Šta je novo?

Virii - update

shtaps

Čuven
Učlanjen(a)
25.12.2003
Poruke
733
Poena
619
Veceras sam skinuo dva maila od Kasperskog. Mozda ce njihova sadrzina nekome odgovoriti na neka pitanja:

I. Don't Believe Your Browser - It Could Be Dumaru


Kaspersky Labs (...) warns users about three new modifications of Dumaru, an email worm: versions j, k and l. The unusual propagation techniques and high dissemination rate have resulted in infections worldwide, causing a new global outbreak.

Dumaru was first detected in September 2003 and has remained among the most active malicious programs ever since. The original worm was written in Russia, but subsequent versions appears to come from Germany.

The latest versions of Dumaru contain only minor modifications. However, the multi-tier propogation method used to disseminate the malicious program has caused a worldwide outbreak within a matter of days.

Initial propagation was assured by the mass mailing of a message purportedly originating from Microsoft in which users were offered updates to their virus protection.

In reality, the message contains the Trojan program UrlSpoof. Once the link in the letter is activated, a new Internet window opens onto a Microsoft look-alike web site. Moreover, "UrlSpoof" utilizes a vulnerability in Internet Explorer, which allows the worm to display www.microsoft.com in the address bar, even though the user is actually on another site.

While the user is browsing this site, the victim machine is transformed into a Dumaru carrier and the worm then initiates the mailing process from the new computer.

"This outbreak has once again demonstrated that virus writers and spammers are joining forces", comments Eugene Kaspersky, Head of Anti-Virus Research at Kaspersky Labs, "Viruses are using spamming techniques more and more in order to increase propagation speed, whereas spammers are using viruses to create networks of infected machines for use in mass mailing campaigns".

Kaspersky Labs anti-virus databases have already been updated with protection against the new versions of Dumaru.

A detailed description of these versions of Dumaru can be found in the Kaspersky Virus Encyclopedia (http://www.viruslist.com/eng/viruslist.html?id=836347).



II. Mimail.q: The Return Of A Calculating Email Blackmailer

Kaspersky Labs, a leading information security software developer has detected a new version of the notorious Internet worm Mimail. Mimail.q has a built in encrypted key against anti-virus programs and reports of infections are already coming in. Kaspersky Labs predicts that the outbreak will gain momentum over the next few days and recommends that all users update their anti-virus protection immediately.

Mimail.q spreads via email in messages with varying content (there are about 30 variations) with random attachment names. The worm consists of two components: the dropper (the module which installs the core) and the carrier (the core).

If a user is thoughtless enough to launch the file attached to the infected email, the dropper proceeds to open a window with a fake error message. The dropper copies itself into the Windows registry under the name sys32.exe and registers itself in the system registry auto run key. Finally, the dropper unpacks the main component, a file named outlook.exe and launches it in order to execute it.

The most important modification in Mimail.q are the polymorphic encryption keys inbuilt to fool anti-virus programs. Every time the infected machine is restarted Mimail.q changes the encryption key so that the copies of itself that Mimail sends look different every time. This means that anti-virus programs must have a decryption routine in order to contend with Mimail.q successfully.

The main component of the worm performs several functions at once. Firstly, it sends copies of Mimail.q by scanning the contents of disks and extracting email addresses. Infected messages are then sent to these addresses by using the inbuilt mailing mechanism.

Secondly, the main component opens the infected computer to the creator of the worm using ports 80, 1433, 1434, 3000, and 6667. The worm receives commands via these ports and sends information about the execution of these commands to a variety of public email system addresses.

Thirdly, Mimail.q gathers information about PayPal and E-Gold accounts on the computer in exactly the same way as previous versions of Mimail do, and sends the information needed to access these accounts to the addresses mentioned above.

Finally, the worm's code contains the following text, which is addressed to public email services as a threat if email addresses used by Mimail.q should be closed by the service provider.

*** GLOBAL WARNING: if any free email company or hosting company will close/filter my email/site accounts, it will be DDoS'ed in next version.
WARNING: centrum.cz will be DDoS'ed in next versions, coz they have closed my mimail-email account. Who next? ***

Protection against Mimail.q using a decryption routine has already been added to the Kaspersky Anti-Virus databases.

