Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Virus Advisory: McAfee AVERT Raises Risk Assessment to Medium on New W32/Bagle.p@MM Virus

  • 16 March, 2004 14:31

<p>For further information or comment, please contact Allan Bell directly on the details below:</p>
<p>Allan Bell - Marketing Director, Network Associates 0412 411 929 or 02 9761 4229.</p>
<p>McAfee AVERT Researchers Raise Risk Assessment on W32/Bagle.p@MM to Medium Based on Increased Prevalence</p>
<p>SYDNEY, March 16 - Network Associates, the leading provider of intrusion prevention solutions, today announced that McAfee AVERT(Anti-Virus and Vulnerability Emergency Response Team), the world-class anti-virus and vulnerability research division of Network Associates, raised the risk assessment to medium on the recently discovered W32/Bagle.p@MM, also known as Bagle.p. This new variant is a mass-mailing worm that constructs outgoing messages with various attachments including password-protected .RAR files, with a password required to open the attachment. The worm has many of the same functionalities as its Bagle predecessors, effectively customizing each email to make it appear to be a legitimate warning notification. To date, McAfee AVERT reports close to 100 reports from the field of the virus being stopped or infecting users.</p>
<p>Most of the Bagle.p samples that McAfee AVERT has seen are from customers, which is different from the Bagle.n variant that was reported as medium risk on Saturday, March 13, 2004. Bagle.p uses a common email spoofing process.</p>
<p>However, McAfee AVERT has seen samples from the virus directly as well. This has been the case with the three most prevalent viruses at the moment, which include the Mydoom, Bagle and Netsky families.</p>
<p>Symptoms</p>
<p>The Bagle.p worm is a mass mailing polymorphic threat, which means the virus has the ability to change its signature every time it infects. The worm harvests addresses from local files and then uses the harvested addresses in the 'From' field to send itself. The worm copies itself to folders that have the phrase 'shar' in the name, such as common peer-to-peer applications. The worm then proceeds into the remote access component of the virus, which listens to TCP port 2556 for remote connections. Users should delete any email containing the following:</p>
<p>From: (the address may be spoofed, using the recipient's domain name and a user name taken from the following list, or another address found on the local system)</p>
<p>-- management@</p>
<p>-- administration@</p>
<p>-- staff@</p>
<p>-- noreply@</p>
<p>-- support@</p>
<p>-- antivirus@</p>
<p>-- antispam@</p>
<p>Subject:</p>
<p>-- Password: %s</p>
<p>-- Pass - %s</p>
<p>-- Password - %s</p>
<p>-- E-mail account security warning.</p>
<p>-- Notify about using the e-mail account.</p>
<p>-- Warning about your e-mail account.</p>
<p>-- Important notify about your e-mail account.</p>
<p>-- Email account utilization warning.</p>
<p>-- E-mail technical support message.</p>
<p>-- E-mail technical support warning.</p>
<p>-- Email report</p>
<p>-- Important notify</p>
<p>-- Account notify</p>
<p>-- E-mail warning</p>
<p>-- Notify from e-mail technical support.</p>
<p>-- Notify about your e-mail account utilization.</p>
<p>-- E-mail account disabling warning.</p>
<p>-- Re: Msg reply</p>
<p>-- Re: Hello</p>
<p>-- Re: Yahoo!</p>
<p>-- Re: Thank you!</p>
<p>-- Re: Thanks :)</p>
<p>-- RE: Text message</p>
<p>-- Re: Document</p>
<p>-- Incoming message</p>
<p>-- Re: Incoming Message</p>
<p>-- Re: Incoming Fax</p>
<p>-- Hidden message</p>
<p>-- Fax Message Received</p>
<p>-- Protected message</p>
<p>-- RE: Protected message</p>
<p>-- Forum notify</p>
<p>-- Request response</p>
<p>-- Site changes</p>
<p>-- Re: Hi</p>
<p>-- Encrypted document</p>
<p>Body text:</p>
<p>Greeting -</p>
<p>-- Dear user of %s ,</p>
<p>-- Dear user of %s e-mail server gateway,</p>
<p>-- Dear user of "%s " mailing server,</p>
<p>-- Dear user of "%s " mailing domain,</p>
<p>-- Dear user of "%s " domain,</p>
<p>-- Dear user of e-mail server "%s ",</p>
<p>-- Hello user of %s e-mail server,</p>
<p>-- Dear user of "%s " mailing system,</p>
<p>-- Dear user, the management of %s</p>
<p>(Where %s is the user's domain is chosen from the To: address. For example the user's domain for user@mail.com would be "mail.com")</p>
<p>Main body -</p>
