Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Operating Systems Software Windows

W32.Sobig.E@mm Worm Spreading Rapidly 547

mabu writes "Apparently there is another worm spreading online. Symantec has upgraded its severity to 'category 3.' This worm appears to primarily affect Microsoft systems, has an expiration date of July 14th, and searches users' machines for select files containing e-mail addresses that it uses to propagate itself."
This discussion has been archived. No new comments can be posted.

W32.Sobig.E@mm Worm Spreading Rapidly

Comments Filter:
  • Fortunately... (Score:5, Interesting)

    by Hadlock ( 143607 ) on Friday June 27, 2003 @04:53AM (#6309295) Homepage Journal
    I have an "early slashdot worm story alert system" built in to my DSL connection. I found out about this around midnight last night, when my DSL connection proceeded to crawl to a slow, and even google was returning results with considerable lag.

    Anyone else so lucky to have a system such as mine? This works well on the UTA campus network, also. At least, a worm story has been reported w/in 24 hours of every noticable long slowdown of the net for me...
  • 1. Virus writers
    2. Spam merchants
    3. ???

    Is there an organized group involved in
    trying to take control of the Internet
    through the nefarious means of planting
    virus and trojan software on a critical
    mass of systems from which they can launch
    deadly attacks to take over the entire
    Internet?

    Ahem. No MSN, Kazaa or AOL jokes please.
    This is a serious question.
  • I opened it (Score:3, Interesting)

    by Barbarian ( 9467 ) on Friday June 27, 2003 @05:00AM (#6309326)
    Fortunately my virus scanner DAT was up to date, although it did misidentify it and the info page said that it was supposed to expire June 6.
  • by struppi ( 576767 ) <struppi&guglhupf,net> on Friday June 27, 2003 @05:09AM (#6309354) Homepage
    Now, honestly. Imagine you are using a Windooze PC -- you should know that there is a new email worm approximately every 1 1/2 months.
    You receive an email from support@yahoo.com with the subject "Re: Documents". You know you never have written an email to this adress with this subject.
    Would you really click on this attachment??

    I guess there are still people who do.

    They are a dying race. We should let them pass.
    -- Ambassador Kosh, Vorlon Empire

  • by gad_zuki! ( 70830 ) * on Friday June 27, 2003 @05:26AM (#6309398)
    I think virus writers' priorities have changed since. With everyone on the net now, the bragging points have to do with how quickly and how many machines you can infect. [caida.org] Its quantity over quality. Payload? What payload?

    Ah yes, the halcyon days of the wazoo virus [pdxtc.com] or when getting a virus meant your disk partitions were officially destroyed.

  • Why Never Apple? (Score:5, Interesting)

    by Bloodmoon1 ( 604793 ) <`moc.liamg' `ta' `noirepyh.eb'> on Friday June 27, 2003 @05:26AM (#6309401) Homepage Journal
    Ok, this is a serious question, not an attempt to start a flame war or anything, but why does this always happen to MS systems? I use a Mac and have only had to work with Windows at my college and a few other times here and there. I've NEVER seen a live Mac trojan or worm and have only ever encountered one virus (the 666 one) that wasn't really malicious and only added some extra resources labeled "(Box thingy)666" in an application's resource fork that caused an application to run a little slower. And that was 4 or 5 years ago in OS 7.5 or 8.

    Now, I understand the "security through obscurity" theory that basically says Mac's have far fewer virii problems than PCs because not nearly as many people use Macs, but that's sort of a dead idea nowadays. While we don't have nearly the numbers of any MS OS, by Apple's numbers, there are 7 million users [apple.com] of OS X, which makes the current number of users in the OS X community about as large as the populations of Hong Kong (7,303,334) or Switzerland (7,301,994), and about 1 million more people than the pop. of Israel (6,029,529). (Go on, check my numbers [cia.gov].) And just for good measure, add to that the fact we now have a more or less Unix based OS and therefore must have some common ground with numerous other OSes. It's not like we're a tiny little niche to go after, or one that no one knows how to program for. Hell, Apple even gives away developer tools to write out and compile programs. So why don't we ever see any worm, trojan, or virus outbreaks for OS X?
  • by Tet ( 2721 ) <.ku.oc.enydartsa. .ta. .todhsals.> on Friday June 27, 2003 @05:31AM (#6309414) Homepage Journal
    You know you never have written an email to this adress with this subject. Would you really click on this attachment??

