On Thursday, March 25, 2004 at 22:11 (which was Thursday, March 25, 2004 at 17:11 where I am) Thomas Fernandez wrote:
J>> What interested me though is this is the first I have read of a J>> trojan that is looking for TB! data files in addition to the typical J>> victims. > While that is trur, I am not quite sure how you can get hit by that > virus using TB. There are several wormvirusses out now that have .tbb and .abd listed as the files they will scan for e-mail addresses. While TB! protects us against the problems that the IE HTML-rendering in Outlook (Express) causes, there is no way any kind of software can protect against user stupidity. The recent versions of Bagle/Beagle and Netsky exhibit carefully wrought 'social engineering' to lure the unsuspecting end user to open the included attachment and run whatever is in there. Moreover, even though I use TB! as my main e-mail application, I still have several others installed in order to be able to help others (friends, people who get mail through my server) with their applications. Thus, it could happen accidentally to someone who is in a similar situation and didn't patch windows up completely and isn't running a local virus scanner that they could get hit by something and then it would still be advantageous for the worm to be able to gather addresses from the address books of other software. -- Greetings, Maurice Using The Bat! v2.05 Beta/12 on Windows XP 5.1 Build 2600 Service Pack 1 ________________________________________________ Current version is 2.04.7 | 'Using TBUDL' information: http://www.silverstones.com/thebat/TBUDLInfo.html

