Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Malware :: al200101.txt

AusCERT Alert 2001.01 AnnaKournikova.jpg.vbs (Onthefly) Worm




-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
A  U  S  C  E  R  T                                           A  L  E  R  T
                                      
                        AL-2001.01  --  AUSCERT ALERT
                   AnnaKournikova.jpg.vbs (Onthefly) Worm
                              13 February 2001

===========================================================================

PROBLEM:  

	AusCERT has received information about a new virus known as the
	Onthefly worm. This worm has been reported from several sources
	within a very short period of time, indicating that it may be
	propagating rapidly.

	The worm is received via email in the form of an attachment named
	"AnnaKournikova.jpg.vbs". The email message has the subject line:
		
		Here you have, ;o)

	The body of the email will contain the message:

		Hi:
		Check This!

	Executing the worm by attempting to open the attachment will cause
	this VBS file to be copied (as AnnaKournikova.jpg.vbs) to the
	Windows directory and then resent, as an email attachment, to all
	recipients in all address books, updating the system registry as
	it does so to ensure this action is only taken once. The worm will
	also attempt to open the web browser and connect to a web site in
	the Netherlands on January 26, but this action appears to be
	benign.


IMPACT:   

	The worm is non-destructive at this stage, it appears to be
	designed for propagation only. Minor alterations are made to the
	Windows registry for worm version information and for the addition
	of a flag to prevent a repeat of the mailout.


RECOMMENDATIONS: 

	A. User Education

	System Administrators are urged to inform their users about proper
	precautions with regards to handling email attachments.

	AusCERT recommends that sites should update and check their virus
	defences and either delete or do not open any email messages or
	attachments that resemble those described above or in the following
	links.

	B. E-Mail Security Update

	System administrators and users employing Microsoft Outlook 98/2000
	may wish to install the Outlook Security Update available from 

	  http://www.microsoft.com/office/outlook/downloads/security.htm

	The White Paper "Outlook 98/2000 E-Mail Security Update"
	explains:

	"Many damaging viruses, such as the ILOVEYOU virus, spread
	by automatically e-mailing themselves to multiple recipients
	in a user's Global Address Book. The only way to prevent
	viruses from automatically propagating is to block programmatic
	access to the features in Outlook that viruses use to spread
	themselves. The security update blocks programmatic access
	to the Send capabilities and to all e-mail address information
	stored in Outlook, including the Contacts folder, Personal
	Address Book, address fields in Outlook forms such as the
	To: field, and the Global Address Book. This protects
	Outlook users from viruses that collect e-mail addresses
	and send themselves out to those addresses."

	This document is available at:

	  http://office.microsoft.com/2000/downloaddetails/Out2ksec.htm

	C. Update Anti-Virus Packages

	System administrators and users are urged to ensure that the latest
	Anti-Virus software is installed and that it is using the most
	current up-to-date virus databases.

	More information can be found at:

	  http://www.europe.f-secure.com/v-descs/onthefly.shtml
	  http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=VBS_KALAMAR.A
	  http://www.sophos.com/virusinfo/analyses/vbsssta.html
	  http://www.symantec.com/avcenter/venc/data/vbs.sst@mm.html

	AusCERT is continuing to monitor this problem. 


- ---------------------------------------------------------------------------
For more information contact your Anti-Virus software vendor.
- ---------------------------------------------------------------------------

[AusCERT issues an alert when the risk posed by a vulnerability that may
not have been thoroughly investigated and for which a work-around or fix
may not yet have been developed requires notification.]

The AusCERT team has made every effort to ensure that the information
contained in this document is accurate at the time of publication. However,
the decision to use the information described is the responsibility of
each user or organisation.  The appropriateness of this document for an
organisation or individual system should be considered before application
in conjunction with local policies and procedures.  AusCERT takes no
responsibility for the consequences of applying the contents of this
document.

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

AusCERT maintains an anonymous FTP service which is found on:
ftp://ftp.auscert.org.au/pub/.  This archive contains past SERT
and AusCERT Advisories, and other computer security information.

AusCERT maintains a World Wide Web service which is found on:
http://www.auscert.org.au/.

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business
		hours which are GMT+10:00 (AEST).  On call
		after hours for emergencies.
						       
Postal:
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld  4072
AUSTRALIA
===========================================================================

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBOolp/Sh9+71yA2DNAQHwUwP/b2CwJgvevF2NMCamgLtUsNm38EBlUnkG
2dLw0xQIfb0RJuR4AMERdD7I0qNaPQRDCNKrESabqBDYljj/c3ss/5gD/eFr3DC3
OTso/m1JI+EbsCVPZqSilMrOLGRetRg73WH92IaCsvkXiOMI+mL76S2QWqaWo7lJ
3BZy466/e6U=
=Sbwn
-----END PGP SIGNATURE-----


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH