SOBIG.F Virus Promises Ill Be Back

On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F threat to a category 4.

It is the sixth version of this worm.

SOBIG.F follows a computer worm known as "Blaster," or "MSBlaster," which infected at least 500,000 computers all over the world only a week ago. The "Nachi" worm which is designed to protect pcs from "Blaster" caused its own havoc including infiltrating unclassified computers on the Navy-Marine intranet and the collapse of the check-in system of Air Canada.

Associated Press has stated that 1 in 17 emails sent around the world has been infected.

According to Paul Wood of MessageLabs it took anti-virus companies at least 12 hours to release updated software to combat the worm.

W32.Sobig.F@mm is, in fact, a worm, not a virus. This worm sends itself to every email address it finds in files with the following extensions:

  • .TXT

  • .WAB

  • .MHT

  • .HTML

  • .HTM

  • .HLP

  • .EML

  • .DBX

The "SOBIG" worm is found in emails in your inbox with the following subject headings:

  • RE: DETAILS

  • RE: THANK YOU!

  • RE: YOUR APPLICATION

  • RE: YOUR DETAILS

  • RE: DETAILS

  • RE: APPROVED

  • RE: THAT MOVIE

  • RE: WICKED SCREENSAVER

I have personally received emails with all of these subject headings on a daily basis. The body of the email simply refers you to an attached file. It is absolutely critical that you DO NOT open this attachment. It is this attachment that contains the "SOBIG" worm.

The "SOBIG" worm is attached to files with the following names:

  • Movie0045.pif

  • Your_document.pif

  • Thank_you.pif

  • Document_all.pif

  • Details.pif

  • Document_9446.pif

  • Wicked_scr.scr

    < p>
  • Application.pif

The last day on which the "SOBIG" worm will spread is 9 September, 2003. Although this means email address collection and mass-mailing will stop at that date a computer infected with the worm will still try to download updates from master servers even after this date.

The worm affects Windows 95, 98, Me, Nt, 2000 and XP but leaves Unix, OS/2, Windows 3.x, Macintosh and Linux unaffected.

Thankfully Symantec Security Response has created a removal tool which is free to clean an infected computer. To access Symantec's free removal tool visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html

< p>For a free virus scan visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html

< p>This past month's computer attacks follows a historical trend ? virus activity surges when college students have free time on their hands in the summer.

However, there is a suspicion that these kind of virus attacks may be driven by profit motives because worms such as SOBIG.F place a "trojan horse" on infected drives of unsuspecting pc owners which allows spammers to quickly distribute millions of unsolicited emails around the world.

Poorly designed software is declared the main cause of increased virus activity by computer designers as software is often distributed without appropriate amounts of testing.

Microsoft last year announced its intention to slow down software development so that software can be made more safe from infiltration.

Regardless of the cause, here is the reality:

  • Sobig.A was found on January 9 2003 with no expiry.

  • Sobig.B was found on May 18, expiring May 31 2003.

  • Sobig.C was found on May 31, expiring on June 8 2003.

  • Sobig.D was found on June 18, expiring on July 2 2003.

  • Sobig.E was found on June 25, expiring on July 14 2003.

  • Sobig.F was found on August 19, to expire 10 September 2003.

The spread of the SOBIG.F worm is being hailed the fastest ever.

History, therefore, tells us that Sobig.G is, in fact, just around the corner, faster and stronger than each of its predecessors.

As Sobig.F nears its expiry on 10 September 2003 I can almost envisage its evil grin as it declares, "I'll be back."

About The Author

Copyright 2003. Karin Manning. All Rights Reserved. Karin Manning is the webmistress of http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and the publisher of Net Wealth, filled with up to the minute tips and techniques for growing your business online. To subscribe visit http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and fill in the Newsletter Popunder on entry.

http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html

executive chauffeured services Bradford .. Madison to Airport car
In The News:

