W32/Sobig-F

Discussion in 'malware problems & news' started by FanJ, Aug 19, 2003.

Thread Status:
Not open for further replies.
  1. FanJ

    FanJ Guest

    W32/Sobig-F

    Aliases :
    I-Worm.Sobig.f, W32/Sobig.F-mm

    Type :
    Win32 worm

    Description
    W32/Sobig-F is a worm that spreads via email and network shares.

    W32/Sobig-F copies itself to the Windows folder as winppr32.exe and sets one of the following registry entries:

    HKLM\Software\Microsoft\Windows\CurrentVersion\Run\TrayX
    = <Windows folder>\winppr32.exe /sinc

    HKCU\Software\Microsoft\Windows\CurrentVersion\Run\TrayX
    = <Windows folder<\winppr32.exe /sinc

    The worm sends itself as an attachment to email addresses collected from various files on the victim's computer.


    Read more:
    http://www.sophos.com/virusinfo/analyses/w32sobigf.html
     
  2. FanJ

    FanJ Guest

    TrendLabs received numerous infection reports of a new malware spreading
    in Norway and Spain. This malware is detected as WORM_SOBIG.F. As of 5:11 AM US Pacific Time, Trend has declared a Yellow Alert to control the spread of this malware.

    This worm is designed to propagate via e-mail using its own Simple Mail Transfer Protocol (SMTP) engine.

    Read more:
    http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SOBIG.F
     
  3. Zhen-Xjell

    Zhen-Xjell Security Expert

    Joined:
    Feb 8, 2002
    Posts:
    1,397
    Location:
    Ohio
    http://www.nukecops.com/article-518-nested-0-0.html

    I myself received several hundred of these in a matter of hours today. Needless to say I have the listed email addresses DNSBL.
     
  4. FanJ

    FanJ Guest

    SOBIG-F DISINFECTION TOOL AVAILABLE FROM SOPHOS


    Sophos researchers have developed a standalone tool
    which detects and disinfects the commonly encountered
    W32/Sobig-F worm.

    Sophos originally issued protection against the
    W32/Sobig-F worm at 10:37 GMT on Tuesday 19 August.
    This utility provides a simple way for businesses
    and home users to confirm their networks are clean
    and disinfect any infected files that are found.

    You can download the disinfection tool and documentation
    from Sophos's website at:

    Note by FanJ: a direct download link follows now:

    http://www.sophos.com/misc/sobigsfx.exe


    You can read more about the Sobig-F worm on
    Sophos's website at the following urls:

    http://www.sophos.com/virusinfo/articles/sobigf.html
    http://www.sophos.com/virusinfo/analyses/w32sobigf.html
     
  5. AplusWebMaster

    AplusWebMaster Registered Member

    Joined:
    Jun 14, 2003
    Posts:
    239
    Location:
    Philadelphia, PA, USA
    :( FYI...spreading "faster than the speed of thought":

    - Postini blocks over 1.8 million instances of Sobig.F in One Day ...
    http://www.postini.com/press/pr/pr082003b.html
    August 20, 2003
    "140,000 Percent Increase over Previous Day's Activity
    - Postini...quarantined 1,881,689 instances of the Sobig.F email virus for its customers yesterday and expects to block more than 3 million instances today. The Sobig.F has quickly become one of the most virulent email strains ever seen..."

    -EDIT/ADD:
    :( FYI...from the Internet Storm Center:

    ...Sobig F...
    http://isc.sans.org/diary.html?date=2003-08-20
    "...Despite the best efforts of system admins world wide, users are still clicking on e-mail attachments. We strongly recommend attachment stripping on mail gateways. Please note, that the 'From' address is spoofed. Do not send auto replies to senders, as this will just worsen the email flood caused by Sobig F. As other Sobig variants, this one includes the ability to update the worm remotely, backdoors and a full set of other evilness..."
     
