FW: Virus Alert: FBI Finds 911 Virus Wiping Out Hard Drives Today

This WebDNA talk-list message is from

2000


It keeps the original formatting.
numero = 29860
interpreted = N
texte = How true is the below?APC Net, Inc. - sales@apcn.net - www.apcn.net 4471 NW 36 St. #110 - Miami Springs, FL 33166 Web Hosting,Web Design & Internet Services-----Original Message----- From: John - JTC [mailto:John@JTConsultants.com] Sent: Saturday, April 01, 2000 9:42 PM To: Vince Medina Subject: FW: Virus Alert: FBI Finds 911 Virus Wiping Out Hard Drives Today -----Original Message----- From: Derek Dickson [mailto:dickson@wo.net] Sent: Saturday, April 01, 2000 8:59 PM To: NT System Admin Issues Cc: TIDA; NT System Admin Issues; Jordan, Chris; Andrew Morrow Subject: FW: Virus Alert: FBI Finds 911 Virus Wiping Out Hard Drives Today -----Original Message----- From: The SANS Institute [mailto:sans@sans.org] Sent: Saturday, April 01, 2000 5:14 PM To: Derek Dickson (SD448143) Subject: Virus Alert: FBI Finds 911 Virus Wiping Out Hard Drives Today To: Derek Dickson (SD448143) From: The SANS Institute Research Office Subj: Malicious 911 Virus Wipes Out Hard Drives of Internet Users At 8:00 am on Saturday, April 1 (This is not an April Fool's joke!) the FBI announced it had discovered malicious code wiping out the data on hard drives and dialing 911. This is a vicious virus and needs to be stopped quickly. That can only be done through wide-scale individual action. Please forward this note to everyone who you know who might be affected.The FBI Advisory is posted at http://www.nipc.gov/nipc/advis00-038.htmThe 911 virus is the first Windows shares virus. Unlike recent viruses that propagate though eMail, the 911 virus silently jumps directly from machine to machine across the Internet by scanning for, and exploiting, open Windows shares. After successfully reproducing itself in other Internet-connected machines (to assure its continued survival) it uses the machine's modem to dial 911 and erases the local machine's hard drive. The virus is operational; victims are already reporting wiped-out hard drives. The virus was launched through AOL, AT&T, MCI, and NetZero in the Houston area. The investigation points to relatively limited distribution so far, but there are no walls in the Internet.----------------- Action 1: Defense -----------------Verify that your system and those of all your coworkers, friends, and associates are not vulnerable by verifying that file sharing is turned off.* On a Windows 95/98 system, system-wide file sharing is managed by selecting My Computer, Control Panel, Networks, and clicking on the File and Print Sharing button. For folder-by-folder controls, you can use Windows Explorer (Start, Programs, Windows Explorer) and highlight a primary folder such as My Documents and then right mouse click and select properties. There you will find a tab for sharing.* On a Windows NT, check Control Panel, Server, Shares.For an excellent way to instantly check system vulnerability, and for detailed assistance in managing Windows file sharing, see: Shields Up! A free service from Gibson Research (http://grc.com/)------------------- Action 2: Forensics -------------------If you find that you did have file sharing turned on, search your hard drive for hidden directories named chode, foreskin, or dickhair (we apologize for the indiscretion - but those are the real directory names). These are HIDDEN directories, so you must configure the Find command to show hidden directories. Under the Windows Explorer menu choose View/Options: Show All Files.If you find those directories: remove them.And, if you find them, and want help from law enforcement, call the FBI National Infrastructure Protection Center (NIPC) Watch Office at 202-323-3204/3205/3206. The FBI/NIPC has done an extraordinary job of getting data out early on this virus and deserves both kudos and cooperation.You can help the whole community by letting both the FBI and SANS (intrusion@sans.org) know if you've been hit, so we can monitor the spread of this virus. -------------- Moving Forward --------------The virus detection companies received a copy of the code for the 911 Virus early this morning, so keep your virus signature files up-to-date.We'll post new information at www.sans.org as it becomes available.Prepared by: Alan Paller, Research Director, The SANS Institute Steve Gibson, President, Gibson Research Corporation Stephen Northcutt, Director, Global Incident Analysis Center [john@jtconsultants.com] To unsubscribe, send a blank email to leave-ntsysadmin-1283781A@lyris.sunbelt-software.com http://www.sunbelt-software.com/ntsysadmin_list_charter.htm------------------------------------------------------------- This message is sent to you because you are subscribed to the mailing list . To unsubscribe, E-mail to: To switch to the DIGEST mode, E-mail to Associated Messages, from the most recent to the oldest:

