viruses and intrusions -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

Madrid, February 8, 2004 - In this week's report we are going to look at
Mydoom.A, that appeared on January 27 and has continued spreading widely.
Then we will turn to five totally different type of malware: Mimail.T,
Sdbot.MH, Gaobot.DQ, X-Scan.A and Y2k.

Although the number of infections caused by Mydoom.A stabilized at the
beginning of this week, it still infected a high percentage of computers.
This worm has caused almost five times more infections than Downloader.L,
the second virus most frequently detected by Panda ActiveScan.

Mydoom.A is the fastest spreading malicious code in computing history and
has caused the biggest virus epidemic ever. As you know, it spreads via
e-mail in a message with variable characteristics and through the P2P
(peer-to-peer) file sharing program KaZaA. If the date on the affected
computer is between February 1 and 12, 2004, it launches Distributed Denial
of Service (DDoS) attacks against the website w w w.sco.com. From February
12, 2004, Mydoom.A stops its actions, preventing them from being run when it
activates.

The T variant of the Mimail is sent in an e-mail message with variable
characteristics and a compressed -password-protected- file, which contains
the worm's code. Every so often, it checks in an Internet connection is open
and tries to access to the website w w w.google.com. Furthermore, in order
to prevent its process from appearing in the list in the Task Manager,
Mimail.T registers itself as a Windows service.

Today's third malicious code is Sdbot.MH. This backdoor goes memory resident
when it is run and connects to a server in order to access a specific IRC
channel and receive command controls such as, download and run files, scan
ports, etc.

Gaobot.DQ is a worm that affects computers running Windows 2003/XP/2000/NT.
It spreads by making copies of itself in the shared network resources it
manages to access, and by exploiting the RPC Locator, RPC DCOM and WebDAV
vulnerabilities. A clear indication that Gaobot.DQ has reached a computer is
a significant increase in the volume of network traffic through the TCP
ports 135 and 445, as the worm attempts to exploit these vulnerabilities.

When it is run, Gaobot.DQ connects to a specific IRC server and waits for
control commands. It also ends the processes belonging to antivirus
programs, firewalls, system monitoring tools and other malicious code like
Nachi.A and Sobig.F.

X-Scan.A is a hacking tool that scans computers and networks for
vulnerabilities. If it finds a vulnerability, it logs all the keystrokes
entered during the session. It obtains information from the affected
computer, such as the type and version of the operating system, the status
of standard ports, information on the Windows Registry, SNMP and NETBIOS
protocols, CGI/IIS/RPC vulnerabilities, SQL/FTP/SMTP/POP3 servers, etc.

We are going to finish this week's report with Y2K, a joke that displays a
message on screen pretending to carry out a test in order to check if the
affected computer is Y2K compliant. During this fake test, it opens and
closes the CD-ROM tray, it makes the screen flicker, changes the mouse
pointer, etc. Once the so-called test is finished, Y2k informs that it has
found a flaw in the PC-Speaker and, unless this problem is solved, the user
will not be able to start the computer during the year 2000. Finally, the
program announces that it was only a joke.

For further information about these and other computer threats, visit Panda
Software's Encyclopedia at:
http://www.pandasoftware.com/virus_info/encyclopedia

Additional information

- Hacking tool: Program that can be used by a hacker to carry out actions
that cause problems for the user of the affected computer (allowing the
hacker to control the affected computer, steal confidential information,
scan communication ports, etc.).

- POP (Post Office Protocol): This is a protocol for receiving and sending
e-mails.

More definitions at:
http://www.pandasoftware.com/virus_info/glossary/default.aspx

NOTE: The addresses above may not show up on your screen as single lines.
This would prevent you from using the links to access the web pages. If this
happens, just use the 'cut' and 'paste' options to join the pieces of the
URL.
Posted on Sunday, 08 February 2004 @ 19:10:26 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· HotScripts
· Google Search Engine
· W3 Consortium
· More about CyberCrime
· News by phoenix22


Most read story about CyberCrime:
Police to Launch International Cyber Child Porn Sting

image
Article Rating
Average Score: 3
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register