Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Bug Microsoft Spam

Microsoft Virus Spam: SoBig.F 557

If you're being barraged with Microsoft virus spam emails today, this story notes that it's a flare-up of an older Microsoft virus in a new, improved form. Yay for trustworthy computing.
This discussion has been archived. No new comments can be posted.

Microsoft Virus Spam: SoBig.F

Comments Filter:
  • by Gothmolly ( 148874 ) on Tuesday August 19, 2003 @01:18PM (#6735477)
    If you set your score for MICROSOFT_EXECUTABLE high enough, and these emails with their .pif attachments get sent right to /dev/null
    • by vrone ( 135073 ) on Tuesday August 19, 2003 @01:33PM (#6735672)
      I wish Mozilla Mail had some setting for this too. It's statistical filtering is great after it's been trained, but it did me no good this morning. By the time I got to work, my inbox had over 5000 new messages. Sure, it's trained now, but I spent over an hour this morning deleting them since I didn't want to delete legit mail too.

      So how did I get 5000 new messages? I know I'm not in the address books of that many people who got infected, so this one must be doing dictionary addressing as well as address book addressing. Since my email address is of the format [first initial][lastname]@[a large company].com, and my last name is very common, I got pummelled. Maybe I should switch to a more obscure address. :)
    • by Uggy ( 99326 ) on Tuesday August 19, 2003 @02:21PM (#6736158) Homepage

      Don't need spamassassin for this. If you are using qmail-scanner just set your quarantine-attachments.txt in /var/spool/qmailscan/ like so:

      .exe 0 EXE attachements not allowed
      .vbs 0 VBS attachements not allowed
      .lnk 0 LNK attachements not allowed
      .pif 0 PIF attachements not allowed
      .com 0 PIF attachements not allowed
      .scr 0 SCR attachements not allowed
      .bat 0 BAT attachements not allowed

      Make sure whitespace between the columns is a tab and not spaces. Then rerun your qmailscanner db update and you're good to go.

      Spamassassin is WAY to intelligent to be feeding it filename extensions. This is a lot faster too.

      Are there any other extensions that would be good to block?

      • by MrLint ( 519792 ) on Tuesday August 19, 2003 @02:24PM (#6736180) Journal
        .nws and .eml, i think these were the nimda vectors from a couple years ago.
      • by Anonymous Coward on Tuesday August 19, 2003 @02:52PM (#6736508)
        We filter these at the mail server:

        *.com, *.exe, *.bat, *.vbs, *.vbe, *.js, *.jse, *.hta, *.wsf, *.wsh, *.shs, *.scr, *.pif, *.lnk, *.chm

        All are potential vectors.

        http://antivirus.about.com has a bigger list of suspicious attachment types. Some are document types, but others are just special executable types in Windows, such as .chm files, which are compiled help files.

        It isn't these *have been* exploited by virus writers (though many have), but rather that they *could be*, because of their nature. I would never filter all of them, but I've gotta admit after scanning the list, most of these would be surprising to me to find in an email.

        ADE Microsoft Access Project Extension
        ADP Microsoft Access Project
        BAS Visual Basic Class Module
        BAT Batch File
        CHM Compiled HTML Help File
        CMD Windows NT Command Script
        COM MS-DOS Application
        CPL Control Panel Extension
        CRT Security Certificate
        DLL Dynamic Link Library
        DO* Word Documents and Templates
        EXE Application
        HLP Windows Help File
        HTA HTML Applications
        INF Setup Information File
        INS Internet Communication Settings
        ISP Internet Communication Settings
        JS JScript File
        JSE JScript Encoded Script File
        LNK Shortcut
        MDB Microsoft Access Application
        MDE Microsoft Access MDE Database
        MSC Microsoft Common Console Document
        MSI Windows Installer Package
        MSP Windows Installer Patch
        MST Visual Test Source File
        OCX ActiveX Objects
        PCD Photo CD Image
        PIF Shortcut to MS-DOS Program
        POT PowerPoint Templates
        PPT PowerPoint Files
        REG Registration Entries
        SCR Screen Saver
        SCT Windows Script Component
        SHB Document Shortcut File
        SHS Shell Scrap Object
        SYS System Config/Driver
        URL Internet Shortcut (Uniform Resource Locator)
        VB VBScript File
        VBE VBScript Encoded Script File
        VBS VBScript Script File
        WSC Windows Script Component
        WSF Windows Script File
        WSH Windows Scripting Host Settings File
        XL* Excel Files and Templates
          • most of these would be surprising to me to find in an email.
            • DO* Word Documents and Templates
            • URL Internet Shortcut (Uniform Resource Locator)
            • POT PowerPoint Templates
            • PPT PowerPoint Files
            • XL* Excel Files and Templates
          Yeah, who'd ever expect to receive one of those as an attachment?
      • Are there any other extensions that would be good to block?

        .EML and .MBX, to stop attachments hidden inside attached email messages.