    It goes like this. The mail hits our company yesterday morning at 10:58. By 11:00 I've sent a company wide mail out telling people that it's a virus that's slipped past our scanner, and not to open it. At 11:02 I get apologetic messages from those who had already done so -- "I thought it was someone sending me something", "It was just a zip file", "I didn't know". Yes you did, you morons! I've told you enough times! You will never teach people not to do this. People are stupid.

  • by zeekiorage ( 545864 ) on Friday June 27, 2003 @05:31AM (#6309418)
    Every time a new mass mailing worm comes out all the antivirus vendors issue updates to their virus definitions. This stops _that_ particular virus from infecting a machine or spreading further. A better approch would be to monitor socket connections on port 25, I think Norton antivirus already does that, aren't the other AVs already doing this or the people getting infected simply not running a antivirus scanner at all? In any case the anuvirus vendors need to figure out a different way of dealing with these pests.
  • by Peer ( 137534 ) on Friday June 27, 2003 @05:40AM (#6309463) Homepage
    Is this a subtle way of trying to say "Yes it's another fucking windows virus" without sounding like we're anti windows?

    The register [theregister.co.uk] is less subtle (almost advertising other platforms);
    As usual, the worm affects only Windows PCs. Linux and Mac users are immune.
  • by alizard ( 107678 ) <alizardNO@SPAMecis.com> on Friday June 27, 2003 @05:47AM (#6309488) Homepage
    Red Hat 9 is on the other HD,this is a dual boot box. I'll think about going full-time with Linux when someone comes up with an Open Source vector draw app that'll read my Corel Draw 8 files. I said vector-draw, not bit-map/paint, so don't tell me about GIMP, that's something GIMP does not do.

    However, I run Eudora, not Outhouse Express, and ZoneAlarm renames file attachments so they can't be opened by accident. (as in click and you got a prompt asking if you really want to do this?)

    There really isn't an excuse to get nailed by this even for Windoze users for the most part, "executable file attachment from somebody I don't know" =! CLICK HERE. These virus-generated e-mails all have a generic look to them, I dump them unopened into my virus-contaminated folder for later cleanup .

    I got rid of 16 copies of Sobig.E today.

  • by asciimonster ( 305672 ) on Friday June 27, 2003 @05:49AM (#6309499) Journal
    This worm doesn't use this, but some windows computers are set up to hide "known extentions". So when an attachment is sent of the form "Observations.doc.exe" the user would only see "Observation.doc" and open it without a second thought.

    On the other hand: Viewing, opening and running an attachment is all done with the same click of the same mouse button. Most people just don't know the difference. (People have trouble enough using outlook, because it is such an incredibly illogical programme)

    And let's be honest: Even if you would put a neon sign over the e-mail that read: "Don't open this: It contains a virus!", they would just go right ahead and open it. And NEVER underestimate how many people are totally stupid (I know from experience).
  • by janda ( 572221 ) <janda@kali-tai.net> on Friday June 27, 2003 @05:51AM (#6309503) Homepage

    To quote the parent:

    I mean, why would all virus writers suddenly become so nice?

    Because most of the virus writers today don't know the difference between an IBM 3090 and an Atari 2600? If you think I'm kidding, look at some of the stuff from the 80's, which would see if you were infected by virus "x", and DISINFECT YOUR COMPUTER FOR YOU IF YOU WERE, before infecting you with virus "y".

    It also provides an interesting "but I didn't do any harm" attemp at defense if they are actually caught and Mommy and Daddy have to cough up money for a lawyer.

  • Re:Linux is so C00L (Score:2, Interesting)

    by Anonymous Coward on Friday June 27, 2003 @05:53AM (#6309509)
    But that's what actually does make Linux so cool. You actually learn something when you're trying to configure some settings. I got bored of Windows and switched over to Linux about three weeks ago. Haven't looked back since.
  • by ashitaka ( 27544 ) on Friday June 27, 2003 @06:07AM (#6309544) Homepage
    Sobig.E first hit Wednesday, a couple of copies got in before I warned the huddled masses to not open any .ZIP attachments until CA got their act together which they did a couple of hours later. A full scan of the Exchange store cleaned everything off and anything new is getting cleaned on the way in.

