** Sobig.F attack expected 3:00pm to 6:00pm EST today [Friday 22]

  • Thread starter Karl Levinson [x y] mvp
  • Start date
K

Karl Levinson [x y] mvp

Relatively new information about the Sobig.F worm activity happening TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and Sunday 24
August 2003, computers that are currently infected with the Sobig.F worm
will be directed by the worm to connect to the Internet and then download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus authors are not
making the download executable available until the attack begins.

Antivirus updates downloaded August 19 or later should detect Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as well as 995
through 999 UDP [the former for command and control outbound from the
infected device possibly involving the "master servers," the others opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones the worm will
attempt to download from, but this list is not yet public information as far
as I know. Reportedly it may be on www.google.com/groups, but I didn't see
it when I searched.

Sobig.F infected machines may be using UDP port 123 [NTP] to check the time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the following file and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this mystery program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.com/avcenter/venc/data/[email protected]

Other sites with information:

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SOBIG.F
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the F-secure.com mailing
list [though it's corroborated by the Symantec web site as well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on Friday at 19:00 UTC

F-Secure Corporation is warning about a new level of attack to be unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most widespread worm in
the world, has created massive e-mail outages globally since it was found on
Tuesday the 18th of August - four days ago. The worm spreads itself via
infected e-mail attachments in e-mails with a spoofed sender address. Total
amount of infected e-mails seen in the Internet since this attack started is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its sleeve. All the
infected computers are entering a second phase today, on Friday the 22nd of
August, 2003. These computers are using atom clocks to synchronize the
activation to start exactly at the same time around the world: at 19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on Saturday in Sydney).

On this moment, the worm starts to connect to machines found from an
encrypted list hidden in the virus body. The list contains the address of 20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs, connected to the Internet
with always-on DSL connections", says Mikko Hypponen, Director of Anti-Virus
Research at F-Secure. "Most likely the party behind Sobig.F has broken into
these computers and they are now being misused to be part of this attack".

The worm connects to one of these 20 servers and authenticates itself with a
secret 8-byte code. The servers respond with a web address. Infected
machines
download a program from this address - and run it. At this moment it is
completely unknown what this mystery program will do.

F-Secure has been able to break into this system and crack the encryption,
but currently the web address sent by the servers doesn't go anywhere. "The
developers of the virus know that we could download the program beforehand,
analyse it and come up with countermeasures", says Hypponen. "So apparently
their plan is to change the web address to point to the correct address or
addresses just seconds before the deadline. By the time we get a copy of the
file, the infected computers have already downloaded and run it".

Right now, nobody knows what this program does. It could do damage, like
deleting files or unleash network attacks. Earlier versions of Sobig have
executed similar but simpler routines. With Sobig.E, the worm downloaded a
program which removed the virus itself (to hide its tracks), and then
started
to steal users network and web passwords. After this the worm installed a
hidden email proxy, which has been used by various spammers to send their
bulk commercial emails through these machines without the owners of the
computers knowing anything about it. Sobig.F might do something similar -
but
we won't know until 19:00 UTC today.

"As soon as we were able to crack the encryption used by the worm to hide
the
list of the 20 machines, we've been trying to close them down", explains
Mikko Hypponen. F-Secure has been working with officials, authorities and
various CERT organizations to disconnect these machines from the Internet.
"Unfortunately, the writers of this virus have been waiting for this move
too." These 20 machines are chosen from the networks of different operators,
making it quite likely that there won't be enough time to take them all down
by 19:00 UTC. Even if just one stays up, it will be enough for the worm.

The advanced techniques used by the worm make it quite obvious it's not
written by a typical teenage virus writer. The fact that previous Sobig
variants we're used by spammers on a large scale adds an element of
financial
gain. Who's behind all this? "Looks like organized crime to me", comments
Mikko Hypponen.

F-Secure is monitoring the Sobig.F developments through the night on Friday
the 22nd. Updates will be posted to Sobig.F's virus description at
http://www.f-secure.com/v-descs/sobig_f.shtml


F-Secure Anti-Virus can detect and stop this worm. F-Secure Anti-Virus can
be
downloaded from http://www.f-secure.com

About F-Secure

F-Secure Corporation is the leading provider of centrally managed security
solutions for the mobile enterprise. The company's award-winning products
include antivirus, file encryption and network security solutions for major
platforms from desktops to servers and from laptops to handhelds. Founded in
1988, F-Secure has been listed on the Helsinki Exchanges since November
1999.
The company is headquartered in Helsinki, Finland, with the North American
headquarters in San Jose, California, as well as offices in Germany, Sweden,
Japan and the United Kingdom and regional offices in the USA. F-Secure is
supported by a network of value added resellers and distributors in over 90
countries around the globe. Through licening and distribution agreements,
the
company's security applications are available for the products of the
leading
handheld equipment manufacturers, such as Nokia and HP.

