Achtung neuer Microsoft Fake unterwegs !!!

Beiträge: 6
Zugriffe: 478 / Heute: 1
Zick-Zock:

Achtung neuer Microsoft Fake unterwegs !!!

 
09.03.02 19:22
From
securityresponse.symantec.com/avcenter/...ata/w32.gibe@mm.html

The fake message, which is not from Microsoft, has the following
characteristics:

From: Microsoft Corporation Security Center
Subject: Internet Security Update
Message:
Microsoft Customer,
this is the latest version of security update, the update which eliminates
all known security vulnerabilities affecting Internet Explorer and MS
Outlook/Express as well as six new vulnerabilities
.
.
.
How to install
Run attached file q216309.exe
How to use
You don't need to do anything after installing this item.
.
.
.
Attachment: Q216309.exe

The attached file, Q216309.exe, is written in Visual Basic; it contains
other worm components inside itself. When the attached file is executed, it
does the following:

It creates the following files:

 a.. \Windows\Q216309.exe (122,880 bytes). This is the whole package
containing the worm.
 b.. \Windows\Vtnmsccd.dll (122,880 bytes). This file is the same as
Q216309.exe.
 c.. \Windows\BcTool.exe (32,768 bytes). This is the worm component that
spreads using Microsoft Outlook and SMTP.
 d.. \Windows\GfxAcc.exe (20,480 bytes). This is the Backdoor Trojan
component of the worm that opens port 12378.
 e.. \Windows\02_N803.dat (size varies). This is the data file that the
worm creates to store email addresses that it finds.
 f.. \Windows\WinNetw.exe (20,480 bytes). This is the component that
searches for email addresses and writes them to 02_N803.dat.

NOTE: Norton AntiVirus detects all of these files as W32.Gibe@mm except the
02_N803.dat. file, which contains only data.

Next, the worm then adds the following values:

LoadDBackUp C:\Windows\BcTool.exe
3Dfx Acc C:\Windows\GFXACC.exe

to the registry key

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

The worm also creates the key

HKEY_LOCAL_MACHINE\Software\AVTech\Settings

and adds the following values to that key:

Installed ... by Begbie
Default Address
Default Server

Finally, BcTool.exe attempts to send the \Windows\Q216309.exe file to email
addresses in the Microsoft Outlook address book, and to addresses that it
found in .htm, .html, .asp, and .php files and wrote to the 02_N803.dat
file.


Removal instructions:

Delete files that are detected as W32.Gibe@mm, delete the 02_N803.dat file,
and remove the key and values that the worm added to the registry.

To remove this Trojan:

 1. Obtain the most recent virus definitions. There are two ways to do
this:
   a.. Run LiveUpdate. LiveUpdate is the easiest way to obtain virus
definitions. These virus definitions have undergone full quality assurance
testing by Symantec Security Response and are posted to the LiveUpdate
servers one time each week (usually Wednesdays) unless there is a major
virus outbreak. To determine whether definitions for this threat are
available by LiveUpdate, look at the Virus Definitions (LiveUpdate) line at
the top of this write-up.
   b.. Download the definitions using the Intelligent Updater. Intelligent
Updater virus definitions have undergone full quality assurance testing by
Symantec Security Response. They are posted on U.S. business days (Monday
through Friday). They must be downloaded from the Symantec Security Response
Web site and installed manually. To determine whether definitions for this
threat are available by the Intelligent Updater, look at the Virus
Definitions (Intelligent Updater) line at the top of this write-up.

   Intelligent Updater virus definitions are available here. For detailed
instructions on how to download and install the Intelligent Updater virus
definitions from the Symantec Security Response Web site, click here.

 2. Start Norton AntiVirus (NAV), and make sure that NAV is configured to
scan all files. For instructions on how to do this, read the document How to
configure Norton AntiVirus to scan all files.
 3. Run a full system scan.
 4. Delete all files that are detected as W32.Gibe@mm.
 5. Using Windows Explorer, delete the \Windows\02_N803.dat file.