  6. AplusWebMaster

    AplusWebMaster Registered Member

    Joined:
    Jun 14, 2003
    Posts:
    239
    Location:
    Philadelphia, PA, USA
    The Race to beat Sobig
    August 22, 2003, 9:02 AM PT
    http://news.com.com/2100-1002-5067078.html?tag=sas_email
    "Computer security experts raced to beat the clock Friday as the super-potent Sobig.F e-mail virus threatened to unleash a crippling barrage of data across the Internet...Security experts discovered only late on Thursday that the Sobig.F virus...was harboring a sinister secret. Hidden within the virus is an instruction to the infected machines to make contact at 12 p.m. PDT with the 20 computers, which host an unidentified program...The time trigger is set to be activated again at the same time on Sunday, Aug. 24. The search for the owners of the 20 machines--to get them to disconnect before the deadline--has had some success. 'We've taken more than half offline,' said Mikko Hypponen, antivirus research manager at Finland's F-Secure. 'But if one is left standing, there will be an attack.'..."
     
  7. AplusWebMaster

    AplusWebMaster Registered Member

    Joined:
    Jun 14, 2003
    Posts:
    239
    Location:
    Philadelphia, PA, USA
    ;) Per monitor of F-Secure:
    http://www.f-secure.com/v-descs/sobig_f.shtml
    "...Update on 22:00 UTC
    - The official attack time on Friday has ended. All 20 machines were inaccessible throughout the attack.
    - Now we are investigating random UDP traffic that has been seen in the net, possibly relating to the worm..."
     
  8. AplusWebMaster

    AplusWebMaster Registered Member

    Joined:
    Jun 14, 2003
    Posts:
    239
    Location:
    Philadelphia, PA, USA
    E-mail worm on a rampage
    http://www.bayarea.com/mld/mercurynews/news/6592028.htm?template=contentModules/printstory.jsp
    Aug. 22, 2003
    "...Postini blocked 3.5 million infected e-mails from reaching the mail servers of its 1,500 customers Wednesday, up from 1.8 million Tuesday, and was on track to block about 5 million Thursday. A normal daily average is about 400,000..."

    SoBig F to try again Sunday
    http://www.vnunet.com/News/1143169
    "...Paul Wood, chief information analyst at email security specialists MessageLabs, said: "We've blocked well over two million infections in the past 48 hours, and this is likely to hit three million by the end of the week and more over the weekend. 'The fact that antivirus vendors didn't have signatures available for 12 hours after the first sighting means it had a real headstart.' This is the sixth variant on the SoBig worm, which first surfaced in January of this year..."

    Don't lose your head in security madness
    http://www.vnunet.com/Print/1143112
    "...Selling security is far from easy. You need to really understand the nature of the threat and the cost to the business, as well as design a solution that protects the end-user from today's and tomorrow's security risks. It takes years to do this well..."
     
  9. AplusWebMaster

    AplusWebMaster Registered Member

    Joined:
    Jun 14, 2003
    Posts:
    239
    Location:
    Philadelphia, PA, USA
    :mad: FYI...

    Worm...hitting hard
    http://news.com.com/2100-1002-5066875.html?tag=nl
    "...America Online said it scanned 40 million e-mail attachments on Wednesday--about four times the average daily volume--and found more than 23 million copies of the Sobig.F virus..."
    ->>> MSBlast and its variants, and the Sobig.F virus, have disrupted several companies, including those responsible for critical parts of the United States' infrastructure.
    - Defense contractor Lockheed Martin had less than 1 percent of its systems infected, but still had disruptions.
    - The Massachusetts Institute of Technology found its e-mail servers congested from the amount of messages created.
    - Railway and freight hauler CSX had to stop trains because of the Nachi worm, the Associated Press reported.
    - Airline Air Canada canceled flights on Tuesday because its network couldn't deal with the amount of traffic generated by the Nachi worm.
    - The Pentagon and military had myriad infections of the Sobig.F virus and the Nachi worm, various news agencies reported..."
     
