On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F threat to a category 4.
It is the sixth version of this worm.
SOBIG.F follows a computer worm known as "Blaster," or "MSBlaster," which infected at least 500,000 computers all over the world only a week ago. The "Nachi" worm which is designed to protect pcs from "Blaster" caused its own havoc including infiltrating unclassified computers on the Navy-Marine intranet and the collapse of the check-in system of Air Canada.
Associated Press has stated that 1 in 17 emails sent around the world has been infected.
According to Paul Wood of MessageLabs it took anti-virus companies at least 12 hours to release updated software to combat the worm.
W32.Sobig.F@mm is, in fact, a worm, not a virus. This worm sends itself to every email address it finds in files with the following extensions:
The "SOBIG" worm is found in emails in your inbox with the following subject headings:
I have personally received emails with all of these subject headings on a daily basis. The body of the email simply refers you to an attached file. It is absolutely critical that you DO NOT open this attachment. It is this attachment that contains the "SOBIG" worm.
The "SOBIG" worm is attached to files with the following names:
The last day on which the "SOBIG" worm will spread is 9 September, 2003. Although this means email address collection and mass-mailing will stop at that date a computer infected with the worm will still try to download updates from master servers even after this date.
The worm affects Windows 95, 98, Me, Nt, 2000 and XP but leaves Unix, OS/2, Windows 3.x, Macintosh and Linux unaffected.
Thankfully Symantec Security Response has created a removal tool which is free to clean an infected computer. To access Symantec's free removal tool visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html
< p>For a free virus scan visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html< p>This past month's computer attacks follows a historical trend ? virus activity surges when college students have free time on their hands in the summer.However, there is a suspicion that these kind of virus attacks may be driven by profit motives because worms such as SOBIG.F place a "trojan horse" on infected drives of unsuspecting pc owners which allows spammers to quickly distribute millions of unsolicited emails around the world.
Poorly designed software is declared the main cause of increased virus activity by computer designers as software is often distributed without appropriate amounts of testing.
Microsoft last year announced its intention to slow down software development so that software can be made more safe from infiltration.
Regardless of the cause, here is the reality:
The spread of the SOBIG.F worm is being hailed the fastest ever.
History, therefore, tells us that Sobig.G is, in fact, just around the corner, faster and stronger than each of its predecessors.
As Sobig.F nears its expiry on 10 September 2003 I can almost envisage its evil grin as it declares, "I'll be back."
About The Author
Copyright 2003. Karin Manning. All Rights Reserved. Karin Manning is the webmistress of http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and the publisher of Net Wealth, filled with up to the minute tips and techniques for growing your business online. To subscribe visit http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and fill in the Newsletter Popunder on entry.
http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html
Culver prom limo ..Millions have enjoyed recorded music since 1877 when Thomas Edison... Read More
The best way to get the gaming computer that you... Read More
Those small USB drives have so many names, pocket drives,... Read More
As the Web grows more crowded and just plain "noisy"... Read More
World War II - Germany decided to attack Poland. Poland... Read More
What led them to this choice, as all four studios... Read More
The Internet can be a dangerous place.While you're enjoying the... Read More
Your first step in removing dangerous infections from your computer... Read More
How long do you think DVDs have around? 20 years?... Read More
The following practice, if done regularly, may help you to... Read More
File Transfer Protocol (FTP) is a protocol that is part... Read More
Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More
Computers are everywhere, and vary in specification, brands, sizes, shaped,... Read More
Just The Facts, Ma'mPalm pilots are all the rage now.... Read More
After reading this good article you will know some important... Read More
Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More
After another security hole recently surfaced in Microsoft's Windows operating... Read More
A Computer in Your HandCarrying around an address book and... Read More
In this era of Internet, most people are frequent users... Read More
Are you looking for an MP3 player but am not... Read More
In the first part of this home lab tutorial, CCNA... Read More
We've all seen them, you've been browsing a website and... Read More
In the years of the dot com boom and bust,... Read More
With the new technology used to transfer information to from... Read More
Enhanced Definition Television ? also known as EDTV ? is... Read More
Wood Dale limo ..Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More
Google, in their march to stay ahead of the pack... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More
If you've been kicking around the idea of building your... Read More
When studying for your Cisco CCNA, CCNP, or CCIE exam,... Read More
The year is 1981. IBM has just released the Personal... Read More
Wouldn't you be shocked to find that your personal sensitive... Read More
CCNA FAQQ. What exams do I have to take to... Read More
IntroductionMac OS X is the most technologically advanced operating system... Read More
When I first started studying for my CCNP, some of... Read More
Cameras: still known for taking pictures but assumed as digital... Read More
I've worked my way from the CCNA to the CCIE,... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Selecting a TV isn't as easy as it used to... Read More
We all enjoy our favorite screensavers but in the same... Read More
Freezing is also known as crashing or hanging. It's frustrating.... Read More
Introduction In this article I will clearly spell out the... Read More
You probably heard of the new Firefox browser version 1.0... Read More
About mail-mergingMail-merging is the process of merging variable data and... Read More
A computer needs a certain amount of information to operate;... Read More
Computers are available in different shapes, sizes and weights, due... Read More
No matter how fast your processor and regardless of how... Read More
Passwords have a strange dual nature. The stronger and safer... Read More
With the bewildering number of digital cameras on the market,... Read More
Personal Technology |