A fuller description about this malicious program can be found in the Kaspersky Virus Encyclopedia (http://www.viruslist.com/eng/alert.html?id=836443).


Posebno mi je zanimljiv ovaj drugi - budite dobri ili duvacu, duvacu i oduvacu vam kucu! Koristi port 6667? Jesu li na tom portu vecina irc programa, ili sam ja pomesao pojmove?

U svakom slucaju jos jednom proverite kada ste uradili zadnji update.

Mozda ne bi bilo lose kada bi s vremena na vreme dodali temu ovakve sadrzine. Uvek se jave desetorica kada neko zatrazi pomoc, sto je skroz ok, ali u nekim situacijama moze se i predvideti katastrofa.

-----------------------------------------------------------------------------------------------------------
The Return Of The Fellowship Of The Ring je najbolja epizoda South Park-a na svetu!!!
 
Ovaj me je promasio za dlaku

1. Novarg: New Worm - New Epidemic

Kaspersky Labs, a leading information security software developer has detected that a dangerous new Internet worm, Novarg (also known as Mydoom). In just a few hours this malicious program caused a global epidemic, infecting approximately 300 thousand computers throughout the world. This incident is the most serious outbreak so far this year, and shows every sign of breaking replication records set in 2003.

An explosion in malicious program activity undoubtedly points to serious preparations made by virus writers. This included the creation of a network of infected computers; when the number of computers in the network reached critical mass a command was sent to mail out Novarg. This is the same approach used previously by the email worm Sobig.F

Detailed analysis of the geographic spread of the worm leads to the assumption that Novarg was created in Russia.

Prevention, diagnosis and protection

Novarg spreads via the Internet in two ways: via email and via the KaZaA file-sharing network.

Infected messages have a random, falsified sender's address, 8 possible message headers, 18 possible attachment names and 5 possible extensions to attached files. Additionally, the worm spreads in messages where the message header, message body and attachment name contain a nonsensical collection of random characters. Such variability makes it far more difficult for users to independently identify infected messages.

Novarg appears in the KaZaA network under various names, including winamp5, icq2004-final and with various extensions, such as bat, exe, scr, pif and others.

If a user is thoughtless enough to launch the infected file, either from an email or downloaded from the KaZaA network Novarg initiates installation procedures and propagation routines.

Immediately after being launched Novarg opens a Notepad window which shows a series of random characters.

At the same time Novarg creates two files in the Windows folder: taskmon.exe (the worm carrier) and shimgapi.dll (a Trojan program to remotely control the infected machine). The worm registers these files in the system registry auto run key to ensure that the malicious program is activated every time the computer is restarted.

Novarg then initiates its propagation routine. The worm scans the disk for email addresses (files with extensions such as htm, wab, txt and
others) and, unbeknownst to the user, sends infected emails to these addresses. In addition, Novarg checks whether or not the infected machine is connected to the KaZaA network: if a connection is open, the worm copies itself into the public folder for file exchange.

Novarg carries a very dangerous payload. Firstly, the worm installs a proxy server on the infected computer. Malefactors can then use this module in spamming or in mass-mailing new versions of the malicious program.

Secondly, Novarg installs a backdoor (a utility for unauthorized remote
control) thus allowing the virus writer to control the infected machine. The backdoor makes it possible to steal, change or delete data, install third-party programs and so forth.

Thirdly, Novarg contains an inbuilt module for organizing a DoS attack on www.sco.com. This module will be activated between 1st February and 12th February 2004. During this period all infected machines will query this site, which may cause it to crash.

"The danger of the integration of virus and spam technologies to create united, dedicated networks for cyber-criminals is becoming a reality. We have detected two malicious programs within the first two days of this week that illustrate this trend", comments Eugene Kaspersky, Head of Anti-virus Research at Kaspersky Labs, "This problem may well signal a new era in computer virology in the near future, an era marked by even more frequent and serious outbreaks".