        What sucks is that almost all the Sobig.F's I got today were bounces from mail servers whose admins doesn't know (or care) that the sender of virus attachments is a fake, and just another name from the contact list of the sender.

        To mail server administrators: Do *NOT* bounce mail known to contain viruses -- all you accomplish is to propagate it to someone else instead of

    • by Electrum ( 94638 ) <david@acz.org> on Tuesday August 19, 2003 @02:27PM (#6736232) Homepage
      If you set your score for MICROSOFT_EXECUTABLE high enough, and these emails with their .pif

      Even easier: reject it at the SMTP level [qmail.org]
  • by Robert Hayden ( 58313 ) on Tuesday August 19, 2003 @01:20PM (#6735507) Homepage
    'nuff said.
    • From the makers of pico! :)
    • irony. (Score:5, Insightful)

      by twitter ( 104583 ) on Tuesday August 19, 2003 @03:05PM (#6736636) Homepage Journal
      It's funny how many people post here saying they are imune to the thing, yet everyone is getting them in their mailbox. The web is slow here today and DNS seems shakey. No one is imune to Microsoft polution.

      • Re:irony. (Score:3, Interesting)

        by Mr_Silver ( 213637 )
        No one is imune to Microsoft polution.

        The people actually causing the pollution are those that blindly open attachments without understanding what they are.

        Had you not used the words "Microsoft pollution" and used say, "the problems that Microsoft caused in trying to make PC's easy to use" then you'd have come across less like a raging anti-MS zealot and I'd have given you a mod point.

        However, Slashdot is full of people who blindly mod up anti-MS posts however incorrect, so you can count on them for y

  • heh (Score:5, Informative)

    by abhisarda ( 638576 ) on Tuesday August 19, 2003 @01:21PM (#6735512) Journal
    Just read about about it on the BBC [bbc.co.uk]
  • by joeykiller ( 119489 ) on Tuesday August 19, 2003 @01:21PM (#6735514) Journal
    Here in Norway it seems as "everyone" has got SoBig.F or is getting annoyed with fake emails from someone who has it.

    This virus is just a little variation of an older virus, but it differed enough from the older iterations so that anti virus software didn't detect it.

    The virus provider Norman reckons that a big organization in Norway has been hit early and that this caused the big numbers here: Norway stands for 36% of the outbreaks of this virus in the world, which is exceptional when you know that only 4 million people live here.
    • According to several of the norwegian newssites Norways outbreak accords for 33% of the registered incidents and Usa follows on with 30% and so on. It's annoying as he**, I have got about 65 virus mail's the last three hours and counting
    • by Jucius Maximus ( 229128 ) on Tuesday August 19, 2003 @01:36PM (#6735710) Journal
      Sobig.A appeared on 2003 Jan 09 and was programmed to deactivate on ??.
      Sobig.B appeared on 2003 May 19 and was programmed to deactivate on May 31.
      Sobig.C appeared on 2003 June 01 and was programmed to deactivate on June 08.
      Sobig.D appeared on 2003 June 18 and was programmed to deactivate on July 02.
      Sobig.E appeared on 2003 June 09 and was programmed to deactivate on July 14.
      Sobig.F appeared on 2003 Aug 19 and was programmed to deactivate on Sept 10.

      It seems like the Sobig release schedule is more consistent and on-time than ... well ... the software release schedules of a major company we love to hate ;-)

    • I've gotten more than a halfdozen today. I'm in Sweden, although only one of my addresses is a .se. Considering I have 5 addresses I use regularly, and one guy is claiming 5000 copies of it this morning, I guess I got off lucky. For the moment.

      My mac is obviously immune to the thing, and so is my windows box, seeing that it has IE and Outlook completely removed (yes, every last stupid .dll killed and a couple programs patched to work without it) so it wouldn't get any traction there, even if I used it for

    • by Zocalo ( 252965 ) on Tuesday August 19, 2003 @06:47PM (#6739305) Homepage
      Not for long I suspect! I've received over thirty from an IP block allocated to NASA in the last three hours, and a friend has just emailed to say he's had over two hundred from the same IP block, with over a thousand total. However, the email addresses from the NASA IPs do have a *lot* of .no domains in the email addresses. Hmmm. Maybe the "big organization in Norway" is a NASA observatory or something, it doesn't have to be a native Norwegian company after all...
  • by echucker ( 570962 ) on Tuesday August 19, 2003 @01:21PM (#6735521) Homepage
    http://www.sarc.com/avcenter/venc/data/w32.sobig.f @mm.html
  • by Anonymous Coward on Tuesday August 19, 2003 @01:21PM (#6735523)
    NO MORE GOODTIMES!
    There's a new virus that will re-write your hard drive. Not only that, but it will scramble any disks that are even close to your computer. It will recalibrate your refrigerator's coolness setting so all your ice cream goes melty. It will demagnetize the strips on all your credit cards, screw up the tracking on your television and use subspace field harmonics to scratch any CD's you try to play.