Finland:
F-Secure Corporation
Mikko Hypponen, Director, Anti-Virus Research
PL 24
FIN-00181 Helsinki
Tel +358 9 2520 5513
Fax. +358 9 2520 5001
Email (e-mail address removed)


For more information, please contact:

Media contact in the USA:
F-Secure Inc.
Heather Deem,
675 N. First Street, 5th Floor
San Jose, CA 95112
Tel +1 408 350 2178
Fax +1 408 938 6701
Email (e-mail address removed)


http://www.F-Secure.com/


Mailing list policy

You have previously expressed interest in our products, or have asked to be
included on one of our press release lists by personally giving us your
e-mail address for this purpose. Our mailing list are for the exclusive use
and the expressed purpose of F-Secure and are not sold or given to third
parties.

If you no longer wish to receive our press releases, or your email address
has been added to our lists without your consent, you can unsubscribe at
http://www.F-Secure.com/news/subscribe.html

If you only wish to receive our press releases concerning viruses,
please go to
http://www.F-Secure.com/news/subscribe.html
and first unsubscribe from
(e-mail address removed)-Secure.com
and then subscribe to
(e-mail address removed)-Secure.com

*****************************************
Jaana Sirkiä, Communications Manager
F-Secure Corporation
PL 24
FIN 00181-Helsinki
Tel. +358 9 2520 5290
Fax +358 9 2520 5018
Mobile +358 400 303096
http://www.F-Secure.com
*******************************************
 
A

Andrei Ostapenko

Here is the list of the targeted machines ( from McAfee site)

The worm is capable of retrieving file(s) from a remote server - the
specific URL of which is controlled by the author, and is issued in response
to data sent from infected machines.

At a specific time (as determined via NTP), the worm sends data from
infected machines to a number of remote systems on UDP port 8998:


a.. 12.158.102.205
b.. 12.232.104.221
c.. 218.147.164.29
d.. 24.197.143.132
e.. 24.202.91.43
f.. 24.206.75.137
g.. 24.210.182.156
h.. 24.33.66.38
i.. 61.38.187.59
j.. 63.250.82.87
k.. 65.177.240.194
l.. 65.92.186.145
m.. 65.92.80.218
n.. 65.93.81.59
o.. 65.95.193.138
p.. 66.131.207.81
q.. 67.73.21.6
r.. 67.9.241.67
s.. 68.38.159.161
t.. 68.50.208.96

The specific time condition for this event is between 19:00 - 20:00 (UTC) on
a Friday or Sunday. These IP addresses are in the process of trying to be
shutdown.

Karl Levinson [x y] mvp said:
Relatively new information about the Sobig.F worm activity happening TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and Sunday 24
August 2003, computers that are currently infected with the Sobig.F worm
will be directed by the worm to connect to the Internet and then download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus authors are not
making the download executable available until the attack begins.

Antivirus updates downloaded August 19 or later should detect Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as well as 995
through 999 UDP [the former for command and control outbound from the
infected device possibly involving the "master servers," the others opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones the worm will
attempt to download from, but this list is not yet public information as far
as I know. Reportedly it may be on www.google.com/groups, but I didn't see
it when I searched.

Sobig.F infected machines may be using UDP port 123 [NTP] to check the time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the following file and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this mystery program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.com/avcenter/venc/data/[email protected]

Other sites with information:

http://www.trendmicro.com/vinfo/vir.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the F-secure.com mailing
list [though it's corroborated by the Symantec web site as well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on Friday at 19:00 UTC

F-Secure Corporation is warning about a new level of attack to be unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most widespread worm in
the world, has created massive e-mail outages globally since it was found on
Tuesday the 18th of August - four days ago. The worm spreads itself via
infected e-mail attachments in e-mails with a spoofed sender address. Total
amount of infected e-mails seen in the Internet since this attack started is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its sleeve. All the
infected computers are entering a second phase today, on Friday the 22nd of
August, 2003. These computers are using atom clocks to synchronize the
activation to start exactly at the same time around the world: at 19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on Saturday in Sydney).

On this moment, the worm starts to connect to machines found from an
encrypted list hidden in the virus body. The list contains the address of 20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs, connected to the Internet
with always-on DSL connections", says Mikko Hypponen, Director of Anti-Virus
Research at F-Secure. "Most likely the party behind Sobig.F has broken into
these computers and they are now being misused to be part of this attack".

The worm connects to one of these 20 servers and authenticates itself with a
secret 8-byte code. The servers respond with a web address. Infected
machines
download a program from this address - and run it. At this moment it is
completely unknown what this mystery program will do.