    NOW, late this afternoon I get a couple of emails from the lawyers say they are appearing again, just as one pops up in my Inbox.

    CA did update their signature again late in the day which opens up two possibilities:

    1) The latest signature broke the ability of CA's software to catch Sobig.E or

    2) This is a new variant (Sobig.F?)

  • 14th of July being Bastille day [google.com] in France.

    "In France, the 14th of July is a National Holiday. It is known as Bastille Day and celebrates the storming of the Bastille , a French prison, in 1789. This was the start of the French Revolution."

    Wonder if this has any relevance? Maybe it's a signal, a secret message.. :)

  • by tankdilla ( 652987 ) on Friday June 27, 2003 @06:55AM (#6309662) Homepage Journal
    Worm is to worm, as Windows is to dirt (worms move through dirt easily, replicate in dirt), as Linux is to fish (worms die after entering a fish, or getting eaten).

    Just a little analogy play, not to be taken seriously. In actuality Linux is a penguin and not a fish.

  • by 241comp ( 535228 ) on Friday June 27, 2003 @08:18AM (#6309895) Homepage
    That's similar to what we pulled on a teacher at my high school. One time when I was fixing her computer for her, I installed a special program that we had created just for her a few weeks earlier. The program did this:

    - Randomly chose a time between 10 minutes and 3 hours to run again
    - Randomly chose one or more of the following actions
    - Crow like a rooster (this turned up the volume to full before crowing)
    - Eject the CD drive (whether there was a cd in it or not)
    - Eject the floppy if it was in there
    - Print a random amount of blank paper from whatever printer she had last printed to (usually the one in her office)
    - Change the theme of her desktop
    - Enable Active-Desktop and set the desktop randomly to a website
  • Re:All it takes... (Score:5, Interesting)

    by EvilTwinSkippy ( 112490 ) <yoda AT etoyoc DOT com> on Friday June 27, 2003 @08:32AM (#6309982) Homepage Journal
    2 of my users recieved the virus, despite running a filter the looks for .pif (and the dozen of so other extensions you can click and shit with) attachments. It's supposed to decompress and scan zipfiles. I just added ZIP to the shitlist until I get it figured out.

    My viruses were from support@dell.com. I've banned outlook, but looking through the headers, it is obvious that SOMEONE was using it.

    I'm about to ban attachments alltogether and instead write a web-based document distribution system. At the very least it makes tracking the provenance of documents easier. Besides users have this habit of NEVER throwing away email, and the attachments eat up a lot of room on the server.

    We run IMAP. (That's another discussion)

  • by NorthWoodsman ( 606357 ) on Friday June 27, 2003 @08:38AM (#6310023) Homepage
    It managed to pick up the name of the CIS Undergrad mailer address, so suddenly all of us were getting the Sobig virus over and over again, as well as getting it from all the infected people. Yeah, it was great. Now, why just anyone could mass mail something by sending an Email to the undergrad mailing address is somewhat of a question..

    I did see some people saying "When's the next service pack coming out to fix this"; this virus isn't clever enough to use exploits, it's just another lamer Email Windows worm that generates network traffic.
  • by StressGuy ( 472374 ) on Friday June 27, 2003 @08:48AM (#6310087)
    1) Had an e-mail from a ".mil" domain (forget the actual address)

    2) Having recently mailed some questions to some government research agencies, I assumed this was a response to one of them, so, I opened the e-mail (I use Mozilla).

    3) No message in the e-mail, just an attachment called "your_application.zip". This was a tad suspicious so I copied the file and scanned it with a corporate edition of Norton Anti-Virus last updated on June 18th.

    4) Virus scan came up clean so I opened the file. After seeing that it was only a ".pif" file, I started to get concerned, tried to edit the file by right-clicking and the edit option didn't show. At this point, I'm pretty sure it's a virus.

    5) Examined the header information from the e-mail and discoverd that it actually originated from another office computer and the "from" address was spoofed. Now, I'm all but certain it's a virus.

    6) Went to the Symantec website and, sure enough, the virus information is there along with notification that the patch was only available since June 25th.

    7) Downloaded their fix tool and checked all computers in our office for evidence of infection. Was able to clean them all.