    It will give your ex-girl or boyfriend your new phone number. It will mix Kool-aid into your fishtank. It will drink all your wine and leave its socks out on the coffee table when there's company coming over. It will put a dead squirrel in the back pocket of your good pants and hide your car keys when you are late for work.

    Goodtimes will make you fall in love with a penguin. It will give you nightmares about circus midgets. It will pour sugar in your gas tank and shave off both your eyebrows while dating your girl or boyfriend behind your back and billing the dinner and hotel room to your Discover card.

    It will seduce your grandmother. It does not matter if she is dead; such is the power of Goodtimes. It reaches out beyond the grave to sully those things we hold most dear.

    It moves your car randomly around parking lots so you can't find it. It will kick your dog. It will leave libidinous messages on your boss's voice mail in your voice! It is insidious and subtle. It is dangerous and terrifying to behold. It is also a rather interesting shade of mauve.

    Goodtimes will give you Dutch Elm disease. It will leave the toilet seat up. It will make a batch of Methamphetamine in your bathtub and then leave bacon cooking on the stove while it goes out to chase gradeschoolers with your new snowblower.

    Goodtimes will prompt your mother to call on Friday and Saturday nights for two months after you make a new girlfriend/boyfriend. It will place your wallet and keys on an obscure shelf in the basement. It will emulate your face and stare into the neighbor's bathroom window.

    Goodtimes has been linked to cancer in laboratory mice. 9 out of 10 dentists recommend Goodtimes.

    Goodtimes will make your bloomers shrink two sizes, and it will make you gain 15 pounds. If this results in a wedgie, then Goodtimes will leave a nasty skid mark.
  • Snowcrash? (Score:5, Funny)

    by Lord_Dweomer ( 648696 ) on Tuesday August 19, 2003 @01:22PM (#6735531) Homepage
    You know, with all these virii running around...and the potential danger of them, I'd really like to see an initiative to educate the typical 'dumb Microsoft user'. I'm not talking full tech jargon, but just an informative message, that is persistent, not annoying. Perhaps someone wants to do something like at the end of Snowcrash, where Hiro changes the virus to display "If this had been a virus, you'd all be dead now." (not exact quote, but I don't have my book with me) Just a virus that would go around and pop up a message on boot or something informing them of the various vulnerabilities on their system, how they most likely got them (warez, AOL, email hoax, etc). Now...I'd never do this...but if someone else wanted to steal this idea, I promise I won't sue for IP infringement. Really. (crosses fingers)

  • Funny..... (Score:5, Funny)

    by Tsali ( 594389 ) on Tuesday August 19, 2003 @01:23PM (#6735537)
    ... there's an ad for MS Small Business Server 2003 at the top of the article.

    It's like advertizing space on a blue screen.
  • and spamassassin.
  • This thing is slamming my mail server. Some of them get stripped of the virus by the time they hit my machine, but having to deal w/ several hundred 100K messages an hour is slowing my machine down.
  • by joeykiller ( 119489 ) on Tuesday August 19, 2003 @01:23PM (#6735545) Journal
    I should have mentioned this in my last post... if you've got the SoBig.F virus, FSecure has posted a free fix here.

    ftp://ftp.f-secure.com/anti-virus/tools/f-sobig.ex e [f-secure.com]
  • Got hammered... (Score:5, Interesting)

    by Vexler ( 127353 ) on Tuesday August 19, 2003 @01:23PM (#6735547) Journal
    We certainly got hammered for a good part of today from a university down south who shall remain anonymous. Contacted their IT/infrastructure department and was told that one of their mail servers got used as a relay, and nobody found out about it until a few hours ago. If I were them I would have shut down their MTA and flushed the queue a long time ago, but that's just me...
  • I've had about a dozen in the last half a hour.

    At least now I know why I'm am getting so many, and why there seemed to be some new variety to the messages (and the attachment file names).

  • by mr_luc ( 413048 ) on Tuesday August 19, 2003 @01:25PM (#6735579)
    Look. I hate Microsoft, too.

    But what the fudge does this have to do with trustworthy computing? It's just another email worm, and it relies heavily on user stupidity, much moreso than the msblaster worm.

    Let's be honest: Microsoft is an evil company, that forces an evil product on people, and some of us are going to cheer when Microsoft gets hurt and people get nudged towards other operating systems -- whether it's Microsoft's fault, or not.

    Could you just have written "Hey, anything that discourages Windows use!" after the story? I mean, christ, that's exactly what probably a good 90% of people here are thinking when they read these stories.
    • by weston ( 16146 ) <westonsd@@@canncentral...org> on Tuesday August 19, 2003 @02:05PM (#6736004) Homepage
      But what the fudge does this have to do with trustworthy computing?

      Everything. Aside from the concerns that trustworthy computing is doublespeak for restricted computing, even if you assume that MS is talking about the *right* kind of trustworthy computing, this virus is the latest in a well-populated freakin' pantheon of examples of their failure to be able to provide anything of the sort.

      In other words, this is one more chance to ask yourself: why should you trust microsoft?

