On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F threat to a category 4.
It is the sixth version of this worm.
SOBIG.F follows a computer worm known as "Blaster," or "MSBlaster," which infected at least 500,000 computers all over the world only a week ago. The "Nachi" worm which is designed to protect pcs from "Blaster" caused its own havoc including infiltrating unclassified computers on the Navy-Marine intranet and the collapse of the check-in system of Air Canada.
Associated Press has stated that 1 in 17 emails sent around the world has been infected.
According to Paul Wood of MessageLabs it took anti-virus companies at least 12 hours to release updated software to combat the worm.
W32.Sobig.F@mm is, in fact, a worm, not a virus. This worm sends itself to every email address it finds in files with the following extensions:
The "SOBIG" worm is found in emails in your inbox with the following subject headings:
I have personally received emails with all of these subject headings on a daily basis. The body of the email simply refers you to an attached file. It is absolutely critical that you DO NOT open this attachment. It is this attachment that contains the "SOBIG" worm.
The "SOBIG" worm is attached to files with the following names:
The last day on which the "SOBIG" worm will spread is 9 September, 2003. Although this means email address collection and mass-mailing will stop at that date a computer infected with the worm will still try to download updates from master servers even after this date.
The worm affects Windows 95, 98, Me, Nt, 2000 and XP but leaves Unix, OS/2, Windows 3.x, Macintosh and Linux unaffected.
Thankfully Symantec Security Response has created a removal tool which is free to clean an infected computer. To access Symantec's free removal tool visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html
< p>For a free virus scan visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html< p>This past month's computer attacks follows a historical trend ? virus activity surges when college students have free time on their hands in the summer.However, there is a suspicion that these kind of virus attacks may be driven by profit motives because worms such as SOBIG.F place a "trojan horse" on infected drives of unsuspecting pc owners which allows spammers to quickly distribute millions of unsolicited emails around the world.
Poorly designed software is declared the main cause of increased virus activity by computer designers as software is often distributed without appropriate amounts of testing.
Microsoft last year announced its intention to slow down software development so that software can be made more safe from infiltration.
Regardless of the cause, here is the reality:
The spread of the SOBIG.F worm is being hailed the fastest ever.
History, therefore, tells us that Sobig.G is, in fact, just around the corner, faster and stronger than each of its predecessors.
As Sobig.F nears its expiry on 10 September 2003 I can almost envisage its evil grin as it declares, "I'll be back."
About The Author
Copyright 2003. Karin Manning. All Rights Reserved. Karin Manning is the webmistress of http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and the publisher of Net Wealth, filled with up to the minute tips and techniques for growing your business online. To subscribe visit http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and fill in the Newsletter Popunder on entry.
http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html
disinfecting cleaning services Winnetka ..Cookies, not the kind that Mom makes, but the computer... Read More
Have you ever thought about building your own computer system?... Read More
ASR (Automated System Recovery) is a feature available on the... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
Stimulus thru Caffiene or Visual Input?It appears that the Mobi... Read More
MP3 players are Hot! Playing music has come a long... Read More
The technological horizon has always got something new to offer,... Read More
In the years of the dot com boom and bust,... Read More
The best way to get the gaming computer that you... Read More
Getting started with video editing is very simple you only... Read More
You have your television and home theater receiver; you just... Read More
Lost & Found for the 21st CenturyIn today's hectic world... Read More
There have been some questions on anti-skip protection on mp3... Read More
You will need the following:1. 1.44MB FDD (floppy)2. NVFLASH utility... Read More
Plenty! When we made the decision to be our own... Read More
If you don't have an mp3 player, and even if... Read More
By using your computer today you can find a lot... Read More
On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More
Many computer users are worried about their computer's performance. After... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
You use Ctrl+Alt+Del to see what's running on your PC,... Read More
Confused by EDTV vs HDTV? We don't blame you. The... Read More
Time is money. And when you constantly have to divide... Read More
First things first, what is Firefox? Well, it's a browser.... Read More
As the Web grows more crowded and just plain "noisy"... Read More
last minute cleaning help Highland Park ..The basic language of the internet is html. If you... Read More
In the first part of this home lab tutorial, CCNA... Read More
Simone is exasperated. She has to work on her university... Read More
I have always been interested in computers, but in the... Read More
Lost & Found for the 21st CenturyIn today's hectic world... Read More
Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More
Up until the recent past, those who wanted to take... Read More
If you've been kicking around the idea of building your... Read More
Understanding digital camera prices makes finding the best camera value... Read More
MP3 players are Hot! Playing music has come a long... Read More
IntroOne of the big advantages of PCs over earlier types... Read More
Below you will find some useful information and comments about... Read More
Those small USB drives have so many names, pocket drives,... Read More
I have a p3 500MHz PC with 128MB RAM, 10.2... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
1. Empty the Temp directory regularly. To do this, make... Read More
How can you compare mp3 players to be sure you're... Read More
If you're a computer expert, you'll probably already know about... Read More
While most small businesses really do need to find a... Read More
On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More
Computers are available in different shapes, sizes and weights, due... Read More
Microsoft Business Solutions is on the way to popularize it's... Read More
Spyware is the software that collects information about your online... Read More
What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More
When browsing the internet you are likely to come across... Read More
Personal Technology |