F-Secure has been able to break into this system and crack the encryption,
but currently the web address sent by the servers doesn't go anywhere. "The
developers of the virus know that we could download the program beforehand,
analyse it and come up with countermeasures", says Hypponen. "So apparently
their plan is to change the web address to point to the correct address or
addresses just seconds before the deadline. By the time we get a copy of the
file, the infected computers have already downloaded and run it".

Right now, nobody knows what this program does. It could do damage, like
deleting files or unleash network attacks. Earlier versions of Sobig have
executed similar but simpler routines. With Sobig.E, the worm downloaded a
program which removed the virus itself (to hide its tracks), and then
started
to steal users network and web passwords. After this the worm installed a
hidden email proxy, which has been used by various spammers to send their
bulk commercial emails through these machines without the owners of the
computers knowing anything about it. Sobig.F might do something similar -
but
we won't know until 19:00 UTC today.

"As soon as we were able to crack the encryption used by the worm to hide
the
list of the 20 machines, we've been trying to close them down", explains
Mikko Hypponen. F-Secure has been working with officials, authorities and
various CERT organizations to disconnect these machines from the Internet.
"Unfortunately, the writers of this virus have been waiting for this move
too." These 20 machines are chosen from the networks of different operators,
making it quite likely that there won't be enough time to take them all down
by 19:00 UTC. Even if just one stays up, it will be enough for the worm.

The advanced techniques used by the worm make it quite obvious it's not
written by a typical teenage virus writer. The fact that previous Sobig
variants we're used by spammers on a large scale adds an element of
financial
gain. Who's behind all this? "Looks like organized crime to me", comments
Mikko Hypponen.

F-Secure is monitoring the Sobig.F developments through the night on Friday
the 22nd. Updates will be posted to Sobig.F's virus description at
http://www.f-secure.com/v-descs/sobig_f.shtml


F-Secure Anti-Virus can detect and stop this worm. F-Secure Anti-Virus can
be
downloaded from http://www.f-secure.com

About F-Secure

F-Secure Corporation is the leading provider of centrally managed security
solutions for the mobile enterprise. The company's award-winning products
include antivirus, file encryption and network security solutions for major
platforms from desktops to servers and from laptops to handhelds. Founded in
1988, F-Secure has been listed on the Helsinki Exchanges since November
1999.
The company is headquartered in Helsinki, Finland, with the North American
headquarters in San Jose, California, as well as offices in Germany, Sweden,
Japan and the United Kingdom and regional offices in the USA. F-Secure is
supported by a network of value added resellers and distributors in over 90
countries around the globe. Through licening and distribution agreements,
the
company's security applications are available for the products of the
leading
handheld equipment manufacturers, such as Nokia and HP.

Finland:
F-Secure Corporation
Mikko Hypponen, Director, Anti-Virus Research
PL 24
FIN-00181 Helsinki
Tel +358 9 2520 5513
Fax. +358 9 2520 5001
Email (e-mail address removed)


For more information, please contact:

Media contact in the USA:
F-Secure Inc.
Heather Deem,
675 N. First Street, 5th Floor
San Jose, CA 95112
Tel +1 408 350 2178
Fax +1 408 938 6701
Email (e-mail address removed)


http://www.F-Secure.com/


Mailing list policy

You have previously expressed interest in our products, or have asked to be
included on one of our press release lists by personally giving us your
e-mail address for this purpose. Our mailing list are for the exclusive use
and the expressed purpose of F-Secure and are not sold or given to third
parties.

If you no longer wish to receive our press releases, or your email address
has been added to our lists without your consent, you can unsubscribe at
http://www.F-Secure.com/news/subscribe.html

If you only wish to receive our press releases concerning viruses,
please go to
http://www.F-Secure.com/news/subscribe.html
and first unsubscribe from
(e-mail address removed)-Secure.com
and then subscribe to
(e-mail address removed)-Secure.com

*****************************************
Jaana Sirkiä, Communications Manager
F-Secure Corporation
PL 24
FIN 00181-Helsinki
Tel. +358 9 2520 5290
Fax +358 9 2520 5018
Mobile +358 400 303096
http://www.F-Secure.com
*******************************************
 
J

jo

i found out sobig goto a porn site.
that it
Andrei Ostapenko said:
Here is the list of the targeted machines ( from McAfee site)

The worm is capable of retrieving file(s) from a remote server - the
specific URL of which is controlled by the author, and is issued in response
to data sent from infected machines.

