On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F threat to a category 4.
It is the sixth version of this worm.
SOBIG.F follows a computer worm known as "Blaster," or "MSBlaster," which infected at least 500,000 computers all over the world only a week ago. The "Nachi" worm which is designed to protect pcs from "Blaster" caused its own havoc including infiltrating unclassified computers on the Navy-Marine intranet and the collapse of the check-in system of Air Canada.
Associated Press has stated that 1 in 17 emails sent around the world has been infected.
According to Paul Wood of MessageLabs it took anti-virus companies at least 12 hours to release updated software to combat the worm.
W32.Sobig.F@mm is, in fact, a worm, not a virus. This worm sends itself to every email address it finds in files with the following extensions:
The "SOBIG" worm is found in emails in your inbox with the following subject headings:
I have personally received emails with all of these subject headings on a daily basis. The body of the email simply refers you to an attached file. It is absolutely critical that you DO NOT open this attachment. It is this attachment that contains the "SOBIG" worm.
The "SOBIG" worm is attached to files with the following names:
The last day on which the "SOBIG" worm will spread is 9 September, 2003. Although this means email address collection and mass-mailing will stop at that date a computer infected with the worm will still try to download updates from master servers even after this date.
The worm affects Windows 95, 98, Me, Nt, 2000 and XP but leaves Unix, OS/2, Windows 3.x, Macintosh and Linux unaffected.
Thankfully Symantec Security Response has created a removal tool which is free to clean an infected computer. To access Symantec's free removal tool visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html
< p>For a free virus scan visit: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html< p>This past month's computer attacks follows a historical trend ? virus activity surges when college students have free time on their hands in the summer.However, there is a suspicion that these kind of virus attacks may be driven by profit motives because worms such as SOBIG.F place a "trojan horse" on infected drives of unsuspecting pc owners which allows spammers to quickly distribute millions of unsolicited emails around the world.
Poorly designed software is declared the main cause of increased virus activity by computer designers as software is often distributed without appropriate amounts of testing.
Microsoft last year announced its intention to slow down software development so that software can be made more safe from infiltration.
Regardless of the cause, here is the reality:
The spread of the SOBIG.F worm is being hailed the fastest ever.
History, therefore, tells us that Sobig.G is, in fact, just around the corner, faster and stronger than each of its predecessors.
As Sobig.F nears its expiry on 10 September 2003 I can almost envisage its evil grin as it declares, "I'll be back."
About The Author
Copyright 2003. Karin Manning. All Rights Reserved. Karin Manning is the webmistress of http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and the publisher of Net Wealth, filled with up to the minute tips and techniques for growing your business online. To subscribe visit http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html and fill in the Newsletter Popunder on entry.
http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.f@mm.html
monthly home cleaning Buffalo Grove ..Plenty! When we made the decision to be our own... Read More
You use Ctrl+Alt+Del to see what's running on your PC,... Read More
First things first, what is Firefox? Well, it's a browser.... Read More
If you've been kicking around the idea of building your... Read More
All of us are familiar with the pyramids of Egypt.... Read More
Webmasters usually sit at their computers much longer in a... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
There are many sources of heat that can raise the... Read More
Flow Text Around a GraphicQuestion: I have inserted a photo... Read More
When browsing the internet you are likely to come across... Read More
IntroductionMac OS X is the most technologically advanced operating system... Read More
With the bewildering number of digital cameras on the market,... Read More
Cookies, not the kind that Mom makes, but the computer... Read More
When I first started studying for my CCNP, some of... Read More
If you have a computer for home use or for... Read More
If you use a computer, you need to know more... Read More
Step 1:Open WinRAR and browse to the folder with your... Read More
The technological horizon has always got something new to offer,... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
The best way to get the gaming computer that you... Read More
We all enjoy our favorite screensavers but in the same... Read More
I do a holiday letter every year and send them... Read More
1. Let your PC boot up completely before opening any... Read More
CCNA FAQQ. What exams do I have to take to... Read More
For many people the computer industry is a seeming unsolvable... Read More
scheduled maid service Mundelein ..I recently got an e-mail asking about virtual memory. The... Read More
Peoples' private information needs to stay private, even after it... Read More
CCNA FAQQ. What exams do I have to take to... Read More
Understanding digital camera prices makes finding the best camera value... Read More
Just The Facts, Ma'mPalm pilots are all the rage now.... Read More
Confused by EDTV vs HDTV? We don't blame you. The... Read More
In this era of Internet, most people are frequent users... Read More
Most people think that all you have to do to... Read More
Cameras: still known for taking pictures but assumed as digital... Read More
When you think of a help desk, what do you... Read More
I've worked my way from the CCNA to the CCIE,... Read More
Using SQL Server 2000 and above versions you can retrieve... Read More
Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More
We've all seen them, you've been browsing a website and... Read More
Each of the items in the checklist below is part... Read More
As the web has evolved, so have the methods of... Read More
The Cisco Certified Network Associate (CCNA) Certification is meant for... Read More
Simone is exasperated. She has to work on her university... Read More
In the early days, Personal Digital Assistants (PDAs) were not... Read More
1. Empty the Temp directory regularly. To do this, make... Read More
Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
ASR (Automated System Recovery) is a feature available on the... Read More
Everywhere you look today people are listening to personal audio... Read More
I am going to assume that you are running windows... Read More
Personal Technology |