----------------------------------------------------------------------------------------------------------

LM Kada sam dobio ovaj mail sledeci je bio ovaj - u istom skidanju:

O B A V E S T E N J E O V I R U S U

Neobee.net virus scanner je pronasao
W32/Mydoom.A@mm
virus(e) u poruci upucenoj sa adrese:
<[email protected]>
Zarazena poruka NIJE isporucena !!!
ID zarazene poruke je: 4016a1b7-7a46.

------------------------------------------------------------------------
ZAGLAVLJE (HEADER) PORUKE:
Received: from veljko.absolutok.com ([80.93.224.86] helo=werfriends.org)
by holomatrix1.neobee.net with esmtp (Exim 4.14)
id 1AlX8w-0006ia-AN

Pokusao sam da odem na veljko.absolutok.com ali bezuspesno, nece da zakaci remote host.

VELJKO?

Desava li se to jos nekome?
 
ima ih toliko mnogo da prosto ne znam sta cu... :beat:

naravno da nema:

1. ko je lood da pravi viruse za operativni sistem koji koristi manje od 5% populacije. cheers

2. ko koristi linux zna o njemu mnogo vise nego sto korisnici window$-a znaju o window$-u. niko ko koristi linux nece biti toliko bistar da kad dobije mail od "Pamele Anderson" sa subjectom "My Nude Pictures" aktivira egzekutabilni attachment koji je stigao uz njega... :beat:
 
ccc mislis da se virusi sire samo preko mail attachmenta? :beat:

A to sa 5% populacije linuxasa si u pravu, ima logike, ali zato u tih 5% ima 95% onih koji znaju kako da naprave virus, da ga distribuiraju.. sto je mnogo veci procenat nego u Win worldu.
 
ne, ne sire se samo preko attachment-a, ali u samom kernelu linux-a je integrisan firewall tako da samo malo podesis iptables i worm-ovi mogu samo da te mrze cheers
 
trx je napisao(la):
i worm-ovi mogu samo da te mrze cheers
Mogu da mrze i mene na Windowsu :mrgreen:
 
trx je napisao(la):
ne, ne sire se samo preko attachment-a, ali u samom kernelu linux-a je integrisan firewall tako da samo malo podesis iptables i worm-ovi mogu samo da te mrze cheers

zato su i bile one epidemije crva i trojanaca koji su obarali BIND, jel tako?
Mozes da pricas sta hoces ali ni taj linux nije nista sigurniji od windowsa - samo nema dovoljno ljudi koji su spremni da pisu viruse za Linux zbog "ogromne" popularnosti.
To ti je isto kao kad bi rekao da za Beos nema virusa jer je najsigurniji na planeti

Ipak ta sigurnost malo zavisi i od vlasnika linuxa ili windowsa ;)
 
bind je javni servis dostupan svima a ne samo lokalnoj mrezi. meni su ka spolja zatvorini svi portovi i nikakav worm ne moze da prodje. window$ je, nasuprot tome, shupalj cak i ako mu se ne podignu nikakvi javni servisi:

http://www.theinquirer.net/?article=13861 :rtfm:
 
trx je napisao(la):
bind je javni servis dostupan svima a ne samo lokalnoj mrezi. meni su ka spolja zatvorini svi portovi i nikakav worm ne moze da prodje. window$ je, nasuprot tome, shupalj cak i ako mu se ne podignu nikakvi javni servisi:

http://www.theinquirer.net/?article=13861 :rtfm:

samo odgovaram na tvoju konstataciju o virusima za linux
trx je napisao(la):
naravno da nema:

sad odjednom ispade da ipak ima
a volim i te argumentovane recenice "supalj-nije supalj", "najbolji je- nije najbolji"
ja od pocetka, tj.od kako se pojavio koristim XP i nijednom nisam imao problema sa crvom, trojacem ili virusom
Na poslu imamo mrezu od 150+ racunara od kojih je 98% windows i ista prica
cak i sajt drzimo na iis-u
Toliko o supljini
 
bind nije linux

bind je jedan od projekata koji ima gpl licencu. takav je i apache. to nema veze sa linux-om. apache radi i pod window$-om.

znaci: bind je javni servis koji je dostupan svima, a samim tim je i ranjiv, bio on podignut na linux-u ili window$-u. s druge strane, window$ je ranjiv cak i kad nema ni jedan javni servis vec kad se koristi kao cist klijent.
jel' malo jasnije?
da nacrtam?
 
