[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[RT] Fwd: Trend Virus Report - January 2001 Issue # 3



PureBytes Links

Trading Reference Links

Some may find this interesting due to the current concerns expressed on the 
list.  I'll post further updates as I receive them if the members wish.

Bob


>From: "Trend Virus Info" <webinfo@xxxxxxxxxxxxxx>
>To: <bobskc@xxxxxxxxxxxx>
>Subject: Trend Virus Report - January 2001 Issue # 3
>Date: Fri, 19 Jan 2001 12:12:32 -0800
>###trendmail###: 163776__________86
>
>V I R U S      R E P O R T
>
>(by the Trend Micro US Virus Research Group)
>************************************************************************
>------------------------------------------------------------------------
>Date: 01.19.2001     Issue Number: 01/03
>------------------------------------------------------------------------
>
>To read an HTML version of this newsletter, go to:
>http://www.antivirus.com/trendsetter/virus_report/
>
>If you're a corporate user and want to assess your virus protection,
>check out Trend's Virus Risk Assessment website at:
>http://www.antivirus.com/free_tools/edoctor/
>
>Issue Preview:
>
>1. TREND UPDATES: Pattern File and Scan Engine Update
>2. ELF_Ramen (New worm targeting Linux Redhat)
>3. 10 Most Prevalent In-the-Wild Malware Surveyed by Trend US
>4. Top 10 Viruses Trend US Customers are Most Concerned About
>5. W97M_ASSILEM.B (a.k.a. W97M/Melissa.W)
>6. VBS_DAVINIA.A: Setting the Record Straight
>7. IS YOUR EXCHANGE SERVER VULNERABLE TO VIRUSES?
>
>NOTE: Long URLs may break into two lines in some mail readers.
>Cut and paste, should this occur.
>
>************************************************************************
>
>
>1. TREND UPDATES: Scan Engine and Pattern File Updates
>------------------------------------------------------------------------
>PATTERN FILE: 836 http://www.antivirus.com/download/pattern.asp
>SCAN ENGINE:  5.210 http://www.antivirus.com/download/engines/
>
>
>2. ELF_RAMEN (New worm targeting Linux Redhat)
>------------------------------------------------------------------------
>ELF_RAMEN is a new Linux worm, which was recently reported to us.
>While Trend Micro has not received any reports from infected Linux
>users, CERT issued a security warning on January 18th:
>http://www.cert.org/incident_notes/IN-2001-01.html
>
>Once infected with this worm, ELF_RAMEN will replace existing
>"index.html" files and try to spread itself to other vulnerable
>Linux RedHat 6.2 and 7.0 systems.
>For additional information about ELF_RAMEN, please refer to our website
>at:
>http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=ELF_RAMEN
>
>ELF_RAMEN is detected with Trend pattern #836 and above.
>
>
>3. 10 Most Prevalent In-The-Wild Malware Surveyed by Trend US
>(week of: 01/08/2001 to 01/14/2001)
>------------------------------------------------------------------------
>1.  TROJ_MTX
>2.  VBS_KAKWORM.A
>3.  TROJ_HYBRIS.B
>4.  JS_SEEKER.A
>5.  TROJ_NAVIDAD.E
>6.  TROJ_HYBRIS.A
>7.  TROJ_NAVIDAD.A
>8.  TROJ_BYMER
>9.  JOKE_SMALLPEN
>10. TROJ_SKA
>
>Trend Micro also offers the first real-time World Virus Tracking Center,
>which shows the regional distribution of viruses worldwide during the
>past 24 hours, past 7 days, and past 30 days. The World Virus Tracking
>Center can be accessed at: http://wtc.trendmicro.com/wtc/
>
>4. Top 10 Viruses Trend US Customers are Most Concerned About
>    (where systems were not infected)
>------------------------------------------------------------------------
>1.  VBS_KAKWORM.A
>2.  TROJ_HYBRIS.B
>3.  JS_SEEKER.A
>4.  JS_SEEKER.B
>5.  VBS_NETLOG.WORM
>6.  VBS_MCON.C
>7.  W97M_ETHAN
>8.  VBS_TQLL.A
>9.  VBS_LOVELETTER
>10. TROJ_MTX
>
>
>5. W97M_ASSILEM.B (a.k.a. W97M/Melissa.W)
>------------------------------------------------------------------------
>W97M_ASSILEM.B is an old variant of Melissa, which was recently
>found and spread in a Microsoft Office 2001 for Macintosh document
>(Filename: aniv.doc; though this may vary).
>Similar to other Melissa variants, this virus mass-mails itself
>to the first 50 users found in the Microsoft Outlook address book.
>This old Melissa variant also contains a payload, which activates
>when the current system day is equal to the current system time (minute
>field). If this is true, the following text is added to the active document:
>
>"Twenty-two points, plus triple-word-score, plus fifty points for
>using all my letters. Game's over. I'm outta here."
>
>For additional information about this Melissa variant, please refer to:
>http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=W97M_ASSILEM.B
>
>W97M_Assilem.B is detected and removed with Trend engine 5.220 and Trend
>pattern #836 and above. Trend Scan Engine 5.220 is not yet released, but 
>is available
>upon request to Virus_Doctor@xxxxxxxxxxxxxxx
>
>
>6. VBS_DAVINIA.A: Setting the Record Straight
>------------------------------------------------------------------------
>VBS_DAVINIA.A is a new Visual Basic Script worm, which was recently
>hyped by another antivirus vendor. Since its initial discovery, no Trend
>Micro customer has been infected with this worm.
>In this regard, VBS_DAVINIA was never the "next Loveletter" virus,
>as it was hyped by another company.
>
>To read additional information about VBS_DAVINIA, please refer to:
>http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=VBS_DAVINIA.A
>
>VBS_DAVINIA.A is detected and removed with Trend pattern #834 and above.
>
>
>7. IS YOUR EXCHANGE SERVER VULNERABLE TO VIRUSES?
>------------------------------------------------------------------------
>If you don't have Trend ScanMail for Exchange, it is. ScanMail provides 
>you with the best antivirus solution for Exchange Servers and if you don't 
>believe us, ask Microsoft. ScanMail won the "Best Tool or Utility" award 
>at MEC 2000. Download a FREE 30-day trial copy of ScanMail for Exchange 
>and find out why it is the best.
>DOWNLOAD NOW AT
>http://www.antivirus.com/banners/tracking.asp?si=63&bi=127&ul=http://www.antivirus.com/products/smex
>
>************************************************************************
>You are receiving this email from Trend Micro, because you have either 
>downloaded a Trend product or have signed up for our "Weekly Virus 
>Report." If you would like to change the way you receive email from Trend, 
>please make changes in your account page at 
>http://www.antivirus.com/subscriptions/default.asp?email=bobskc@xxxxxxxxxxxx.
>
>For questions regarding viruses, please contact the Virus Doctor at 
>Virus_Doctor@xxxxxxxxxxxxxx
>
>For questions regarding products, please contact Tech Support at 
>support@xxxxxxxxxxxxxx
>
>For questions, comments and suggestions about the Weekly Virus Report 
>please contact our editor at Newsletters@xxxxxxxxxxxxxxx
>************************************************************************


To unsubscribe from this group, send an email to:
realtraders-unsubscribe@xxxxxxxxxxx