      Side note: I've had several acquaintances attempt to commiserate with me in the last week about various windows viruses. But I don't feel the pain. I'm using Win XP, but a good firewall helps with most of the problems, and you know, Thunderbird is a good email client and a nice way to avoid the Outlook viruses that people erroneously call email viruses.
      • by JMZero ( 449047 ) on Tuesday August 19, 2003 @03:10PM (#6736684) Homepage
        using Win XP, but a good firewall helps with most of the problems

        Your firewall helps with this? What, by blocking the mail port? Or does your firewall parse SMTP and block viruses (hint: if it did, it might be called a mail filter or something)?

        Thunderbird is a good email client and a nice way to avoid the Outlook viruses that people erroneously call email viruses.

        This one has nothing to do with an Outlook vulnerability. It's an e-mail trojan horse. Unless your mail client is unabled to receive files with certain extensions, virus checks them, or executes them under a different permission level (unlikely under Windows), then it's vulnerable.

        You represent the most dangerous class of computer users - confident and uninformed.
  • into the worm see the network associates [nai.com]

    also: I remember a worm (maybe a year and a half ago) which ran directly through outlook (by simply activating an email-without opening the file). Does anyone remember this? if so, please refresh my memory. Thanks.
  • by Saxton ( 34078 )
    This is the first time that I've really been bothered by a Windows worm or virus. All servers here are FreeBSD and OS X, and everyone's primary workstation (41 employees) is running OS X 10.2.6 or OS 9.2.2.

    I used to laugh when all the M$ weenies had problems... but now it's a real problem when I get users here going bonkers about 50 e-mails from 20 people... and me having to go around blocking mail servers...

    Here are some other articles around about it:

    C-Net [cnet.com]
    BBC [bbc.co.uk]

    Okay, I'm done ranting. Thanks /.
  • by Judg3 ( 88435 ) <jeremy@@@pavleck...com> on Tuesday August 19, 2003 @01:26PM (#6735588) Homepage Journal
    I just received one of these today from webmaster@match.com. But I received it on my Hotmail account.

    And seeing how Hotmail proudly proclaims on every message:
    "Notice: Attachments are automatically scanned for viruses using McAfee Security"
    we'll be getting a lot of hotmail users opening it to take a peak
  • by ClubStew ( 113954 ) on Tuesday August 19, 2003 @01:26PM (#6735593) Homepage

    Let's not forget that this is a worm. It requires that a user launches the executable so it can infect the system. Let's also not forget that many users are using non NOS's such as Windows Me (I'll admit that was a big mistake, however). Users that receive this worm must actually execute it and, since there is not concept of "administrator" on many flavors of Windows (or perhaps the users are the only user of, say, WinXP and are in the Administrators group) so the worm can do whatever it wants - the user did, after all, execute it as an administrator.

    The point is - it's the user's fault! Not Microsoft's. Something like this could just as easily happen on a *nix box if the user has sufficient privileges.

    Several of the users at work on the network I manage have gotten such worms before, but because they didn't have sufficient privileges, the worms were ineffective. In most of those cases, the virus scanner picked it up anyway.

    So, if the user doesn't have sufficient privileges, some worms don't work. Sure, this one would because it runs in userland, but the user still executed it! Besides, they should have a virus scanner anyway. Again - it's their fault.

    When it comes down to it, a worm such as a this (trojan horse) requires a stupid user to execute it - so blame the user for once.

    • the user is under the impression it is not an executable.

      --

    • by American AC in Paris ( 230456 ) on Tuesday August 19, 2003 @01:50PM (#6735865) Homepage
      Let's not forget that this is a worm. It requires that a user launches the executable so it can infect the system.

      A worm is a program that propagates itself over a network, reproducing itself as it goes [catb.org]. While this worm may require user intervention, there exist plenty of worms that do not (the most infamous being the Morris Worm [snowplow.org].) A malicious program that masquerades as a legitimate application is a Trojan horse [catb.org].

      SoBig.F appears to be a Trojan with some worm-like qualities. Of course, in the world of Microsoft mail exploits, the lines are blurred, but a worm is generally not a user-launched process.

      Pedantic, I know, but worms are a special interest of mine, and they generally take a fair bit more skill to create than your average Trojan horse.

  • by RedHat Rocky ( 94208 ) on Tuesday August 19, 2003 @01:26PM (#6735595)
    I'm not seeing very many messages with SOBIG, as them get filtered at the mail server.

    However, the large number of "Your message to xyz@zyx.com contained a virus" is filling my mail spool faster than any spammer. Seems one of my email addresses is a popular one to spoof.

    CALL TO ADMINS: Please turn off viral notifications to outside addresses. These days most of the envelope addresses are spoofed, you're not doing any good leaving the notification in place.

    And I thought joe-jobbing was bad.
    • by tbase ( 666607 ) on Tuesday August 19, 2003 @03:23PM (#6736895)
      We occasionally get an important message with an executable attached. We can either let executables through and hope nobody clicks on them, or send a message back to the supposed sender letting them know it didn't go through. Deleting a message without telling anyone is not an option, even though most of those notifications aren't going to valid addresses, whether it's from Spam or Viruses.

