1. Attachments are working again! Check out this thread for more details and to report any other bugs.

Computer worm to hit 2/3!

Discussion in 'Fred's House of Pancakes' started by Sufferin' Prius Envy, Feb 2, 2006.

  1. Sufferin' Prius Envy

    Sufferin' Prius Envy Platinum Member

    Joined:
    Jul 7, 2004
    3,998
    18
    0
    Location:
    USA
    Vehicle:
    Other Non-Hybrid
    "There are a lot of people who are going to be very unhappy on the third of February . . . That's when the Kama Sutra computer worm will begin destroying critical files on infected computers. And hundreds of thousands of machines may have the worm lurking within their Windows operating system, ready to be unleashed on February 3 and the third of every month thereafter.â€
    http://www.cnn.com/2006/TECH/internet/01/3...worm/index.html

    Time to update your security software, And BACK-UP!!!
     
  2. EricGo

    EricGo New Member

    Joined:
    Apr 30, 2005
    1,805
    0
    0
    Location:
    Albuquerque, NM (SouthWest US)
    More malware ? :yawn:

    -- smug linux/mac user.
     
  3. Marlin

    Marlin New Member

    Joined:
    Jun 20, 2005
    1,407
    10
    0
    Location:
    Bucks County, PA
    Vehicle:
    2005 Prius
    You seem to have forgotten that computer worms were invented on Unix systems. Additionally, this kind of worm is a trojan horse in that it doesn't exploit a security hole unknown to the user, but actually infects the machine when the user invites it in by executing an email attachment. The security hole is the user in this case. Particularly clueless users who don't know any better.

    You'll lose a bit of that smugness if Linux and the Mac ever become the dominate OS used by most users, particularly the clueless ones. Right now the worm and virus writers don't target Linux because there isn't enough critical mass in order to propagate the virus/worm and the typical Linux user is generally technically savvy, while the typical Windows user is not technically savvy.

    But, if Linux ever reaches the point where your 80 year old grandmother is using it and opening email attachments with reckless abandon, then the virus/worm writers will shift their aim.
     
  4. mikepaul

    mikepaul Senior Member

    Joined:
    Dec 2, 2003
    1,763
    6
    0
    Location:
    Columbia, SC
    Vehicle:
    2004 Prius
    I've run a scan on my computers and they come up uninfected, but that's assuming that the 'infection' is well-known and covered by my anti-virus vendor (CA now, since it's free).

    I'm hoping for the best, since my main hard drives are using drivers that don't let Ghost back them up anymore, so if they get erased I start from scratch...
     
  5. mikepaul

    mikepaul Senior Member

    Joined:
    Dec 2, 2003
    1,763
    6
    0
    Location:
    Columbia, SC
    Vehicle:
    2004 Prius
    That's what they're telling Apple users, now that PC platforms could run Mac operating systems. Virus writers didn't buy Apples, but they'll buy (steal) operating systems that run on their existing hardware for new and different things to ruin...
     
  6. Mystery Squid

    Mystery Squid Junior Member

    Joined:
    May 18, 2005
    2
    3
    0
    Why isn't Bush protecting us against this?

    It's all his fault!
     
  7. EricGo

    EricGo New Member

    Joined:
    Apr 30, 2005
    1,805
    0
    0
    Location:
    Albuquerque, NM (SouthWest US)
    True in part, for sure.

    But only in windows land do you mix a bunch of clueless people with an OS that defaults to VB active MS Word for email, and leaves security holes wide enough to drive a truck through to support MS's version of DRM and 'marketing analysis'. And I should probably give honorable mention to the default root login LOL.

    I was amazed the other day, when a person at work opened up Outlook, clicked on the compose button, and windows opened Word !
     
  8. JackDodge

    JackDodge Gold Member

    Joined:
    Sep 22, 2005
    2,366
    4
    0
    Location:
    Bloomfield Hills, MI
    Vehicle:
    Other Hybrid
  9. dreichla

    dreichla New Member

    Joined:
    Feb 21, 2005
    2,230
    0
    0
    Location:
    Connecticut
    Thanks for the links - I've been frantically backing up my computers and updating virus protection for the last 3 days now.
     
  10. JackDodge

    JackDodge Gold Member

    Joined:
    Sep 22, 2005
    2,366
    4
    0
    Location:
    Bloomfield Hills, MI
    Vehicle:
    Other Hybrid
    You're welcome, I'm always glad to help in that regard. The Symantec tool takes quite a while to run and I'd close down all other programs while it does; especially the mail client. If I had to act fast and wanted to be sure, I'd buy a Seagate external drive, copy all of my important files to it, get TrueImage and make an image of the current hard drive, copy that to the external too, disconnect the external from the computer and shut the external off. Then I'd sit back and see if the worm actually was on my computer and did what they're warning us it could do. If not, everything's backed up and if so, then it's all protected. If the worm did it's work on my computer, I'd wipe the hard drive, reinstall everything, run TrueImage again so that I had a pristine environment to restore from then copy any files back to it when they're needed.
     
  11. brandon

    brandon Member

    Joined:
    Oct 24, 2004
    771
    9
    0
    Location:
    Manhattan, KS
    Vehicle:
    2005 Prius
    Just as a quick note, although initial reports indicated that the malware would traverse network-mapped drives and do damage to networked file systems, ISC's tests seem to indicate that the virus has no impact on mapped network drives or shares:

    http://isc.sans.org/diary.php?storyid=1090

    Also, I think it is important to keep this in perspective. This particular threat (CME-24) isn't really that prolific (I know, tell that to the guy who loses his data!). In the grand scheme of things, it really isn't propogating any faster/better than other threats out there. Believe it or not, 600,000 infections isn't really all that many. Quite a few botnets that rely on similar malware propogation tactics grow much larger than 600,000 strong. CME-24 just has a different payload that strikes the most important thing to a user - their data.

    F-Secure provided a world map of infections, using data gathered from a webpage counter the virus accesses upon infection:

    http://www.f-secure.com/weblog/archives/ar...6.html#00000800

    Of course, if this media story will get more people to backup their data, then by all means, hype it up! :)

    All I'm saying is, be aware and take precaution, but don't let it ruin your day because you're living in fear. TGIF.