Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Virus Advisory: McAfee AVERT Places Medium Risk Assessment on New W32/Bagle.j@MM Virus

  • 03 March, 2004 14:27

<p>For further information or comment, please contact Allan Bell directly on the details below:</p>
<p>Allan Bell - Marketing Director, Network Associates 0412 411 929 or 02 9761 4229.</p>
<p>Mass Mailer W32/Bagle.j@MM Placed at Medium Based on Prevalence</p>
<p>SYDNEY, March 3 - Network Associates, the leading provider of intrusion prevention solutions, today announced that McAfee AVERT (Anti-Virus and Vulnerability Emergency Response Team), the world-class anti-virus research division of Network Associates, placed a medium risk assessment on the recently discovered W32/Bagle.j@MM, also known as Bagle.j. This new variant is a mass-mailing worm that constructs outgoing messages that have an .EXE, .PIF or password protected .ZIP file. The worm has many of the same functionalities as its Bagle predecessors - three members of which are also currently rated a medium risk. McAfee AVERT researchers first saw the worm earlier today and to date, have received dozens of samples of Bagle.j from customer submissions and from the virus, which can generate its own email.</p>
<p>Most of the Bagle.j samples that McAfee AVERT has seen are from the virus itself, which uses a common spoofing process, and not from the infected customers. This has been the case with the three most prevalent viruses at the moment, which include the Mydoom, Bagle and Netsky families. McAfee AVERT is advising its customers to update to the 4332 DATs to stay protected from all the current Bagle threats. As a note McAfee AVERT has added detection in the 4332 DATs for the Mydoom.g variant, which AVERT has reportedly been seen "in the wild." This variant of Mydoom is currently rated a low risk, but AVERT is tracking its progression. Details on this low risk threat can be found at: http://vil.nai.com/vil/content/v_101072.htm .</p>
<p>Symptoms</p>
<p>The Bagle.j worm is an Internet mass mailer that harvests addresses from local files and then uses the harvested addresses in the 'From' field to sends itself. The next recipient is thus unable to see the true sender. The worm then proceeds into the remote access component of the virus, which listens on TCP port 2745 for remote connections. Users should delete any email containing the following:</p>
<p>From: (address is spoofed)</p>
<p>Subject:</p>
<p>-- E-mail account security warning.</p>
<p>-- Notify about using the e-mail account.</p>
<p>-- Warning about your e-mail account.</p>
<p>-- Important notify about your e-mail account.</p>
<p>-- Email account utilization warning.</p>
<p>-- Notify about your e-mail account utilisation.</p>
<p>-- E-mail account disabling warning.</p>
<p>Body Text:</p>
<p>Greeting -</p>
<p>-- Dear user of (user's domain),</p>
<p>-- Dear user of (user's domain) gateway e-mail server,</p>
<p>-- Dear user of e-mail server "(user's domain) ",</p>
<p>-- Hello user of (user's domain) e-mail server,</p>
<p>-- Dear user of "(user's domain) " mailing system,</p>
<p>-- Dear user, the management of (user's domain) mailing system wants to
let you know that,</p>
<p>Pathology</p>
<p>After being executed, Bagle.j emails itself to addresses found on the infected host as an .EXE, .PIF or password protected .ZIP archive with the password included in the message body. The virus listens on TCP port 2745 for remote connections. It attempts to notify the author that the infected system is ready to accept commands, by contacting various websites and calling a PHP script on the remote sites. Like its predecessors, this worm checks the system date. If it is April 25, 2005 or later, the worm simply exits and does not propagate.</p>
<p>Cure</p>
<p>Immediate information and cure for this worm can be found online at the Network Associates McAfee AVERT site located at http://vil.nai.com/vil/content/v_101071.htm .</p>
<p>Network Associates McAfee(R) Protection-in-Depth(TM) Strategy delivers the industry's only complete set of system and network protection solutions differentiated by intrusion prevention technology that can detect and block these types of attacks. This allows customers to protect themselves while they plan their patch deployment strategy.</p>
<p>McAfee AVERT Labs is one of the top-ranked anti-virus and vulnerability research organizations in the world, employing more than 100 researchers in offices on five continents. McAfee AVERT protects customers by providing cures that are developed through the combined efforts of McAfee AVERT researchers and McAfee AVERT AutoImmune technology, which applies advanced heuristics, generic detection, and ActiveDAT technology to generate cures for previously undiscovered viruses.</p>
<p>About Network Associates</p>
<p>With headquarters in Santa Clara, California, Network Associates, Inc. creates best-of-breed computer security solutions that prevent intrusions on networks and protect computer systems from the next generation of blended attacks and threats. Offering two families of products, McAfee System Protection Solutions, securing desktops and servers, and McAfee Network Protection Solutions, ensuring the protection and performance of the corporate network, Network Associates offers computer security to large enterprises, governments, small and medium sized businesses, and consumers. For more information, Network Associates can be reached on the Internet at http://www.networkassociates.com/ .</p>
<p>NOTE: Network Associates, McAfee and AVERT are either registered
trademarks or trademarks of Network Associates, Inc. and/or its affiliates in the United States and/or other countries. All other registered and unregistered trademarks herein are the sole property of their respective owners.</p>
<p>##ENDS##</p>

Most Popular

Market Place