On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F threat to a category 4.
It is the sixth version of this worm.
SOBIG.F follows a computer worm known as "Blaster," or "MSBlaster," which infected at least 500,000 computers all over the world only a week ago. The "Nachi" worm which is designed to protect pcs from "Blaster" caused its own havoc including infiltrating unclassified computers on the Navy-Marine intranet and the collapse of the check-in system of Air Canada.
Associated Press has stated that 1 in 17 emails sent around the world has been infected.
According to Paul Wood of MessageLabs it took anti-virus companies at least 12 hours to release updated software to combat the worm.
W32.Sobig.F@mm is, in fact, a worm, not a virus. This worm sends itself to every email address it finds in files with the following extensions:
The "SOBIG" worm is found in emails in your inbox with the following subject headings:
I have personally received emails with all of these subject headings on a daily basis. The body of the email simply refers you to an attached file. It is absolutely critical that you DO NOT open this attachment. It is this attachment that contains the "SOBIG" worm.
The "SOBIG" worm is attached to files with the following names:
The last day on which the "SOBIG" worm will spread is 9 September, 2003. Although this means email address collection and mass-mailing will stop at that date a computer infected with the worm will still try to download updates from master servers even after this date.
The worm affects Windows 95, 98, Me, Nt, 2000 and XP but leaves Unix, OS/2, Windows 3.x, Macintosh and Linux unaffected.
Thankfully Symantec Security Response has created a removal tool which is free to clean an infected computer. To access Symantec's free removal tool visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html
< p>For a free virus scan visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html< p>This past month's computer attacks follows a historical trend ? virus activity surges when college students have free time on their hands in the summer.However, there is a suspicion that these kind of virus attacks may be driven by profit motives because worms such as SOBIG.F place a "trojan horse" on infected drives of unsuspecting pc owners which allows spammers to quickly distribute millions of unsolicited emails around the world.
Poorly designed software is declared the main cause of increased virus activity by computer designers as software is often distributed without appropriate amounts of testing.
Microsoft last year announced its intention to slow down software development so that software can be made more safe from infiltration.
Regardless of the cause, here is the reality:
The spread of the SOBIG.F worm is being hailed the fastest ever.
History, therefore, tells us that Sobig.G is, in fact, just around the corner, faster and stronger than each of its predecessors.
As Sobig.F nears its expiry on 10 September 2003 I can almost envisage its evil grin as it declares, "I'll be back."
About The Author
Copyright 2003. Karin Manning. All Rights Reserved. Karin Manning is the webmistress of http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and the publisher of Net Wealth, filled with up to the minute tips and techniques for growing your business online. To subscribe visit http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and fill in the Newsletter Popunder on entry.
http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html
scheduled maid service Morton Grove ...MP3 players are everywhere! It seems that the number of... Read More
A Computer in Your HandCarrying around an address book and... Read More
Flash mp3 players come with an exciting array of features,... Read More
In the first part of this home lab tutorial, CCNA... Read More
Music lovers have been carrying around radios and other bulky... Read More
With their solid-state technology, compact size, and abundant memory, portable... Read More
If you have a computer for home use or for... Read More
How can you compare mp3 players to be sure you're... Read More
There are soooo many choices. With all the styles and... Read More
Not so many years ago, homes across the country watched... Read More
The Internet can be a dangerous place.While you're enjoying the... Read More
With renting methods such as online DVD rental and pay-per-view,... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More
Saving Lives With A Pocket PCFree medical downloads can be... Read More
Computers are supposed to speed up our productivity?to help us... Read More
CCNAs and CCNA candidates hear it all the time: ???Get... Read More
While most small businesses really do need to find a... Read More
I've worked my way from the CCNA to the CCIE,... Read More
When I first started studying for my CCNP, some of... Read More
This is the third in a series of articles highlighting... Read More
Peoples' private information needs to stay private, even after it... Read More
Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More
Stop Getting LostOne of the greatest uses for a pocket... Read More
Good Morning Mr. Sampson. Please type in you Personal Identification... Read More
move out cleaning service Des Plaines ...Microsoft Business Solutions is on the way to popularize it's... Read More
Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More
This is the third in a series of articles highlighting... Read More
Step 1:Open WinRAR and browse to the folder with your... Read More
Yes, it's true. You may have inadvertently invited a spy... Read More
I do a holiday letter every year and send them... Read More
"Automated Testing" is automating the manual testing process currently in... Read More
When studying for your Cisco CCNA, CCNP, or CCIE exam,... Read More
Nothing is worse than having to negotiate all kinds of... Read More
There are plenty of articles out there about how to... Read More
Apache, MysQL and PHP for Windows could be a nice... Read More
Selecting a TV isn't as easy as it used to... Read More
The year is 1981. IBM has just released the Personal... Read More
Good Morning Mr. Sampson. Please type in you Personal Identification... Read More
OK, so you caught a computer virus and your system... Read More
1. Before sitting down for coding, you must have formal... Read More
MMC and SDFlash memory is available in so many formats... Read More
Those small USB drives have so many names, pocket drives,... Read More
Do you remember the old saw about how computers would... Read More
Occupational Therapy Made EasierMedical downloads for the pda have improved... Read More
Buying a receiver is one of the most important decisions... Read More
First and foremost before I begin my ranting it is... Read More
Most people download and save so much information on their... Read More
Using SQL Server 2000 and above versions you can retrieve... Read More
Do you use Windows standard uninstall feature? How do you... Read More
Personal Technology |