New User? Click here to register! Feel free to read this for beginners help.

Computer Cops
image image image image image image image image
Prime Choice
· Head Lines
· Dnld of the Week!
· Find a Cure!

· Ian T's (Article 13)
· Marcia's (Op9)
· Paul's (Article 3)

· Ian T's Archive
· Marcia's Archive
· Paul's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search
· Sections
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Search

image
Survey
Which Anti-Virus product do you use?

Computer Associates
Eset (NOD32)
F-Secure
Frisk (F-Prot)
Grisoft (AVG)
Kaspersky
Network Associates (McAfee)
Panda
Sophos
Symantec (NAV)
Trend Micro
Other



Results
Polls

Votes: 9707
Comments: 94
image
Donations
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
Hosted By
Computer Cops is a satisfied customer of [ JaguarPC ]
image
image vrs: Weekly Summaries: Weekly report on viruses and intrusions image
Viruses


Weekly report on viruses and intrusions

It is healthy to be reminded that the strongest might weaken and the wisest might err.
Mahatma Gandhi (1869-194; Indian ascetic & nationalist leader. "From a gas station in E. St. Louis!"

Madrid, March 21 2004 - Once again the report on viruses and intruders centers on new variants of malicious code, in this case five variants of Bagle and two of Netsky.

The first variants of Bagle we'll look at -O and N- share the following characteristics:

- They spread via e-mail in a message with variable characteristics, which contains an attachment (in the O variant the file has an icon similar to Notepad, while the N variant has a True Type font icon). Both worms can also spread via peer-to-peer file sharing applications.

- They infect and increase the size of PE files (in the case of the O variant the increase is 44KB, and with the N variant, the increase is 21KB).

- They both open a backdoor through TCP port 2556.

- They terminate processes belonging to certain programs, including some antivirus applications, firewalls and system monitoring tools. They also terminate other processes related to previous variants of the Bagle and Netsky worms.

- They will only run up until December 31 2005 (according to the system date).

The main features that differentiate these variants of Bagle are:

- Bagle.O contains a text inside its code which makes an image of a butterfly, although this can't be seen.

- Bagle.N is a polimorphic malicious code.

- The size, both when compressed and extracted: Bagle.O is 23558 when compressed and 44189 bytes when extracted, and the N variant is 20650 and 38570 bytes respectively.

The other three variants of Bagle that were looking at today are the Q, R and S variants, of which the first and third infect files. Bagle.Q downloads a file from the Internet and then runs it on the computer. According to PandaLabs, this last variant has spread widely.

The next worms we're looking at today are Netsky.N and Netsky.O. They are sent by e-mail, using their own SMTP engine, to all addresses they find in files with certain extensions. They also create several files, some in MIME format, and delete entries made by certain worms including Mydoom and Bagle. They also create a mutex to avoid several simultaneous executions.

Aspects that differentiate the N and O variants of Netsky include the texts in the message in which they are sent, the files copied to infected computers and the registry entries they create.
Posted on Sunday, 21 March 2004 @ 09:03:54 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· HotScripts
· W3 Consortium
· More about Viruses
· News by phoenix22


Most read story about Viruses:
Xupiter Virus!

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 0 comments
Threshold
  
The comments are owned by the poster. We aren't responsible for their content.