Jos jedan - Mimail.C

Jos jedan - Mimail.C

offline
  • SINGI
  • Pridružio: 22 Avg 2003
  • Poruke: 787
  • Gde živiš: Beograd

Evo sta je poslao Denis Zenkin:

New Mimail Worm Promises "Exotic" Photographs and Harasses E-Gold

Kaspersky Labs, a leading data security software developer, reports the detection of
Mimail.c - a new modification of the infamous network worm, Mimail. There have been
numerous registered reports of infection from this malicious program.

Mimail.c is a classic e-mail worm, spreading via e-mail messages containing the
following characteristics:

Sender address:
james@домен получателя

Subject:
Re[2]: our private photos

Message body:
Hello Dear!,
Finally i've found possibility to right u, my lovely girl Smile
All our photos which i've made at the beach (even when u're without ur bh:))
photos are great! This evening i'll come and we'll make the best SEX Smile

Right now enjoy the photos.
Kiss, James.

Attachment:
photos.jpg.zip

It is interesting to note that the sender address of infected messages is formed
with the domain of the recipient. This tactic makes it harder to localize the
infection epicentre and may give recipients the impression that the message came
from a colleague or acquaintance.

If someone carelessly opens the infected file attachment and launches Mimial.c, the
worm installs itself into the computer and proceeds to spread through the network.
Firstly, Mimail.c copies itself to the Windows directory under the name
"netwatch.exe", then registers this file in the auto-run key in the system registry,
and creates several additional helper files. To create one of these files, the
Mimail worm uses a built-in ZIP archiving procedure.

To mail itself out, Mimail.c uses another built-in function, a procedure to spread
itself via e-mail using SMTP protocol. The worm scans files in the "Shell Folders"
and "Program Files" catalogues and takes from them text strings likely to be e-mail
addresses. Next, unbeknownst to the victim, Mimail.c mails itself out to the found
email addresses.

Mimail.c has the added ability to cause significant damage to those using the E-Gold
payment system. The worm traces the activity of the E-Gold applications installed on
infected machines, records from them confidential data, and send this information
out to several anonymous e-mail addresses owned by the worm's creator.

Additionally, all infected computers are exploited to carry out a distributed DoS
attacks on the www.darkprofits.com and www.darkprofits.net web sites, sending to
them an endless cycle of random data packets.

The defence against Mimail.c has already been added to the Kaspersky Anti-Virus
database. More details about this malicious program can be found in the Kaspersky
Virus Encyclopedia.

Kaspersky Labs Corporate Communications



Registruj se da bi učestvovao u diskusiji. Registrovanim korisnicima se NE prikazuju reklame unutar poruka.
offline
  • Puky  Male
  • Scottish rebel
  • Pridružio: 18 Apr 2003
  • Poruke: 5815
  • Gde živiš: u Zmajevom gnjezdu

KAV distributer ::
Sender address:
james@????? ??????????


james@domen primaoca

(za one koji ne kontaju Ruski)



Ko je trenutno na forumu
 

Ukupno su 810 korisnika na forumu :: 46 registrovanih, 11 sakrivenih i 753 gosta   ::   [ Administrator ] [ Supermoderator ] [ Moderator ] :: Detaljnije

Najviše korisnika na forumu ikad bilo je 3466 - dana 01 Jun 2021 17:07

Korisnici koji su trenutno na forumu:
Korisnici trenutno na forumu: 357magnum, A.R.Chafee.Jr., ajo baba, Alexandar-1973, amaterSRB, Atomski čoban, bbogdan, Brana01, darkangel, DejanSt, deLacy, Denaya, Dorcolac, flash12, Georgius, gomago, ILGromovnik, Istman, jackreacher011011, Karla, kolle.the.kid, Kubovac, Leonov, Lutvo_Redzepagic, milenko crazy north, Mixelotti, moldway, nebkv, novator, opt1, pein, RJ, Rogan33, sasa87, Shinobi, SlaKoj, stagezin, vathra, Vlad000, Vlada1389, vladulns, W123, yufighter, ZetaMan, Zoca, 125