  10. CrazyM

    CrazyM Firewall Expert

    Joined:
    Feb 9, 2002
    Posts:
    2,428
    Location:
    BC, Canada
    Saturday, August 23, 2003
    'Sobig' virus traced to Canadian computer

    http://canada.com/national/story.asp?id=F5CD01CE-D66F-4DDD-AA65-DEB7F30F45C3

    "Meanwhile, the FBI yesterday served a grand jury subpoena on Easynews.com, a Phoenix-based Internet service provider whose network may have been used to disseminate Sobig. The virus is believed to have been released onto Usenet, a kind of Internet bulletin board, by someone with an account at the service provider, according to Michael Minor, the company's co-owner. A stolen credit card number was used to create the account minutes before the virus was unleashed on Monday, Minor said. His company is co-operating with the FBI, he added.

    A computer in British Columbia was apparently used to create the account. Experts said the computer belongs to an innocent home user who was hit by a previous version of the virus that allowed the clandestine programmer to seize control of the computer. That makes catching the writer of the virus more difficult, experts said."

    Regards,

    CrazyM
     
  11. AplusWebMaster

    AplusWebMaster Registered Member

    Joined:
    Jun 14, 2003
    Posts:
    239
    Location:
    Philadelphia, PA, USA
    o_O But then, I saw this story yesterday:

    War of the Worms
    Sunday August 24, 2003
    http://observer.guardian.co.uk/focus/story/0,6903,1028370,00.html
    "The hunt is on. Teams of FBI experts are poring through computer databases in the United States...He is a virus writer...It was called SoBig F, and it lived up to its name...by the end of the week one in 15 emails across the entire world was coming from the virus...
    - FBI and anti-virus computer sources confirmed that the author was an American and almost certainly a man. They have also determined that his virus shares some of the characteristics popular with spammers. As most spammers live in Florida, that could place the virus writer...perhaps near the town of Boca Raton, the unofficial spam capital of the world..."


    Hmmm, who knows? Doesn't sound like the FBI does, yet.
     
  12. AplusWebMaster

    AplusWebMaster Registered Member

    Joined:
    Jun 14, 2003
    Posts:
    239
    Location:
    Philadelphia, PA, USA
    :( If you've noticed your firewall log bulge lately, this is probably why:
    - FYI...update from the Internet Storm Center:

    Sobig-F and Nachia update
    August 26th 2003
    http://isc.sans.org/diary.html?date=2003-08-26
    "...
    - Sobig-F
    Sobig-F went through two update cycles...Most updates servers were taken down, and the remaining server handed out a benign payload...Administrators of mail servers are asked not to bounce infected messages. Sobig will fake the "From" header and notification messages will flood innocent users...
    - Nachia
    Nachia continues to flood networks with ICMP messages and port 135 scans. Based on our measurements, the number of hosts infected by Nachia and MSBlaster is not decreasing...at around 150,000. Network administrators are strongly advised to track down infected machines..."
     
  13. AplusWebMaster

    AplusWebMaster Registered Member

    Joined:
    Jun 14, 2003
    Posts:
    239
    Location:
    Philadelphia, PA, USA
    ;) ...Sobig is bad for privacy and AV vendors
    http://www.theregister.com/content/56/32510.html
    Aug 27 2003
    "...The speed at which viruses take hold is outpacing the capacity of AV firms to develop fixes for users to deploy them. The critical path has gone critical...In defending against the worm, the Internet community may have to move towards a new defensive posture. More of the same just won't do...AV vendors have mined a rich seam of free publicity on the back of Sobig and Blaster. They say you must deploy and update AV tools to protect yourselves against the worm. Enterprises should consider blocking executables at the gateway, they add. It's a familiar theme and it's wearing thin...Symantec, McAfee, Sophos and the rest would do well to look over their shoulder. Behaviour blocking technology - which is able to stop malicious code executing on the desktop - could supplant AV tools as the first line of defence against viral code..."
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.