      Those notifications are just a way for a company to save themselves a lot of work, at the expense of others. So, we take the risk so we don't have to pollute the 'net with (almost always) useless notifications. So I would say the call to admins should be tweak your filters and educate your users, and then turn off the notifications. Becasue you know the first important message to an officer of the corp that gets deleted without any notification is going to get someone fired, and they're not going to take that risk.

      I feel your pain - I'm getting swamped myself. But at least I'm getting an idea of how many viruses are going out in my name.

      As far as I'm concerned, you can blame all of this on the spammers. Look at the schedule of these SoBig releases and deactivations. I believe this is a response to more and more open relays getting shut down. These viruses are the new open relays, and the only way to stop them is to stop Spam itself - by beating the living crap out of anyone you know who buys anything from a spammer :-)
  • this one's quick... (Score:4, Interesting)

    by bob@dB.org ( 89920 ) <bob@db.org> on Tuesday August 19, 2003 @01:27PM (#6735607) Homepage
    i'm one of the moderators of the personal telco project mailing list (list is open to subscribers, non-subscriber posts are verified to limit spam/virus distribution). when i got up this morning (about 13:00 gmt) the moderation queue had 37 infected messages. it also seems to have knocked my isps (online.no) mailserver over for large parts of the day. i didn't manage to get any mail out that way until this evening.
  • huge outbreak here (Score:5, Interesting)

    by skt ( 248449 ) on Tuesday August 19, 2003 @01:28PM (#6735621)
    There has been a very large outbreak here, inside the firewall this morning.. This is probably the largest that I can remember, since we do not use Outlook/Outlook express we seem to dodge the big ones. I didn't even think this looked that bad at first glance, it doesn't really try to exploit any security holes to infect the machine. What got us was that the virus scanners were just old enough not to catch this until it was too late. All it really took was one or two people opening the attachment. The new engine didn't get pushed until at least an hour after the first internal case was discovered. By then though, it had spread so quickly that many other hosts had been infected.
    • by SlashChick ( 544252 ) <erica@e[ ]a.biz ['ric' in gap]> on Tuesday August 19, 2003 @01:57PM (#6735926) Homepage Journal
      ...that just because you're not using Outlook or Outlook Express, you still may be vulnerable to worms or email viruses?

      All it takes is one user to click the attachment who has an LDAP-enabled address book of the entire company, and poof! you're screwed.

      The only sensible way to kill these worms is to block them at the mail server. If you block them at the mail server, you don't have to try to train people or keep hundreds of anti-virus clients up-to-date. Do yourself a favor and set up XWall [dataenter.co.at] if you have Exchange (this is about the coolest spam-blocker/email filter program I have ever used, BTW) or SpamAssassin [spamassassin.org]/MailScanner [soton.ac.uk] if you have Linux/UNIX. This will save you a ton of headaches in the future, and won't require you to worry about hundreds of clients being up-to-date as much as focusing on whether a few email servers are up-to-date. (Block the standard Microsoft "bad executable" list [microsoft.com] and you should be fine.)

      Seriously, in the year 2003, there's no excuse for "But my 400 clients weren't up-to-date!" Block these things at the server, which is something you as the network administrator should have complete control over, and which is where the worms should have been blocked to begin with.
  • I work for a small private university in the midwest as a student helpdesk consultant. Our phones are ringing off the hook as fauclty, staff, and students are getting upwards of 30 emails every few minutes of this worm. We're trying to contain it here, but of course people are always eager to open up email attachments from anyone they know... even if the filetype is unkown and there is no actual personal information in the email. Oh, the stupidity.
  • Feh. (Score:5, Interesting)

    by American AC in Paris ( 230456 ) on Tuesday August 19, 2003 @01:30PM (#6735645) Homepage
    I've got a bunch of un-munged addresses floating out there (a lot of my visitors aren't all that tech saavy) all pointing to one box. It's been hitting me since about 8:00 AM EST.

    Fortunately, I use Mail.app, so I can still check my mail with impunity.

    There's a spam/address verificiation message I saw that other day that was pretty clever, though. Some spammers sent a reasonably official-looking letter with Citibank headers, layout, and images telling people to click a link to view and accept a new ToS, or their checking account would be suspended. The link looked something like this:

    http://www.citibank.com:A78F...(random hex crap)...A812@127.0.0.1/cgi-bin/c.pl?user=youraddre ss@yourserver.com

    So they were logging you in as user www.citibank.com to server 127.0.0.1 (changed, obviously) and sending your email address to a verification script. Damn clever.

  • hmm (Score:5, Informative)

    by cetan ( 61150 ) on Tuesday August 19, 2003 @01:32PM (#6735661) Journal
  • I trust all my MS software to get worms. I expect no less of it.
  • for a bit over an hour now. I just created a new rule in my OS X Mail.app, and I have them automatically transfered into my Trash file. I wish I had thought about that before. I think I received maybe 50 of them before I created the rule.
    • I'm using Thunderbird. I didn't need to train it or make any rules or anything. It's automatically taking care of lots of "mail contained virus" notifications.