Getting virus alerts on your iPhone? Tech expert Kurt “CyberGuy" Knutsson helps you learn how to handle fake scam alerts and boost security.
Tech expert Kurt “CyberGuy" Knutsson says opening emails is safe, but risks arise from interacting with links, attachments or HTML content.
Tech expert Kurt “CyberGuy" Knutsson reveals four signs of compromised Social Security numbers and offers five steps to protect yourself.
Tech expert Kurt “CyberGuy" Knutsson discusses how MAB Robotics' Honey Badger 4.0, a versatile robot, now walks underwater with amphibious skills.
An updated Android trojan called FakeCall hijacks bank calls. Tech expert Kurt “CyberGuy" Knutsson says Android phone manufacturers and Google need to step up their game on security.
The Massimo Modular E9 is a sleek, smart and comfy tiny home in 409 square feet. Tech expert Kurt “CyberGuy" Knutsson takes a closer look at what the future of housing might look like.
Every stock trader should consider a virtual private network to safeguard their trading, according to tech guru Kurt "CyberGuy" Knutsson.
Apple recently announced its new lineup of Macs and rolled out Apple Intelligence, its latest artificial intelligence-powered feature for its products.
A Swiss-engineered robot can climb ladders, showing why it's at the cutting edge of autonomous robotic solutions for harsh industrial settings.
Kurt "CyberGuy" Knutsson presents the cities targeted most by robocalls, why this is happening and what you can do about it to protect your privacy.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Kurt "CyberGuy" Knutsson shares tips and suggestions for how to get the best use out of the updated Calendar app available with the latest iOS update.
Your Social Security number, your unique identifier used for many purposes, has likely been leaked on the Dark Web; here are some steps you can take to protect yourself.
Researchers have developed a new technology that creates strong, sticky fibers capable of lifting objects and capturing things from a distance.
Smart rings track the same things that smartwatches do, including steps, sleep and a general overview of your overall health, and they tend have more battery life than smartwatches.
Researchers have developed a robotic finger that can perform routine medical exams like those conducted by doctors, helping to address the growing shortage of trained professionals.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Insurance administrative services company Landmark Admin reported that a data breach from a May cyberattack affected over 800,000 people.
Sotheby's will auction the first artwork created by Ai-Da, the world's first robot artist created in 2019 by British gallerist Aidan Meller.
More than 250 million users of the Verizon Messages app will have to switch to another app. Verizon is shutting down Messages in the next month.
Tech expert Kurt “CyberGuy" Knutsson provides a list of 10 celebrities who are the most targeted by deepfake scams, including Tom Hanks.
Tech expert Kurt “CyberGuy" Knutsson discusses how Vast's Haven-1, launching in 2025, transforms space living with human-centric design.
UnitedHealth confirms over 100 million Change Healthcare users had their data stolen. Kurt “CyberGuy" Knutsson reveals what happened and what caused the breach.
Tech expert Kurt “CyberGuy" Knutsson explains how iOS 18 brings new text formatting and animated effects to the Messages app.
Whether you're a social media veteran or novice, Facebook friend request scams are common. Kurt the CyberGuy provides tips to keep your account safe.

Your Affiliate Business - Peripherals, Software, Computers

I have always been interested in computers, but in the... Read More

How I Started Working With 3D Modeling Programs

So I'll start from the very beginning.One day I was... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

The Importance Of Email Backup

Viruses, software failures, power failures, human errors, hard drive failures... Read More

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

Enhanced Web Browsing With Toolbars

As the Web grows more crowded and just plain "noisy"... Read More

Consumer Electronic Information: The Basics of the DLP Projector

Projectors have come a long way in the past few... Read More

Troubleshooting Computer Freeze (Lockup) Problems

How familiar does the following sound? Your computer was working... Read More

Can Movie Theatres Compete with Home HD TV in the Future?

The battle is heating up for market share, home movie... Read More

DVD The Ultimate Consumer Digital Media

Digital Video Disc or as it is sometimes referred to... Read More

Font Organizers Review, Part I

Do you know how many fonts are currently installed on... Read More

Your Computer Cant Keep Time

A computer needs a certain amount of information to operate;... Read More

Make Windows XP Run Faster!

A friend told me: "My computer startup seems to be... Read More

Basic Problem in a PC

I have a p3 500MHz PC with 128MB RAM, 10.2... Read More

Email Management

If you utilize a computer at home or work it... Read More

Nephrology and Dialysis For a PDA

Saving Lives With A Pocket PCFree medical downloads can be... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

Computer Performance Tips

Introduction In this article I will clearly spell out the... Read More

Cisco Certification: Building Your Home Lab, Part II

In the first part of this home lab tutorial, CCNA... Read More

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

D2X Digital SLRCoolpix 8800 Actually Refers to Two Nikon Cameras

Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More

Is Desktop Search Deserving?

Google, in their march to stay ahead of the pack... Read More

HTML Explained: Part 1

Want to save money while promoting your web-based business? Of... Read More

Connect Your IPAQ to Linux

Choose Not To ConformPalm pilots and pdas are constantly growing... Read More

Protect Your PC from Viruses, Worms & Trojans

Each of the items in the checklist below is part... Read More

O'Hare Chicago prom limo ..