I use McAfee and it's been catching them just fine for me, probly about 20 or so since Sunday.
-----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Todd Ryan Sent: Tuesday, November 27, 2001 3:17 AM To: [EMAIL PROTECTED] Subject: Re: [IMail Forum] Declude Catch BadTrans Virus? Declude and McAfee NetShield has caught about 20 of them in the last couple days here. I'm happy. --Todd. ----- Original Message ----- From: "Dale Chavez" <[EMAIL PROTECTED]> To: "Imail Forum" <[EMAIL PROTECTED]> Sent: Monday, November 26, 2001 10:08 AM Subject: [IMail Forum] Declude Catch BadTrans Virus? > Just received this new virus warning this morning and was wondering if > Declude will indeed catch and quarantine this new one? > > Thanks, > Dale > > +---------------------------------------------------- > > From: [EMAIL PROTECTED] > To: MS Outlook::VirusEye Subscriber > > Subject: BadTrans Virus Alert > Date: 11/26/01 4:55 AM > > Dear VirusEye Alert Subscriber, > > There is a new and dangerous virus in circulation with the key details > as follows: > > - Virus name: BadTrans > > - Official name: W32/BadTrans.B-mm > > - Number of copies seen so far: 11,384 > > - Time & Date first Captured: 23 Nov 2001 18:40:36 GMT > > - Origin of first intercepted copy: UK > > - Number of countries seen active: 34 > > - Top three most active countries: UK, US, Germany > > Distribution Potential: > > MessageLabs are intercepting the BadTrans.B virus at a rate of 100 per > minute and it is one of the fastest spreading viruses we have ever seen. > > The virus is now widespread - we have stopped copies coming from over 30 > countries and it has replaced SirCam at No. 1 in MessageLabs' daily top > 10 which had occupied the No. 1 spot for over 4 months. > > Technical Information: > > Propagation: > > The virus makes use of the ms01-020 exploit, which means that the virus > can execute on reading or previewing the email from within Microsoft > Outlook - it is not necessary to double click on any attachment. > > Subject: > > Subject line is selected from an email in the infected users PC and > prefixed with 'Re: ' > > Attachment: > > Variable - built up from several elements. Examples include: > > S3MSONG.DOC.scr > Pics.DOC.scr > HUMOR.MP3.scr > Sorry_about_yesterday.MP3.pif > README.MP3.scr > ME_NUDE.MP3.scr > fun.MP3.pif > NEWS_DOC.DOC.scr > docs.DOC.pif > images.DOC.pif > HAMSTER.DOC.pif > SEARCHURL.MP3.pif > > Payload: > > The virus also drops a password stealing Trojan KDLL.DLL previously > identified as Trojan.PSW.Hooker. The trojan component uses key logging > to send confidential information (passwords, credit card details etc.) > from infected computers to the email address: > > [EMAIL PROTECTED] > > The trojan component moves itself to the Windows system directory with > the filename KERN32.EXE, drops an additional library (key logger) with > filename HKSDLL.DLL. > > The trojan registers itself in the Registry in RunOnce key: > > HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce > kernel32 = kern32.exe > > Windows loads the trojan file on each restart. > > > Please visit http://www.ipswitch.com/support/mailing-lists.html > to be removed from this list. > > An Archive of this list is available at: > http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ > > Please visit http://www.ipswitch.com/support/mailing-lists.html to be removed from this list. An Archive of this list is available at: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Please visit http://www.ipswitch.com/support/mailing-lists.html to be removed from this list. An Archive of this list is available at: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
