On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F threat to a category 4.
It is the sixth version of this worm.
SOBIG.F follows a computer worm known as "Blaster," or "MSBlaster," which infected at least 500,000 computers all over the world only a week ago. The "Nachi" worm which is designed to protect pcs from "Blaster" caused its own havoc including infiltrating unclassified computers on the Navy-Marine intranet and the collapse of the check-in system of Air Canada.
Associated Press has stated that 1 in 17 emails sent around the world has been infected.
According to Paul Wood of MessageLabs it took anti-virus companies at least 12 hours to release updated software to combat the worm.
W32.Sobig.F@mm is, in fact, a worm, not a virus. This worm sends itself to every email address it finds in files with the following extensions:
The "SOBIG" worm is found in emails in your inbox with the following subject headings:
I have personally received emails with all of these subject headings on a daily basis. The body of the email simply refers you to an attached file. It is absolutely critical that you DO NOT open this attachment. It is this attachment that contains the "SOBIG" worm.
The "SOBIG" worm is attached to files with the following names:
The last day on which the "SOBIG" worm will spread is 9 September, 2003. Although this means email address collection and mass-mailing will stop at that date a computer infected with the worm will still try to download updates from master servers even after this date.
The worm affects Windows 95, 98, Me, Nt, 2000 and XP but leaves Unix, OS/2, Windows 3.x, Macintosh and Linux unaffected.
Thankfully Symantec Security Response has created a removal tool which is free to clean an infected computer. To access Symantec's free removal tool visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html
< p>For a free virus scan visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html< p>This past month's computer attacks follows a historical trend ? virus activity surges when college students have free time on their hands in the summer.However, there is a suspicion that these kind of virus attacks may be driven by profit motives because worms such as SOBIG.F place a "trojan horse" on infected drives of unsuspecting pc owners which allows spammers to quickly distribute millions of unsolicited emails around the world.
Poorly designed software is declared the main cause of increased virus activity by computer designers as software is often distributed without appropriate amounts of testing.
Microsoft last year announced its intention to slow down software development so that software can be made more safe from infiltration.
Regardless of the cause, here is the reality:
The spread of the SOBIG.F worm is being hailed the fastest ever.
History, therefore, tells us that Sobig.G is, in fact, just around the corner, faster and stronger than each of its predecessors.
As Sobig.F nears its expiry on 10 September 2003 I can almost envisage its evil grin as it declares, "I'll be back."
About The Author
Copyright 2003. Karin Manning. All Rights Reserved. Karin Manning is the webmistress of http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and the publisher of Net Wealth, filled with up to the minute tips and techniques for growing your business online. To subscribe visit http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and fill in the Newsletter Popunder on entry.
http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html
monthly home cleaning Buffalo Grove ..Computers are supposed to speed up our productivity?to help us... Read More
Unless you place your faith in internal search engine software... Read More
So you got yourself a digital camcorder. If you want... Read More
I got my eyes set on a iPod mini, as... Read More
In the years of the dot com boom and bust,... Read More
We've all seen them, you've been browsing a website and... Read More
For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More
Winter?the official start of the cold and flu season. Though,... Read More
A Computer in Your HandCarrying around an address book and... Read More
Upgrading your processor will always speed up your computer, but... Read More
With their solid-state technology, compact size, and abundant memory, portable... Read More
1. Before sitting down for coding, you must have formal... Read More
JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More
Since the DOS days, batch files have been one of... Read More
There have been some questions on anti-skip protection on mp3... Read More
Freezing is also known as crashing or hanging. It's frustrating.... Read More
ASR (Automated System Recovery) is a feature available on the... Read More
There are plenty of articles out there about how to... Read More
Just The Facts, Ma'mPalm pilots are all the rage now.... Read More
I'm eighty-one years old and I bought my first computer... Read More
Heading off on vacation soon?Then perhaps you're tempted to take... Read More
Using SQL Server 2000 and above versions you can retrieve... Read More
How can you compare mp3 players to be sure you're... Read More
Choose Not To ConformPalm pilots and pdas are constantly growing... Read More
Projectors have come a long way in the past few... Read More
scheduled maid service Mundelein ..Everywhere you look today people are listening to personal audio... Read More
Peoples' private information needs to stay private, even after it... Read More
Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More
"Automated Testing" is automating the manual testing process currently in... Read More
If you don't have an mp3 player, and even if... Read More
Google, in their march to stay ahead of the pack... Read More
I have a p3 500MHz PC with 128MB RAM, 10.2... Read More
Sometimes your PC will start acting strange for no apparent... Read More
Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More
MP3 players are Hot! Playing music has come a long... Read More
What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More
The technological horizon has always got something new to offer,... Read More
The Cisco Certified Network Associate (CCNA) Certification is meant for... Read More
Spyware is the software that collects information about your online... Read More
Have you ever tried to remove Spyware off your PC... Read More
For many people the computer industry is a seeming unsolvable... Read More
The year is 1981. IBM has just released the Personal... Read More
What led them to this choice, as all four studios... Read More
All of us are familiar with the pyramids of Egypt.... Read More
We've all seen them, you've been browsing a website and... Read More
CCNAs and CCNA candidates hear it all the time: ???Get... Read More
Webmasters usually sit at their computers much longer in a... Read More
"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More
First things first, what is Firefox? Well, it's a browser.... Read More
Your Bible At Your FingertipsIt is fairly easy to find... Read More
Personal Technology |