[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <073301c3ef61$20c0fa90$c400a8c0@MLANDE>
Date: Mon, 9 Feb 2004 18:04:53 -0500
From: "Mary Landesman" <mlande@...lsouth.net>
To: "K-OTiK Security" <Special-Alerts@...tik.com>,
<bugtraq@...urityfocus.com>
Subject: Re: Outbreak warning: possibly Mydoom.C (Now Deadhat/Vesser)
Actually, it's not Vesser either. Gadi is referring to Doomjuice, a.k.a.
MyDoom.C.
See:
http://www.lurhq.com/mydoom-c.html
http://antivirus.about.com/cs/allabout/a/doomjuice.htm
http://www.f-secure.com/v-descs/doomjuice.shtml
and for its impact on Microsoft, see:
http://www.f-secure.com/weblog/
-- Mary
----- Original Message -----
From: "K-OTiK Security" <Special-Alerts@...tik.com>
To: <bugtraq@...urityfocus.com>
Sent: Monday, February 09, 2004 1:01 PM
Subject: Re: Outbreak warning: possibly Mydoom.C (Now Deadhat/Vesser)
In-Reply-To: <4027B328.4050305@...tistical.reprehensible.net>
it's not mydoom.c - his name is Vesser (W32.HLLW.Deadhat) :
Vesser mainly targets computers that have previously been infected with the
Mydoom.A or Mydoom.B worms. Vesser scans for the backdoors in those worms on
IP addresses. While doing that it connects to TCP ports 1080. 3127 and 3128
and tries to copy itself there in a specially-crafted package.
http://www.f-secure.com/v-descs/vesser.shtml
http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.deadhat.html
Regards.
C. Bekrar - Security Consultant
K-OTik Security (France)
http://www.k-otik.com
>Date: Mon, 09 Feb 2004 18:19:52 +0200
>From: Gadi Evron <ge@...tistical.reprehensible.net>
>To: bugtraq@...urityfocus.com
>Subject: Outbreak warning: possibly Mydoom.C
>
>Uses the Mydoom backdoor to upload itself (over Mydoom ports).
>
>Seeded over the weekend, it is out now and spreads fast.
>
>Blocking: block Mydoom ports.
>
> Gadi Evron.
>
>
Powered by blists - more mailing lists