    So, even though I was relatively careful, I was still able to get infected. Primarily because:

    a) The "From" address was an expected source.

    b) I do occasionally get legitimate e-mails that are only an attachment with no text.

    c) This particular virus was so new that my virus scanner was not sufficiently up to date.

    FYI, I guess...

  • by Anonymous Coward on Friday June 27, 2003 @09:07AM (#6310229)
    I mean, why would all virus writers suddenly become so nice ? Most of the virus nowadays are doing almost no damage.
    I'm posting this AC (and through an open proxy, in case anyone tries to go tracking me down) for a reason. I'd love to take personal credit, but I just can't risk it.

    I've written 3 worms. None of them have ever gotten media attention, though all three have been cataloged at the various AV sites. In other words, my worms have been successful enough to be noticed and "fought," but not successful enough to gain widespread notoriety. That's just how I wanted them.

    Let me give you some insight from my perspective. I don't work for an AV company, nor do I have any relation to one. My interest in worms is purely "proof of concept." I wrote these worms for one reason: to prove that I could. More than anything, the goal for me is to see my creations spread, even if only slightly. Especially if only slightly. I don't want to unleash a Melissa, or an ILoveYou, or a Nimda - partly because I'm not out to cause a huge nuisance, and partly because I don't want my worms to gain enough attention that law enforcement starts looking into them.

    The first worm I created was extraordinarily buggy, and (apparently) only worked on Win98 systems, due to variations in the Win32 API. I was using Win98 to compile at the time, and neglected to test it on other Windows versions. The second and third times around, I personally tested them on Win98, Win2K, and WinXP to make sure they were viable on all three.

    None of my worms have a malicious payload. The payloads involve:

    a) Dropping registry keys with vulgar names (mainly as an exercise to see whether or not AV providers would publish curse words in the virus descriptions - none of them did).

    b) Popping up dialog boxes with random messages. This is more of an easter egg than a payload, really. A timer runs, and on each invocation of the timer, a random number is generated. If the generated number matches a predefined constant, the user will see a dialog box with an interesting message.

    c) Creating innocuous (but possibly large) files on the local C drive. The files contain nothing, but may take up large amounts of disk space.

    d) Propagation, obviously.

    That's it. Again, it's mostly proof of concept, my motivation is to see my worms show up at AV sites.

    Have I been tempted to include a malicious payload? You bet I have. But again, I'm not out to get arrested, and while I'm fairly confident in my ability to create an untraceable executable and launch it in an anonymous manner, I'm not willing to bet my freedom on it. Writing a worm to begin with is enough of a risk. Writing a worm that kills tens or hundreds of thousands of PCs? No thanks, I'll leave that up to someone else.

    It would be damned easy to adapt one of my two "successful" worms to delete 100 random files on drive C each time it runs. This would be enough to fuck up nearly any Windows machine after a few boots. Destruction is easy, it's just not necessarily a goal.

    I hope this gives you some insight into the mind of a worm author.
  • by joto ( 134244 ) on Friday June 27, 2003 @09:24AM (#6310375)
    zip files CAN be opened on the server and scanned, decent virii scanners do this already for exchange, adding that ability to sendmail is trivial.

    Sure, just make sure you also doesn't become vulnerable to the old compressed 4GB of /dev/zero trick. It can really bring your mailserver down.

  • PEBCAK (Score:5, Interesting)

    by EvilAlien ( 133134 ) on Friday June 27, 2003 @09:33AM (#6310440) Journal
    No, its another way of saying "Windows users are still dumb and don't apply patches or basic security best practices despite getting exploited over and over ad nauseum".

    Why be subtle about it?

    I went to a seminar yesterday wherein a security guy from Microsoft (stop laughing, its not funny yet) extolled the virtures of Windows Server 2003. They have learned their lesson about security and ease-of-use being the only development consideration... guess where they learned it from? All the best practices they have implemented for Server 2003 comes from Linux, Unix, and the Open Source world. "Free How-Tos"! What an innovation!

    Now if only someone can teach the MS admins and users to apply the goddamn patches that Microsoft releases! (for an example of what I'm talking about, see anything about the SQL Slammer specifically)

  • by rabtech ( 223758 ) on Friday June 27, 2003 @12:43PM (#6312260) Homepage
    Who the hell modded this troll up?

