VIRUS WARNINGS - Tips and Tricks

For the latest Virus Updates from Trend Micro, CLICK HERE.

One of world's top 10 spammers held in Seattle
Feds say computer users will notice decrease in junk e-mail following arrest

Associated Press
Updated: 10:58 a.m. ET May 31, 2007

SEATTLE - A 27-year-old man described as one of the world’s most prolific spammers was arrested Wednesday, and federal authorities said computer users across the Web could notice a decrease in the amount of junk e-mail.

Robert Alan Soloway is accused of using networks of compromised “zombie” computers to send out millions upon millions of spam e-mails.

“He’s one of the top 10 spammers in the world,” said Tim Cranton, a Microsoft Corp. lawyer who is senior director of the company’s Worldwide Internet Safety Programs. “He’s a huge problem for our customers. This is a very good day.”

Read Full Story

Latest Threat!

W32.Mumawow!gen

Risk Level 1: Very Low

Discovered: May 30, 2007 Updated: May 30, 2007 10:20:27 AM Type: Worm Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP W32.Mumawow!gen is a generic detection for the files infected by the W32.Mumawow family of worms.

Files that are detected as W32.Mumawow!gen may be malicious. We suggest that you submit to Symantec Security Response any files that are detected as W32.Mumawow!gen. For instructions on how to do this using Scan and Deliver, read How to submit a file to Symantec Security Response using Scan and Deliver .

Recommendations

Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

  • Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
  • If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
  • Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services (for example, all Windows-based computers should have the current Service Pack installed.). Additionally, please apply any security updates that are mentioned in this writeup, in trusted Security Bulletins, or on vendor Web sites.
  • Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
  • Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
  • Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
  • Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
Writeup By: Piotr Krysiuk - Read about more threats at the Symantec Site

Latest Threat!

SpyLocked

Updated: May 31, 2007 7:16:13 PM Type: Other Risk Impact: Medium Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP

Behavior

SpyLocked is a security risk that may give exaggerated reports of threats on the computer. The program then prompts the user to purchase a registered version of the software in order to remove the reported threats.

Note: Definitions before May 18, 2007 may detect this security risk as VirusBurst.

Protection

  • Initial Rapid Release version pending
  • Latest Rapid Release version pending
  • Initial Daily Certified version pending
  • Latest Daily Certified version pending
  • Current Weekly Certified release date May 23, 2007

Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Read the Fulll Story

Worms - The Top 20 List

The first quarter saw more worms top the charts with WORM_NYXEM.E, a mass-mailing, network-propagating worm powered by an adult-themed social engineering scheme, continuing to lead the list. Worms of old, such as NETSKY and BAGLE, still prevail due to the amount of users who do not update their security software or lack it altogether.

Social Engineering Tactics Continue to Rise

The rise of social engineering is the result of two factors:

  • Changing threat objectives--from notoriety to monetary rewards
  • Changing approach--from targeting the global computing population to focusing on specific user segments or regions.

While social engineering in the outbreak era used the blind hit-and-miss method, today's carefully planned, sequential attacks tailor their schemes to the targeted segment and are deployed where and when recipients may actually be misled.

A popular social engineering technique used in the first quarter was the use of email messages carrying subject lines about current events, including world and local politics and regional incidents. This year's first prominent threat, TROJ_SMALL.EDW, was spammed via email messages that promised more information about a winter storm battering Europe, as the storm was at its peak.

For the full story on this threat and more on spyware and virus threats visit the Trend Micro web site.

What is Spydawn and should I install it?

According to Wikipedia, "Spydawn is a malware program that claims to be a commercial anti-spyware, when in fact it is, itself, adware-advertised. The software installs itself, without consent, in user's computers and registry. It then sends messages such as "System Error, Buy this software to fix" or "Your System is infected with spyware, buy Spydawn to clean it", redirecting the user to Spydawn' homepage where he/she is prompted to buy the Spydawn software."

Should you install Spydawn if you get a pop-up saying your machine is infected? ABSOLUTELY NOT! For the nominal charge of $39.99 you will have had the pleasure of further infecting your machine, which will require hours of clean-up and could result in a possilbe loss of valuable data if you do.

What can I do if I am infected with Spydawn? At On-Site our technicians are experienced in virus, trojan, adware and spyware removal. We will make every attempt to preserve your data, whether it be your business' QuickBooks™ data or the pictures of the grandchildren from last summer's holiday at Martha's Vineyard.

SpyDawn

Updated: May 31, 2007 5:09:56 PM Type: Other Risk Impact: Medium Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP

Behavior

SpyDawn is a security risk that may give exaggerated reports of threats on the computer. The program then prompts the user to purchase a registered version of the software in order to remove the reported threats.

Note: Definitions dated before May 18, 2007 may detect this security risk as VirusBurst.

Protection

  • Initial Rapid Release version pending
  • Latest Rapid Release version pending
  • Initial Daily Certified version pending
  • Latest Daily Certified version pending
  • Current Weekly Certified release date May 23, 2007

Read The Full Story


What is SmitFraud?

SmitFraud is a type of spyware that installs itself into a computer via adware, without any notice from the user. It can affect all Windows platforms made between 1995 and 2003.[citation needed] Most of the time, it installs itself after the computer user installs a fake codec, such as BrainCodec, PCodec or VideoKeyCodec.[citation needed] It infects a Windows DLL with a computer virus.[citation needed] SmitFraud changes the infected computer's desktop background either into a Blue Screen of Death, or any background displaying a fake error message. Infected users also receive notifications asking users to install a fake anti-spyware program such as SpySheriff, SpyAxe or Spyware Quake, on the infected computer to remove the spyware. After a fake scan, the program asks users to pay for the full version before removing the spyware it's found. When users pay, the notifications disappear and the background turns normal, but the infection is still present. Read the entire article at Wikipedia.

Symantec/Norton - www.symantec.com

Trend Micro - www.trendmicro.com