      I tried SpamBayes a few days ago. I had to wait to build up a database of good and junk mail, and then it made a false-positive with a university email even though I'd trained it with several uni emails.

      Conclusion: Thunderbird is absolutely amazing. I'm going to recommend it to friends.

      Plus, having Firebird and Thunderbird icons in quick launch lo
  • Bug? (Score:5, Interesting)

    by Zog The Undeniable ( 632031 ) on Tuesday August 19, 2003 @01:34PM (#6735683)
    Shouldn't we have a new /. icon for viruses? They're not bugs, because they generally - Blaster DoS URL cock-up notwithstanding - do exactly what they're supposed to.

    OTOH, we could replace the Bill-as-Stephen-Hawking with the bug icon, and no-one would care ;-)

  • by Ageless ( 10680 ) on Tuesday August 19, 2003 @01:36PM (#6735708) Homepage
    I know this is anti-Microsoft land but I have been searching all morning and have found nothing, so I'll ask you.

    Is there any free software that will filter attachments in Exchange 5.5 and let me block emails with attachments such as *.vbs, *.pif and so on? I have not had much luck finding out how to do this without buying Norton or some other such thing and I can't afford to do that right now.

    I know I could set up a relay / filtering box in front of it, but I don't have the time or resources to do that today and this latest virus outbreak is driving me nuts.

    My company requires me to run an Exchange server, mainly because our execs love Outlook and the calendering features. I have to run Exchange. I can't change it. I would love to run something else but I can't. Please don't suggest I do.

    Thanks for any helpful answers you have.
    • by gregarican ( 694358 ) on Tuesday August 19, 2003 @01:39PM (#6735738) Homepage
      There are command line utils in Exchange 5.5 that can help delete these attachments totally. Look on the installation CD for details.

      Starting with Office XP you'll see that Outlook automatically blocks attachments ending in PIF, BAT, EXE, etc. This is an absolute that can only be modified through admin policies out in an Exchange folder.

      If you are looking for this type of deal I *think* Outlook 2000 has a service pack that installs the attachment blocking.

      Hope this helps!

  • by dirk ( 87083 ) <dirk@one.net> on Tuesday August 19, 2003 @01:40PM (#6735752) Homepage
    I find it funny that once again a virus is being blamed on Microsoft. The only way to spread this is to open the attachment and run it. How is Microsoft supposed to stop people from opening attachements? If you use MS Outlook you are actually immune to this virus, as Outlook blocks most executable attachments. Please explain to me why a user running a file (which then opens it's open SMTP server and emails itself to people) is Microsoft's fault? This same thing could happen on Linux, there is nothing stopping a Linux user from running a file attachment. This isn't a MS problem, it is a user education problem.
    • > This same thing could happen on Linux, there is nothing stopping a Linux user from running a file attachment. This isn't a MS problem, it is a user education problem.

      The difference being that Linux applications don't go out of their way to make it easy for idiots to do what idiots do best.

      The general public is never going to be computer savvy, any more than 100 years of experience and probably a few million lost lives has made them automobile savvy. Designing general-use software that requires a hi

  • by FilthPig ( 88644 ) on Tuesday August 19, 2003 @01:41PM (#6735764)
    Alright Michael! Way to blame MS for a user issue.

    Seriously, there are competant NT admins in the world.

    This should be a no-brainer, but if you run MS systems and you often have problems with worms or virii:

    1. Keep your virus definitions current. This goes double for any laptop users with broadband at home.
    2. More often then not, MS has already released a patch for a security hole before a worm or virus hits. Keep your systems up to date! Again, this goes double for laptop users with broadband.
    3. If you're behind a firewall, and you really should be, Only allow outgoing SMTP from your mail server(this keeps the worm from spreading FROM your organization).
    4. If you think you don't have time to do these things, make time. You'll waste a lot more time putting out fires than you will doing some fireproofing.
  • 1 every 10 seconds? (Score:4, Informative)

    by Abm0raz ( 668337 ) on Tuesday August 19, 2003 @01:42PM (#6735773) Journal
    I got 436 hits this morning in 2 hrs for my compan's email (~500 employees). I already had *.pif files blocked (I'll give any of my users a free beer if they could even tell me what a *.pif files was used for, more or less why they should be receiving it). In 2hrs a dial-up ISP in california, the University of New Hampshire, the Indiana University of Pennsylvania, Piglet.DisneyOnline.com, a verizon DSL node, and an adelphia cable modem node had all been shut down and cleaned. Soon as I recognized what was coming in, I traced the source IPs, called the contacts, and talked to their IT people. With the exception of Disney, all were quite co-operative, had their machines down with-in minutes of notification, and back up after cleaning the virus.

    The nature of these Sobig virii/viruses are that they repeatedly hit the same addresses. Take a few seconds, look at the header, get the IP, look up the DNS, get the contact name, call and explain and you'll save yourself (and countless others) a lot of unnecessary hell.

