Fortunately we're all blocking *.com right? The *.com viruses are going to
take forever to combat from a social engineering standpoint. It's probably
worth investing some time in user education on .com files because I think
this is going to be a new favorite virus writing style for the next few
months.

Chris Scharff
The Mail Resource Center
http://www.mail-resources.com

-----Original Message-----
From: Martin Blackstone
To: Exchange Discussions
Sent: 1/28/2002 7:57 AM
Subject: FW: Alert: W32/Myparty-mm on the loose



-----Original Message-----
From: Russ [mailto:[EMAIL PROTECTED]]
Sent: Monday, January 28, 2002 5:45 AM
To: [EMAIL PROTECTED]
Subject: Alert: W32/Myparty-mm on the loose


Be aware that this morning you will likely find a copy of this new mass
mailer in your mail systems. This is a pure social engineering attack,
it
contains an attachment named as a URL with a .com extension. Since .com
is
also an application, it will be run as such if its double-clicked on.
Check
with your AV company for updates and/or filtering criteria. If you can,
be
sure you have attachment filtering enabled at your mail gateway. Outlook
Email Security Update, and Outlook 2002, both catch this attachment and
prevent it from being available for the user to click on.

Cheers,
Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor


_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to