[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
About virus W32.Klez.E
ANB-BIA - Av. Charles Woeste 184 - 1090 Bruxelles - Belg
TEL **.32.2/420 34 36 fax /420 05 49 E-Mail: editor@anb-bia.org
_____________________________________________________________
WEEKLY NEWS - SPECIAL ISSUE of: 21-08-2002 - About virus
W32.Klez.E
(see English version below)
A tous les inscrits de la liste “ANB-BIA WEEKLY NEWS”
Ces derniers jours, nous avons reçu plusieurs messages provenant
d’abbonnés à la liste d’envoi <anb-bia weekly news>. Ces
lecteurs nous informent avoir reçu de nous des messages infectés par le
virus W32.Klez.E. Ce virus serait contenu dans un fichier annexé (par
ex.: A humour game). Si l’on se rapporte aux en-têtes de ces e-mail, les
messages auraient été envoyés entre le 17 et le 20 août 2002. - Or, ce
message que vous êtes en train de lire, est le premier que nous envoyons
depuis le 14 août! Donc les messages infectés ne pouvaient pas venir de
chez nous…
Ce matin, j’ai fait inspecter les machines par TREND-MICRO (un scanner
antivirus on line que vous pouvez trouver à cette adresse:
http://housecall.antivirus.com): tout semble être en ordre. - Une
recherche dans le site de Symantec (Norton Antivirus) nous informait que
ce virus (actif depuis janvier et réactivé après le 23 juillet) copie,
dans un ordinateur infecté, les adresses e-mail et les utilise comme
expéditeur.
Ci-dessous, je mets en français un petit résumé de l’exemple donné
par Symantec et que je transcris plus bas en anglais.
Par exemple, l’ordinateur de Linda Anderson est infecté par le virus
W32.Klez.E. Linda n’utilise pas d’antivirus ou bien son antivirus n’est
pas à jour. Quand il est activé, W32.Klez.E trouve l’adresse e-mail de
Harold Logan et l’insère dans la ligne «From:» d’un e-mail infecté qu’il
envoie à Janet Bishop. Evidemment Janet Bishop signale à Harold qu’elle a
reçu de lui un message infecté… Harold contrôle son ordinateur avec un
antivirus à jour et ne trouve aucun virus, comme il fallait s’y attendre…
car son ordinateur n’est pas infecté…
Malheureusement je suis incapable de dire qui envoie ces messages
infectés et je déplore vivement qu’on puisse ainsi utiliser nos adresses
e-mail.
Je vous prie d’excuser tous les dérangements que cela provoque, mais nous
n’y sommes pour rien.
Un petit conseil. Si vous doutez d’un message, ne l’ouvrez pas! Plutôt,
écrivez-nous pour demander une confirmation ou une autre copie du
message.
Bien à vous, avec toutes nos excuses.
Paolo Costantini
Anb-Bia Bruxelles - 21 août 2003
----------------------------------------------
(English version)
To all subscribers to ANB-BIA's WEEKLY NEWS
Recently we have received several messages from subscribers on our
mailing list <anb-bia weekly news>. These subscribers informed us
that we have sent them messages infected by the W32.Klez.E. virus. This
virus is found in an attachment (e.g. In a humorous game, or
setup.exe).
From the headings of these messages, it seems they were sent between
17th and 20th August 2002. However, you should note that this present
message is the first we have sent since 14th August. Therefore, the
infected messages cannot originate from our computers.
This morning, I checked our machines with TREND-MICRO (an anti-virus
on-line which you can find at this address:
http//housecall.antivirus.com.) All seems to be clean! Research made at
the Symantec site (Norton Antivirus) informs us that this virus (active
since January, and reactivated after 23rd July), copies the e-mail
addresses in an infected computer, and uses them as a dispatcher. (See
below notice from Symantec).
Unfortunately, we have no means of knowing who sends these infected
messages and we are extremely concerned that somebody is using our e-mail
address in this way. Please accept our apologies for what has occurred,
but you will appreciate that in know way can we be held
responsible.
Just a word of advice -- if you have any doubts about a message, don't
open it. Rather, write to us asking for confirmation of the message, or
to send another copy of the message.
Yours sincerely,
Paolo Costantini
Director. Anb-Bia, Brussels. 21st August 2002
-------------------------------------------------------
INFORMATIONS TROUVEES CHEZ SYMANTEC NORTON ANTIVIRUS
INFORMATION FOUND TO SYMANTEC NORTON ANTIVIRUS
ABOUT <W32.Klez.E@mm >
Discovered on: January 17, 2002
Last Updated on: July 23, 2002 07:56:18 AM PDT
The worm copies itself to local, mapped, and network drives as:
A random file name with a double extension. For example,
filename.txt.exe.
A .rar archive with a double extension. For example,
filename.txt.rar.
In addition, the worm searches the Windows address book, the ICQ
database, and local files (such as .html and text files) for email
addresses. The worm sends an email message to these addresses with itself
as an attachment. The worm contains its own SMTP engine and attempts to
guess at available SMTP servers.
The subject line, message bodies, and attachment file names are random.
The from address is randomly chosen from email addresses that the worm
finds on the infected computer.
NOTES:
Because this worm does use a randomly chosen address that it finds on an
infected computer as the "From:" address, numerous cases have
been reported in which users of uninfected computers receive complaints
that they have sent an infected message to someone else.
For example, Linda Anderson is using a computer that is infected with
W32.Klez.E@mm; Linda is not using a antivirus program or does not have
current virus definitions. When W32.Klez.E@mm performs its emailing
routine, it finds the email address of Harold Logan. It inserts Harold's
email address into the "From:" line of an infected email that
it then sends to Janet Bishop. Janet then contacts Harold and complains
that he sent her infected email, but when Harold scans his computer,
Norton AntiVirus does not find anything--as would be expected--because
his computer is not infected.
There have been several reports that, in some cases, if you receive a
message that the virus has sent using its own SMTP engine, the message
appears to be a "postmaster bounce message" from your own
domain. For example, if your email address is jsmith@anyplace.com, you
could receive a message that appears to be from postmaster@anyplace.com,
indicating that you attempted to send email and the attempt failed. If
this is the false message that is sent by the virus, the attachment
includes the virus itself. Of course, such attachments should not be
opened.
(From:
http://securityresponse.symantec.com/avcenter/venc/data/w32.klez.e@mm.html)