    -Ab

    ps. that also explains why some of my posts this morning were a little bit ... 'tart'

    • Pif files are shortcuts to DOS executables as opposed to the Lnk files used for shortcuts to Win32 executables in Windows. The only instance you would ever recieve one is if somebody wanted to send you the tweaked settings to get a certain DOS program to work. Pif files have a bunch of settings such as what memory manager Windows should fake and what quantity of memory that. It can also change the look of the terminal the program runs in and disable shortcut keys and screensavers while the program is runnin
  • by rdewald ( 229443 ) * <rdewald@@@gmail...com> on Tuesday August 19, 2003 @01:42PM (#6735778) Homepage Journal
    I just got a bounce message (with the e-mail below attached) from an automated domain mail admin because it believed I was the sender of a so.big payload (to a user who has a full e-mailbox).

    I don't use windows, so it's not coming from any of my boxes.

    Here's the header and body text:

    -----

    Received: from HP ([141.154.241.155]) by mta02.mail.mel.aone.net.au
    with ESMTP
    id [20030819180952.SWCW5855.mta02.mail.mel.aone.net.a u@HP>
    for [removed for /. post]; Wed, 20 Aug 2003 04:09:52 +1000
    From: [removed for /.-- it was my valid email address]
    To: [likewise removed]
    Subject: Re: That movie
    Date: Tue, 19 Aug 2003 14:10:02 --0400
    X-MailScanner: Found to be clean
    Importance: Normal
    X-Mailer: Microsoft Outlook Express 6.00.2600.0000
    X-MSMail-Priority: Normal
    X-Priority: 3 (Normal)
    MIME-Version: 1.0
    Content-Type: multipart/mixed;
    boundary="_NextPart_000_00FA8C46"
    Message-Id:

    This is a multipart message in MIME format

    --_NextPart_000_00FA8C46
    Content-Type: text/plain;
    charset="iso-8859-1"
    Content-Transfer-Encoding: 7bit

    Please see the attached file for details.
    --_NextPart_000_00FA8C46
    Content-Type: application/octet-stream;
    name="your_document.pif"
    Content-Transfer-Encodin g: base64
    Content-Disposition: attachment;
    filename="your_document.pif"

    -----

    The your_document.pif was a binary of about 100k.
  • by Synesthesiatic ( 679680 ) * on Tuesday August 19, 2003 @01:48PM (#6735830) Homepage
    and try to tell your semi-computer-illiterate ("But I know how to use MSN and Kazaa!) friends that they've got a virus? I don't even bother anymore because the only response I ever get is

    "No I don't."

    Because of course they're running anti-virus software. And of course the definitions have never ever been updated.

    These same people decide when their PC is two years old that it's just "too screwed up" and go buy and brand-spanking-new one with the same flaws which they will proceed to bugger up in a month in a half.

    I wouldn't last a week in tech support.

    • These same people decide when their PC is two years old that it's just "too screwed up" and go buy and brand-spanking-new one with the same flaws which they will proceed to bugger up in a month in a half.

      Don't complain. Buy their old computers for twenty bucks each, then sell them to other such people as "reconditioned" systems for a couple of hundred (plus the old system as a trade-in.)

      I mean, if these people are going to throw their money away, they may as well send some of it your way.

      As an asid

  • by edashofy ( 265252 ) on Tuesday August 19, 2003 @01:53PM (#6735894)
    I don't get any of the viruses thanks to SpamAssassin and whatever else our fine Admins have put on the mailserver, but what I do end up getting is about 200 autoreplies from dumb MTAs who believe I have sent them a virus when in fact it's the virus/worm/whatever spoofing itself off as me.

    Despite the fact that I didn't actually send a virus-infected email from mta3.someserver.pl to a nonexistent address, I still get the helpful autoreply that tells me that the user at that nonexistent address does indeed not exist.
  • by Keith Russell ( 4440 ) on Tuesday August 19, 2003 @01:58PM (#6735940) Journal
    Yay for trustworthy computing.

    And in other news... Microsoft announced today that, thanks to a Bill Gates Declaration From On High (tm), every line of code in every Microsoft product, dating back to the company's foundation, has magically, spontaneously, and retroactively fixed itself. This has rendered all of Microsoft's code absolutely secure and error-free. And thanks to the mystical nature of these fixes, end users and sysadmins don't have to patch their systems!

    Grow up, Michael.

  • by lseltzer ( 311306 ) on Tuesday August 19, 2003 @02:05PM (#6736001)
    I'm sure most people here assume the opposite, but Outlook 2002 and 98/2000 with the security update applies are completely immune to this attack. They automatically strip executable attachments. Very recent Outlook Express versions also do this, although I'm not sure this is the default setting.