Na poslu imamo mrezu od 150+ racunara od kojih je 98% windows i ista prica

a tih 2% su vam linux router i firewall koji vam rade maskeradu i BEZBEDNOST ? O:) jel' tako? :beat:
 
wrong
jedan je web server sa tomcatom a drugi je dansguardian
i treci za mail
 
I da ima virusa za Linux, cisto sumnjam da bi neko bio tako gloop da pokrene ovo ili ono kao root...svi znaju da se na net ne ide nikada kao root :>
 
kUdtiHaEX je napisao(la):
I da ima virusa za Linux, cisto sumnjam da bi neko bio tako gloop da pokrene ovo ili ono kao root...svi znaju da se na net ne ide nikada kao root :>
Pre će biti da onaj koji je toliko gloop ili neće imati pristup rootu ako je samo user, ili neće znati ni da instalira linux ako je njegova mašina :d
 
znate kako.. dok je curana bice i podvarka :beat:
 
kUdtiHaEX je napisao(la):
I da ima virusa za Linux, cisto sumnjam da bi neko bio tako gloop da pokrene ovo ili ono kao root...svi znaju da se na net ne ide nikada kao root :>
isto tako kao sto svi znaju da se na net ne ide kao administrator, pa opet.... :hump:
 
isto tako kao sto svi znaju da se na net ne ide kao administrator, pa opet....

da samo sto kod linux-a pomaze kad nisi root a kod window$-a ne pomaze nistaaaaaaa :D

MyDoom najgori virus svih vremena Autor nikola Datum: 29.01.2004 u 21:08
Samo tri dana nakon što se pojavio, MyDoom virus je postao noćna mora kako za velike mreže, tako i za pojedince. Virus se neverovatno brzo širi i prema rečima MessageLabs, kompanije koja se bavi obezbeđenjem, najgore je pogodio SAD i Australiju. Jedna od dvanaest e-mail poruka koje u ovom trenutku putuju Internetom sadrži ovaj virus, čime je MyDoom nadmašio Sobig F koji je do sada bio virus koji se najbrže širio mejlom. Ono što je vrlo zanimljivo u vezi sa ovim programom je to što će 1. februara početi sa DoS napadima na sajt SCO grupe, koja je ovih dana u centru pažnje zbog svog zahteva za odštetom zbog korišćenja Unix koda u Linux operativnom sistemu. Izgleda da je pisac ovog virusa ljubitelj Linuxa i uneo je novi zaplet u popularni sapunicu zvanu "borba oko Unixa". SCO je ponudio 250 000 dolara za informaciju o identitetu ovog programera. Najveći problem je to što ovaj virus ostavlja mogućnost svom autoru da pristupi inficiranom računaru što se može iskoristiti za krađu vitalnih podataka. Očekuje se da će ovaj virus koštati kompanije 250 miliona dolara zbog gubitaka u produktivnosti i troškova tehničke podrške, tako da je i tu nadmašio Sobig i MS Blast, viruse koji su do sada smatrane za najgore u istoriji računara.
 
trx je napisao(la):
isto tako kao sto svi znaju da se na net ne ide kao administrator, pa opet....

da samo sto kod linux-a pomaze kad nisi root a kod window$-a ne pomaze nistaaaaaaa :D
jeste,jeste...
zato je windows tako slabo rasprostranjen kod korisnika a linux svi koriste :)
I jos sam nesto primetio - za 99% ljudi koji se kunu u linux na kraju ispadne da na kucnoj masini imaju xp
Kako to? cheers
 
zato je windows tako slabo rasprostranjen kod korisnika a linux svi koriste
naravno, isto kao sto je yugo rasprostranjeniji od maseratija... nije to za svakoga :D

I jos sam nesto primetio - za 99% ljudi koji se kunu u linux na kraju ispadne da na kucnoj masini imaju xp
imam ga i ja - na njemu igram CS :D
 
Vrh Dno