<p>-- mailing system wants to let you know that, your e-mail account has been temporary disabled because of unauthorised access. Our main mailing server will be temporary unavailable for next two days, to continue receiving mail in these days you have to configure our free auto-forwarding service.</p>
<p>-- Your e-mail account will be disabled because of improper using in next three days, if you are still wishing to use it, please, resign your account information.</p>
<p>-- We warn you about some attacks on your e-mail account. Your computer may contain viruses, in order to keep your computer and e-mail account safe, please, follow the instructions.</p>
<p>-- Our antivirus software has detected a large amount of viruses outgoing from your email account, you may use our free anti-virus tool to clean up your computer software.</p>
<p>-- Some of our clients complained about the spam (negative e-mail content) outgoing from your e-mail account. Probably, you have been infected by a proxy-relay trojan server. In order to keep your computer safe, follow the instructions.</p>
<p>-- Read the attach.</p>
<p>-- Your file is attached.</p>
<p>-- More info in attach</p>
<p>-- See attach.</p>
<p>-- Follow the wabbit.</p>
<p>-- Find the white rabbit.</p>
<p>-- Please, have a look at the attached file.</p>
<p>-- See the attached file for details.</p>
<p>-- Message is in attach</p>
<p>-- Here is the file.</p>
<p>-- For more information see the attached file.</p>
<p>-- Further details can be obtained from attached file.</p>
<p>-- Advanced details can be found in attached file.</p>
<p>-- For details see the attach.</p>
<p>-- For details see the attached file.</p>
<p>-- For further details see the attach.</p>
<p>-- Please, read the attach for further details.</p>
<p>-- Pay attention on attached file.</p>
<p>Pathology</p>
<p>After being executed, Bagle.p emails itself to addresses found on the infected host as a .PIF, .ZIP, or .RAR file type. The virus may attach an image file to the message that contains the password to a password-protected zip file. The worm also contains an icon that it uses to disguise itself. The virus listens on TCP port 2556 for remote connections and attempts to notify the author that the infected system is ready to accept commands. Like its predecessors, this worm checks the system date. If it is December 31, 2005 or later, the worm deactivates itself by deleting its registry run key.</p>
<p>Cure</p>
<p>Immediate information and cure for this worm can be found online at the Network Associates McAfee AVERT site located at http://vil.nai.com/vil/content/v_101098.htm. McAfee AVERT is advising its customers to update to the 4338 DATs to stay protected from all the current Bagle threats.</p>
<p>Network Associates McAfee Protection-in-Depth Strategy delivers the industry's only complete set of system and network protection solutions differentiated by intrusion prevention technology that can detect and block these types of attacks. This allows customers to protect themselves while they plan their patch deployment strategy.</p>
<p>McAfee AVERT Labs is one of the top-ranked anti-virus and vulnerability research organizations in the world, employing more than 100 researchers in offices on five continents. McAfee AVERT protects customers by providing cures that are developed through the combined efforts of McAfee AVERT researchers and McAfee AVERT AutoImmune technology, which applies advanced heuristics, generic detection, and ActiveDAT technology to generate cures for previously undiscovered viruses.</p>
<p>About Network Associates</p>
<p>With headquarters in Santa Clara, California, Network Associates, Inc. creates best-of-breed computer security solutions that prevent intrusions on networks and protect computer systems from the next generation of blended attacks and threats. Offering two families of products, McAfee System Protection Solutions, securing desktops and servers, and McAfee Network Protection Solutions, ensuring the protection and performance of the corporate network, Network Associates offers computer security to large enterprises, governments, small and medium sized businesses, and consumers. For more information, Network Associates can be reached on the Internet at http://www.networkassociates.com/.</p>
<p>NOTE: Network Associates, McAfee and AVERT are either registered trademarks or trademarks of Network Associates, Inc. and/or its affiliates in the United States and/or other countries. All other registered and unregistered trademarks herein are the sole property of their respective owners.</p>
<p>##ENDS##</p>

Most Popular