    Think about how long it's been since there has been a large Outlook attack. It's been at least a couple of years. This tells me that the people spreading Sobig not only have no antivirus protection, they're using ancient and unpatched software.
  • by LetterJ ( 3524 ) <j@wynia.org> on Tuesday August 19, 2003 @02:12PM (#6736056) Homepage
    I've gotten 320 infected messages today. I'm actually going to be looking forward to getting back to generic viagra ads in a couple of days when this dies down.
  • by Jugalator ( 259273 ) on Tuesday August 19, 2003 @02:13PM (#6736073) Journal
    Yay for trustworthy computing.

    MS jokes aren't innovative, but can still be fun, but not as fun if they aren't trying to relate to the truth very much. Read up about trustworthy computing [microsoft.com] and learn how it is a process that has barely taken off today, but is an effort that will show up more in Longhorn, etc. DRM and NGSCB are two technologies that have a lot to do with trustworthy computing that aren't even implemented in today's versions of Windows.

    At 2002, MS said:

    "It may take us ten to 15 years to get there, both as an industry and as a society."

    Trustworthy computing is in many ways only at the concept stage this far.

    Sure, one might wonder what's making them think it will take a time period as long as an outrageous 15 years to get these things straight and one might think DRM is Bill Gates' worst idea ever, but then one should comment about this instead. This may seem that I'm defending Microsoft, although I'm in this case just being annoyed by a joke I've seen numerous times before, and that must have been made up by some uninformed person.
  • by ad0gg ( 594412 ) on Tuesday August 19, 2003 @02:16PM (#6736104)
    Its an executable that requires someone to run it. People need to learn to stop clicking on every damn executable they get in their email. Hell Outlook even displays a warning that attachments can contain virii or have malicous intent, but people still click on them.
    • by EXTomar ( 78739 ) on Tuesday August 19, 2003 @02:59PM (#6736587)
      In their zeal to sell the house, MS gave the keys away.

      No application scripting language should be able to perform in an "untrusted" mode. There is no reason for it but due to functional designs someone at MS came up it has to be there. Someone demanded that Office documents integrate into Outlook seemlessly and this is what you get.

      No one in any Unix environment will believe this message:

      Attached is a perl script with my message in it. Please extract and run it to read it.

      However MS has made a buisness of making people believe using a computer is as easy and as safe as using a toaster. So you get hackers who can apply a little social engineering to cause a disaster chain of events. Users are more than happy to click click click away when instructed.
    • Hell Outlook even displays a warning that attachments can contain virii or have malicous intent, but people still click on them.

      True, but most of the Outlook users I can speak for have a pretty simple philosophy about network security. It goes like this:

      • If it says "forward this to everyone in your address book", do that.
      • If you have to click on a button that says "OK" to proceed, do that then.
      • case default: {call(support)}

      None of them want to miss out on a joke, and rather than refrain from opening ex

    • > Its an executable that requires someone to run it. People need to learn to stop clicking on every damn executable they get in their email. Hell Outlook even displays a warning that attachments can contain virii or have malicous intent, but people still click on them.

      That's exactly why we think it's Microsoft's fault: their pursuit of their shallowly conceived "ease of use" philosophy has led them to design software that incorporates "ease of use" features that very obviously are malapropos for the p

  • Procmail Rule (Score:4, Informative)

    by David D ( 16194 ) on Tuesday August 19, 2003 @02:20PM (#6736137) Homepage
    Here is a decent procmail rule, probably not perfect.

    :0
    * > 100000
    * < 120000
    * ^Content-Type:.*multipart/mixed;
    {
    :0 B hfi
    * ^Please see the attached zip file for details.
    * ^Content-Disposition: attachment;
    * ^Content-Transfer-Encoding: base64
    * 9876543210^1 ^Content-(Type|Disposition):.*$.*name *= *"?(your_details|application|document|screensaver| movie)[0-9]*\.zip"?
    * 9876543210^1 ^Content-(Type|Disposition):.*name *= *"?(your_details|application|document|document_Fal l|thank|screensaver|movie)[0-9]*\.zip"?
    | formail -A "X-Content-Security: [$HOST] NOTIFY"
    -A "X-Content-Security: [$HOST] QUARANTINE"
    -A "X-Content-Security: [$HOST] REPORT: Trapped SoBig worm - http://securityresponse.symantec.com/avcenter/venc /data/w32.sobig.e@mm.html"
    }
  • old (Score:5, Funny)

    by mz001b ( 122709 ) on Tuesday August 19, 2003 @03:12PM (#6736698)
    SoBig.F

    Wow, this must be an old virus if it is written in Fortran.

  • by jdunlevy ( 187745 ) on Tuesday August 19, 2003 @03:17PM (#6736781) Homepage
    Haven't actually seen the virus itself, but I've been getting barraged by notices from various server installations of "Declude Virus" telling my that my server sent them an infected e-mail. They then proceed to include the original headers which clearly show the offending e-mail came from somewhere else. They suggest, "If this virus did originate from one of your users, you may want to consider adding virus protection to your mailserver." Uh, I won't be installing their software, that's for sure.

Things are not as simple as they seems at first. - Edward Thorp

Working...