    
  1. FW: Virus Alert: FBI Finds 911 Virus Wiping Out Hard Drives Today (Vince Medina 2000)
How true is the below?APC Net, Inc. - sales@apcn.net - www.apcn.net 4471 NW 36 St. #110 - Miami Springs, FL 33166 Web Hosting,Web Design & Internet Services-----Original Message----- From: John - JTC [mailto:John@JTConsultants.com] Sent: Saturday, April 01, 2000 9:42 PM To: Vince Medina Subject: FW: Virus Alert: FBI Finds 911 Virus Wiping Out Hard Drives Today -----Original Message----- From: Derek Dickson [mailto:dickson@wo.net] Sent: Saturday, April 01, 2000 8:59 PM To: NT System Admin Issues Cc: TIDA; NT System Admin Issues; Jordan, Chris; Andrew Morrow Subject: FW: Virus Alert: FBI Finds 911 Virus Wiping Out Hard Drives Today -----Original Message----- From: The SANS Institute [mailto:sans@sans.org] Sent: Saturday, April 01, 2000 5:14 PM To: Derek Dickson (SD448143) Subject: Virus Alert: FBI Finds 911 Virus Wiping Out Hard Drives Today To: Derek Dickson (SD448143) From: The SANS Institute Research Office Subj: Malicious 911 Virus Wipes Out Hard Drives of Internet Users At 8:00 am on Saturday, April 1 (This is not an April Fool's joke!) the FBI announced it had discovered malicious code wiping out the data on hard drives and dialing 911. This is a vicious virus and needs to be stopped quickly. That can only be done through wide-scale individual action. Please forward this note to everyone who you know who might be affected.The FBI Advisory is posted at http://www.nipc.gov/nipc/advis00-038.htmThe 911 virus is the first Windows shares virus. Unlike recent viruses that propagate though eMail, the 911 virus silently jumps directly from machine to machine across the Internet by scanning for, and exploiting, open Windows shares. After successfully reproducing itself in other Internet-connected machines (to assure its continued survival) it uses the machine's modem to dial 911 and erases the local machine's hard drive. The virus is operational; victims are already reporting wiped-out hard drives. The virus was launched through AOL, AT&T, MCI, and NetZero in the Houston area. The investigation points to relatively limited distribution so far, but there are no walls in the Internet.----------------- Action 1: Defense -----------------Verify that your system and those of all your coworkers, friends, and associates are not vulnerable by verifying that file sharing is turned off.* On a Windows 95/98 system, system-wide file sharing is managed by selecting My Computer, Control Panel, Networks, and clicking on the File and Print Sharing button. For folder-by-folder controls, you can use Windows Explorer (Start, Programs, Windows Explorer) and highlight a primary folder such as My Documents and then right mouse click and select properties. There you will find a tab for sharing.* On a Windows NT, check Control Panel, Server, Shares.For an excellent way to instantly check system vulnerability, and for detailed assistance in managing Windows file sharing, see: Shields Up! A free service from Gibson Research (http://grc.com/)------------------- Action 2: Forensics -------------------If you find that you did have file sharing turned on, search your hard drive for hidden directories named chode, foreskin, or dickhair (we apologize for the indiscretion - but those are the real directory names). These are HIDDEN directories, so you must configure the Find command to show hidden directories. Under the Windows Explorer menu choose View/Options: Show All Files.If you find those directories: remove them.And, if you find them, and want help from law enforcement, call the FBI National Infrastructure Protection Center (NIPC) Watch Office at 202-323-3204/3205/3206. The FBI/NIPC has done an extraordinary job of getting data out early on this virus and deserves both kudos and cooperation.You can help the whole community by letting both the FBI and SANS (intrusion@sans.org) know if you've been hit, so we can monitor the spread of this virus. -------------- Moving Forward --------------The virus detection companies received a copy of the code for the 911 Virus early this morning, so keep your virus signature files up-to-date.We'll post new information at www.sans.org as it becomes available.Prepared by: Alan Paller, Research Director, The SANS Institute Steve Gibson, President, Gibson Research Corporation Stephen Northcutt, Director, Global Incident Analysis Center [john@jtconsultants.com] To unsubscribe, send a blank email to leave-ntsysadmin-1283781A@lyris.sunbelt-software.com http://www.sunbelt-software.com/ntsysadmin_list_charter.htm------------------------------------------------------------- This message is sent to you because you are subscribed to the mailing list . To unsubscribe, E-mail to: To switch to the DIGEST mode, E-mail to Vince Medina

DOWNLOAD WEBDNA NOW!

Top Articles:

Talk List

The WebDNA community talk-list is the best place to get some help: several hundred extremely proficient programmers with an excellent knowledge of WebDNA and an excellent spirit will deliver all the tips and tricks you can imagine...

Related Readings:

Templates on Unix & CGI on Mac? (1997) WebCat2b14MacPlugIn - [include] doesn't hide the search string (1997) WebCat2 Append problem (B14Macacgi) (1997) flushdatabases (2000) Date Formats (1997) [WebDNA] Mailing list failure !!! (2019) Mac 2.1b4 unknown error: BadSuffix (1997) returning the missing value (1997) Another question about credit cards (1997) tabs as delimiters (2004) Multiple Merchant Accounts? (1997) [WebDNA] Create a cryptographic Mac key... (2016) Multiple Unique SKUs (2000) Re:no [search] with NT (1997) [WebDNA] WebDNA 7 (2011) [WebDNA] How to get a screen size (2009) HELP!! problems with e-mail from WebCAT (1998) Netscape v. IE (1997) Limiting user access to .tmpl files (1997) WebCat Talk Arhives... (1998)