On Thursday, March 25, 2004 at 22:11 (which was Thursday, March 25,
2004 at 17:11 where I am) Thomas Fernandez wrote:

J>> What interested me though is this is the first I have read of a
J>> trojan that is looking for TB! data files in addition to the typical
J>> victims.

> While that is trur, I am not quite sure how you can get hit by that
> virus using TB.

There are several wormvirusses out now that have .tbb and .abd listed
as the files they will scan for e-mail addresses. While TB! protects
us against the problems that the IE HTML-rendering in Outlook
(Express) causes, there is no way any kind of software can protect
against user stupidity.

The recent versions of Bagle/Beagle and Netsky exhibit carefully
wrought 'social engineering' to lure the unsuspecting end user to open
the included attachment and run whatever is in there.

Moreover, even though I use TB! as my main e-mail application, I still
have several others installed in order to be able to help others
(friends, people who get mail through my server) with their
applications. Thus, it could happen accidentally to someone who is in
a similar situation and didn't patch windows up completely and isn't
running a local virus scanner that they could get hit by something and
then it would still be advantageous for the worm to be able to gather
addresses from the address books of other software.

-- 
Greetings,
Maurice

Using The Bat! v2.05 Beta/12 on Windows XP 5.1 Build 2600 Service Pack 1


________________________________________________
Current version is 2.04.7 | 'Using TBUDL' information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to