To edit the registry:

CAUTION: We strongly recommend that you back up the registry before you make
any changes to it. Incorrect changes to the registry can result in permanent
data loss or corrupted files. Modify only the keys that are specified. Read
the document How to back up the Windows registry for instructions.

 1. Click Start, and click Run. The Run dialog box appears.
 2. Type regedit and then click OK. The Registry Editor opens.
 3. Navigate to the key

 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

 4. In the right pane, delete the following values:

 LoadDBackUp C:\Windows\BcTool.exe
 3Dfx Acc C:\Windows\GFXACC.exe

 5. Navigate to and delete the key

 HKEY_LOCAL_MACHINE\Software\AVTech

 6. Click Registry, and click Exit.

--
(DISCLAIMER:  The preceding message reflects the opinion of only 1 out of
billions of Internet and Newsgroup users.  It does not reflect the opinions
of any businesses, clubs, organizations, religious groups, unions,
associations, companies, people, or small farm animals.)
Joshua_XP:

sachen gibts, die gibts gar ned. Was bitte ist

 
09.03.02 21:14


daran neu? Checke es nicht, erklärs mir mal bitte.

Achtung neuer Microsoft Fake unterwegs !!! 603465Achtung neuer Microsoft Fake unterwegs !!! 603465
Joshua_XP





Zick-Zock:

na dann...

 
09.03.02 21:50
führ mal die .exe aus, wenn sie dir angeblich microsoft mal schickt. viel spass

voll? les es montag nochmal! ;)
Joshua_XP:

das teil hab ich bereits vor 4 Monaten gesehen

 
09.03.02 22:15
Direkt auf meiner Drive, komisch, sieht aus wie meiner, aber der is ja vom Boss. Hicks.




Achtung neuer Microsoft Fake unterwegs !!! 603479Achtung neuer Microsoft Fake unterwegs !!! 603479
Joshua_XP





Zick-Zock:

usenet eintrag von heute

 
10.03.02 22:08
nachzulesen im usenet unter "microsoft.public.de.allgemein"

Hallo miteinander,

vorgestern erhielten etliche Internetbenutzer - so auch ich - eine eMail,
die angeblich von MS stammte, aber in Wirklichkeit nur ein Fake mit dem
Wurm-Anhang "q216309.exe" ist (das Ding soll inzwischen den Namen "Gibe"
besitzen).

AUF KEINEN FALL SOLCHERLEI ANHÄNGE ANKLICKEN / STARTEN!

Auch die Replay-Adresse rdquest12@microsoft.com ist ein Fake.

In der Newsgroup  (danam) wurde zu diesem Vorgang
folgender Link zur Hintergrundinfo gegeben:

www.heise.de./newsticker/data/pab-06.03.02-000/

Besim Karadeniz wies am 08.03.2002 in "danam" noch auf Folgendes hin:

------
Von Microsoft selbst gibt es für die Öffentlichkeit nur das sogenannte
"Microsoft Security Bulletin", welches vom "Microsoft Security Response
Center " kommt und niemals Patches enthält.
Das Ding enthält zusätzlich eine PGP-Signatur
------

Das werden ja "tolle" Zeiten für Computer- / Internetanfänger, wenn jetzt
solche Methoden um sich greifen! :-(((

An wen kann man sich als MS-Kunde in solchen Fällen eigentlich wenden?

Hilft dem MS-Support bzw. der MS-Abuse-Abteilung das Einsenden der
betreffenden eMail-Header?

In der Hoffnung, dass MS _alles_ daran setzt solchen Missbrauch des
Firmennamens zu unterbinden und die Kunden im Rahmen der Möglichkeiten zu
schützen,


Thomas Nolte
--
E-Post:    info@t-nolte.de oder TNolte@web.de
Leitseite: www.t-nolte.de


...soviel zu josh´s seit 4 monaten bekannten eintrag. *hicks*

*lol*
Zick-Zock:

up

 
11.03.02 09:00
Es gibt keine neuen Beiträge.


Börsen-Forum - Gesamtforum - Antwort einfügen - zum ersten Beitrag springen
--button_text--