    This argument is a myth, and has been used by Microsofties to try and downplay the vastly superior security of both *BSD and GNU/Linux. Mac OS X is a FreeBSD derivative in many respects, and vastly better designed from the ground up than Microsoft windows, for whom things like networking and security were afterthoughts cobbled together in an ad-hoc frenzy of featuritis and catch-up.

    ROFL! I think you will find that it is Windows that has DACLs, and you will also find that networking was a core component of NT 3.5; perhaps you are still stuck in the days of Windows 95?

    Such an ad-hoc approach to design will never yield acceptable security, as Microsoft's shoddy products have demonstrated so dramatically in recent years, time and time again...and once again today, with this irritating worm.

    Actually this worm requires that open an unknown attatched ZIP file from an email message, extract the executable, then run it. How, exactly, is that Microsoft's fault?

    [removed your crap about numbers]

    Actually, most people don't check their email on their servers, so your entire argument is pointless. Email viruses are targetted at the largest base of email clients, which happens to be Windows email clients.


    It isn't about numbers. It is about design, and everyone in the industry, with the exception of Microsoft, has taken security seriously and designed their systems appropriately.


    Ha! Squeaked the itty bitty mouse.

    First of all, Microsoft has done a lot to make security easier to configure on Windows 2000. Some of us were reading the best practices documents and implementing proper security long before that, but others were not so Microsoft developed tools (URLScan, Baseline Security Analyser, etc).

    Microsoft also expended a lot of effort making sure that the next version, server 2003, was secure out of the box, and when additional services are installed that they do so in a maximally secured state. The various wizards do a good job of alerting the admin to possible problems.

    The last step is the security model of the dotNET runtime. Essentially, it is an entirely new paradigm that causes code to assume additional security restrictions based on administratively set policies and the source of the executable. If an executable originally came from an email, the runtime can know that and handle security in an appropriate way. But these things take time, and you always have the native code hole. I don't see any way around that.

    P.S. You can mark things executable or not in Windows. It is the "traverse folder / execute file" right. You see, since Windows supports DACLs on Folders and Files, Registry keys, and indeed ... nearly any object in the system, it is far more configurable as a file or application server than Linux or OS X. (I, for one, run my services like IIS and such in a separate security account from SYSTEM [root] so that breeches can't bring down the system. That is another security 'best practice')

    For example, if you save all downloaded files from email or the web to C:\temp then you can right-click temp and go to the security tab. Click Advanced. Click Add. Select "Everyone". Now on the permissions entry tab, click "Traverse Folder / Execute File" in the DENY column. Then select "apply onto" as "Files Only". OK your way out of all that.

    Now no one can execute files in c:\temp or its subfolders, since the entry will be inherited by subfolders by default.

    You can go so far as to set that up on your entire drive, but I would strongly suggest disabling inherited permissions (select COPY when prompted) on Program Files and the Windows (or WINNT) folder. Otherwise, you may find yourself screwed.
  • by Sigh Phi ( 324315 ) on Friday June 27, 2003 @04:47PM (#6314638)

    I recalled a similar question a few years ago in comp.sys.mac.advocacy. With the help of Google, I was able to pull D.M. Procida's comparisons between gobbing and writing viruses [google.com]:

    The question of Apple Macintosh computer viruses is best answered with reference to the Ramones' and Talking Heads' first European tour in 1977.

    When Talking Heads (the now sadly-defunct vehicle for David Byrne's hips) played to audiences in Britain they discovered a music scene that was amongst other things notable for the disgusting and unhygenic custom of 'gobbing'. Chiefly this was a signal employed by audiences to demonstrate their approval of the band, at whom - indeed, in whose faces - the gobbing was directed, but some bands at any rate bands were often happy to reciprocate. Johnny Rotten of the Sex Pistols would accede to requests for an autograph by gobbing on the hand of requester.

    Some bands, such as the Ramones, seemed to attract veritable rainstorms of gob. Joey Ramone had to pull his long fringe over his face and carry on grimly as the gob flew past. But when Talking Heads played for some reason the gobbing stopped. "Possibly the spitters were lurking in the back of the audience during their set," Tommy Ramone said once, "but I don't think so. They just didn't make you want to spit."

    I think the situation is on the whole similar with the Mac: it just doesn't make you want to write viruses.

    I don't pretend that this is a realistic answer; but it is an interesting take.

With your bare hands?!?

Working...