[iwar] [fc:Computers.Hit.Around.Globe.by.New.Form.of.Old.Virus]

From: Fred Cohen (fc@all.net)
Date: 2001-11-01 05:50:21


Return-Path: <sentto-279987-3741-1004622609-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 01 Nov 2001 05:51:08 -0800 (PST)
Received: (qmail 11570 invoked by uid 510); 1 Nov 2001 13:49:22 -0000
Received: from n32.groups.yahoo.com (216.115.96.82) by 204.181.12.215 with SMTP; 1 Nov 2001 13:49:22 -0000
X-eGroups-Return: sentto-279987-3741-1004622609-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.4.54] by n32.groups.yahoo.com with NNFMP; 01 Nov 2001 13:50:09 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 1 Nov 2001 13:50:08 -0000
Received: (qmail 77683 invoked from network); 1 Nov 2001 13:50:07 -0000
Received: from unknown (10.1.10.27) by l8.egroups.com with QMQP; 1 Nov 2001 13:50:07 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta2 with SMTP; 1 Nov 2001 13:50:07 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA1DoLP27118 for iwar@onelist.com; Thu, 1 Nov 2001 05:50:21 -0800
Message-Id: <200111011350.fA1DoLP27118@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 1 Nov 2001 05:50:21 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Computers.Hit.Around.Globe.by.New.Form.of.Old.Virus]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Computers Hit Around Globe by New Form of Old Virus

By John Schwartz, NY Times, 11/1/2001
<a href="http://www.nytimes.com/2001/11/01/technology/01VIRU.html?ex=1005282000&en=9efac0743c3a4134&ei=5040&partner=MOREOVER">http://www.nytimes.com/2001/11/01/technology/01VIRU.html?ex=1005282000&en=9efac0743c3a4134&ei=5040&partner=MOREOVER>

new version of a malicious computer program known as Nimda is making its
way through the world's computer networks, computer security experts
said yesterday.

Nimda.E, the latest version of the computer worm, has been detected on
computer networks since Monday. The first version, Nimda.A, was spotted
on the Internet on Sept. 18.

The New York Times (news/quote) experienced an interruption of Internet
service on Tuesday and part of Wednesday that has been attributed to
Nimda, said Catherine J. Mathis, a spokeswoman for the company. "All of
our operations have returned to normal," she said.

The program is spread primarily through e-mail messages; when a machine
on a network is infected, the program searches out and infects servers,
the computers that run applications, and causes those machines to flood
their own networks with packets of data. That, in turn, slows system
performance greatly.

The program, which takes advantage of vulnerabilities in Microsoft
(news/quote)'s operating system and server software, can also lay
infected systems open to computer intruders.

Microsoft published software patches in September that users could
download from the Internet to protect their systems from Nimda. Security
experts estimate that Nimda.A infected as many as two million machines
before users took measures to protect their computers. Security
companies said that because of that earlier effort, the threat from the
newly circulating version was not great.

"If you're not already infected and if you have applied the patches,
you're O.K.," said Craig Schmugar, a virus researcher at Network
Associates (news/quote), a computer security company based in Santa
Clara, Calif. He added, however, that a single infected machine could
cause significant disruption throughout a network of computers.

Representatives of the Computer Emergency Response Team, a
federally-funded computer security organization at Carnegie Mellon
University, said yesterday that they had not seen a significant surge in
Nimda.E since it was first detected.

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST