-----Original Message-----
From: UNIRAS
Sent: 11 April 2002 22:19
To: [EMAIL PROTECTED]
Subject: UNIRAS Alert - 13/02 - Malicious Software Report
Importance: High



-----BEGIN PGP SIGNED MESSAGE-----

- - - - --------------------------------------------------------------------
--------------
     UNIRAS (UK Govt CERT) Alert Notice - 13/02 dated 11.04.02  Time: 22:08
  UNIRAS is part of NISCC(National Infrastructure Security Co-ordination
Centre)
- - - - --------------------------------------------------------------------
--------------
  UNIRAS material is also available from its website at www.uniras.gov.uk
and
         Information about NISCC is available from www.niscc.gov.uk
- - - - --------------------------------------------------------------------
--------------

Title
=====
Malicious Software Report - W32/Navidad.e@M; W32/Navidad.E1-m

UNIRAS Comment
==============
MessageLabs is reporting significant numbers of a new Navidad variant being
stopped
by their systems. The file is believed to have an inactive remnant of the
W32/Magistr@MM virus then compressed using PEC 2.6. It is understood that
the
infected files are being received by MessageLabs from only a small number of
sources.

UNIRAS is advised by suppliers that uptodate antivirus software should
prevent
infection and detect the variant as either Magistr or Navidad.

However, System Administrators are advised to confirm that their antivirus
software is
uptodate and able to stop this particular variant.

Additonal information will be supplied when available.

URLs:
http://www.messagelabs.co.uk/viruseye/
http://vil.nai.com/vil/content/v_98881.htm

- - - - --------------------------------------------------------------------
--------------

For additional information or assistance, please contact the HELP Desk by
telephone or Not Protectively Marked information may be sent via EMail to:

[EMAIL PROTECTED]
Tel: 020 7821 1330 Ext 4511
Fax: 020 7821 1686

- - - - --------------------------------------------------------------------
--------------
UNIRAS wishes to acknowledge the contributions of MessageLabs and NAI for
the
information contained in this Alert.
- - - - --------------------------------------------------------------------
--------------
This Briefing contains the information released by the original author. Some
of the information may have changed since it was released. If the
vulnerability
affects you, it may be prudent to retrieve the advisory from the canonical
site
to ensure that you receive the most current information concerning that
problem.

Reference to any specific commercial product, process, or service by trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views
and opinions of authors expressed within this notice shall not be used for
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall
not be liable for any loss or damage whatsoever, arising from or in
connection
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST)
and has contacts with other international Incident Response Teams (IRTs) in
order to foster cooperation and coordination in incident prevention, to
prompt
rapid reaction to incidents, and to promote information sharing amongst its
members and the community at large.
- - - - --------------------------------------------------------------------
--------------
<End of UNIRAS Briefing>


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQCVAwUBPLX9ZYpao72zK539AQHK5wP+P0ngpKPa4S8m0ZZu6jVrCXQOmQ+En/vf
0PqXArQLEGQkyRtnQoZfsyBHyBLdb5cLJ9UwpAQggMw5X/AWkpbCln40m0uzdEBx
mwQHU+V4rIQlwB1qXciKRUHnWOirklDUwOWsyd+PTyJnfpnD6urEPRiTGP43MOSx
o3/43mnfgdo=
=rPmu
-----END PGP SIGNATURE-----




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to