-----Original Message-----
From: UNIRAS (UK Govt CERT)
Sent: 13 June 2002 10:06
To: [EMAIL PROTECTED]
Subject: FW: UNIRAS Alert - 17/02 - SOPHOS - Malicious Software Report -
W32/Frethem-Fam
Importance: High


-----BEGIN PGP SIGNED MESSAGE-----

- --------------------------------------------------------------------------
--------
   UNIRAS (UK Govt CERT) Alert Notice - 17/02 dated 13.06.02  Time: 10:00
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination
Centre)
- --------------------------------------------------------------------------
--------
  UNIRAS material is also available from its website at www.uniras.gov.uk
and
         Information about NISCC is available from www.niscc.gov.uk
- --------------------------------------------------------------------------
--------

Title
=====

Malicious Software Report - W32/Frethem-Fam

Detail
======

UNIRAS Comment:

This particular virus and a number of variants have begun to emerge since
Tuesday.
There are indications from MessageLabs that W32/Frethem.F-mm is beginning to
cause
some problems with an acceleration in its promulgation.

It is suggested that anti-virus software vendors be consulted to ensure that
the
most recent patch releases will protect you against it.

============================================================================
====

SOPHOS Security Bulletin:

Name: W32/Frethem-Fam
Type: Win32 worm
Date: 12 June 2002

A virus identity file (IDE) which provides protection is
available now from our website and will be incorporated into the
July 2002 (3.59) release of Sophos Anti-Virus.

Sophos has received several reports of this worm from the wild.

Note: This IDE was updated at 10:55 GMT on 12 June 2002 to
enhance detection.

Description:

W32/Frethem-Fam is a family of email-aware worms.

At the time of writing, Sophos is aware of six variants of
W32/Frethem, all of which are detected by this identity.

One variant has been reported from the wild. It arrives in an
email with the following characteristics:

Subject line: Re: Your password!
Message text:

ATTENTION!

You can access
very important
information by
this password

DO NOT SAVE
password to disk
use your mind

now press
cancel

Attached files: decrypt-password.exe, password.txt

W32/Frethem is contained in the attached EXE file, which
attempts to exploit an Outlook bug in order to run automatically
when the mail is read.

The file password.txt is not infectious -- it just contains the
text:

Your password is W8dqwq8q918213

Download the IDE file from
http://www.sophos.com/downloads/ide/fret-fam.ide

Read the analysis at
http://www.sophos.com/virusinfo/analyses/w32frethemfam.html

Download a ZIP file containing all the IDE files available for
the current version of Sophos Anti-Virus from
http://www.sophos.com/downloads/ide/ides.zip

Read about how to use IDE files at
http://www.sophos.com/downloads/ide/using.html

- ---------------------------------------------------------------------

- --------------------------------------------------------------------------
--------

For additional information or assistance, please contact the HELP Desk by
telephone or Not Protectively Marked information may be sent via EMail to:

[EMAIL PROTECTED]
Tel: 020 7821 1330 Ext 4511
Fax: 020 7821 1686

- --------------------------------------------------------------------------
--------
UNIRAS wishes to acknowledge the contributions of SOPHOS and MessageLabs for
the
information contained in this Alert.
- --------------------------------------------------------------------------
--------
This Briefing contains the information released by the original author. Some
of the information may have changed since it was released. If the
vulnerability
affects you, it may be prudent to retrieve the advisory from the canonical
site
to ensure that you receive the most current information concerning that
problem.

Reference to any specific commercial product, process, or service by trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views
and opinions of authors expressed within this notice shall not be used for
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall
not be liable for any loss or damage whatsoever, arising from or in
connection
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST)
and has contacts with other international Incident Response Teams (IRTs) in
order to foster cooperation and coordination in incident prevention, to
prompt
rapid reaction to incidents, and to promote information sharing amongst its
members and the community at large.
- --------------------------------------------------------------------------
--------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQCVAwUBPQheuIpao72zK539AQEz9AP/V/bFdkoUIn3xh1NRyaylvwdSAlVX0D4t
6sjxcLkMppxMZ50OuIXa6q3pD/insn76DIeb02hOxlzFDrVQlXI5x3Ml4l3dgxOZ
2Yd1UCh2i2bZ6lBgD5OzS/nPTXfMR31J0i65VqMEM656gsF8ToSJdGcFtXTshX59
zadchVNmbA0=
=+g3/
-----END PGP SIGNATURE-----




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to