At a specific time (as determined via NTP), the worm sends data from
infected machines to a number of remote systems on UDP port 8998:


a.. 12.158.102.205
b.. 12.232.104.221
c.. 218.147.164.29
d.. 24.197.143.132
e.. 24.202.91.43
f.. 24.206.75.137
g.. 24.210.182.156
h.. 24.33.66.38
i.. 61.38.187.59
j.. 63.250.82.87
k.. 65.177.240.194
l.. 65.92.186.145
m.. 65.92.80.218
n.. 65.93.81.59
o.. 65.95.193.138
p.. 66.131.207.81
q.. 67.73.21.6
r.. 67.9.241.67
s.. 68.38.159.161
t.. 68.50.208.96

The specific time condition for this event is between 19:00 - 20:00 (UTC) on
a Friday or Sunday. These IP addresses are in the process of trying to be
shutdown.

Karl Levinson [x y] mvp said:
Relatively new information about the Sobig.F worm activity happening TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and Sunday 24
August 2003, computers that are currently infected with the Sobig.F worm
will be directed by the worm to connect to the Internet and then download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus authors are not
making the download executable available until the attack begins.

Antivirus updates downloaded August 19 or later should detect Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as well as 995
through 999 UDP [the former for command and control outbound from the
infected device possibly involving the "master servers," the others opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones the worm will
attempt to download from, but this list is not yet public information as far
as I know. Reportedly it may be on www.google.com/groups, but I didn't see
it when I searched.

Sobig.F infected machines may be using UDP port 123 [NTP] to check the time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the following file and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this mystery program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.com/avcenter/venc/data/[email protected]
Other sites with information:
http://www.trendmicro.com/vinfo/vir.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the F-secure.com mailing
list [though it's corroborated by the Symantec web site as well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on Friday at 19:00 UTC

F-Secure Corporation is warning about a new level of attack to be unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most widespread worm in
the world, has created massive e-mail outages globally since it was
found
on
Tuesday the 18th of August - four days ago. The worm spreads itself via
infected e-mail attachments in e-mails with a spoofed sender address. Total
amount of infected e-mails seen in the Internet since this attack
started
is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its sleeve. All the
infected computers are entering a second phase today, on Friday the 22nd of
August, 2003. These computers are using atom clocks to synchronize the
activation to start exactly at the same time around the world: at 19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on Saturday in Sydney).

On this moment, the worm starts to connect to machines found from an
encrypted list hidden in the virus body. The list contains the address
of
20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs, connected to the Internet
with always-on DSL connections", says Mikko Hypponen, Director of Anti-Virus
Research at F-Secure. "Most likely the party behind Sobig.F has broken into
these computers and they are now being misused to be part of this attack".

The worm connects to one of these 20 servers and authenticates itself
with
a
secret 8-byte code. The servers respond with a web address. Infected
machines
download a program from this address - and run it. At this moment it is
completely unknown what this mystery program will do.

F-Secure has been able to break into this system and crack the encryption,
but currently the web address sent by the servers doesn't go anywhere. "The
developers of the virus know that we could download the program beforehand,
analyse it and come up with countermeasures", says Hypponen. "So apparently
their plan is to change the web address to point to the correct address or
addresses just seconds before the deadline. By the time we get a copy of the
file, the infected computers have already downloaded and run it".

Right now, nobody knows what this program does. It could do damage, like
deleting files or unleash network attacks. Earlier versions of Sobig have
executed similar but simpler routines. With Sobig.E, the worm downloaded a
program which removed the virus itself (to hide its tracks), and then
started
to steal users network and web passwords. After this the worm installed a
hidden email proxy, which has been used by various spammers to send their
bulk commercial emails through these machines without the owners of the
computers knowing anything about it. Sobig.F might do something similar -
but
we won't know until 19:00 UTC today.

"As soon as we were able to crack the encryption used by the worm to hide
the
list of the 20 machines, we've been trying to close them down", explains
Mikko Hypponen. F-Secure has been working with officials, authorities and
various CERT organizations to disconnect these machines from the Internet.
"Unfortunately, the writers of this virus have been waiting for this move
too." These 20 machines are chosen from the networks of different operators,
making it quite likely that there won't be enough time to take them all down
by 19:00 UTC. Even if just one stays up, it will be enough for the worm.

The advanced techniques used by the worm make it quite obvious it's not
written by a typical teenage virus writer. The fact that previous Sobig
variants we're used by spammers on a large scale adds an element of
financial
gain. Who's behind all this? "Looks like organized crime to me", comments
Mikko Hypponen.

F-Secure is monitoring the Sobig.F developments through the night on Friday
the 22nd. Updates will be posted to Sobig.F's virus description at
http://www.f-secure.com/v-descs/sobig_f.shtml


F-Secure Anti-Virus can detect and stop this worm. F-Secure Anti-Virus can
be
downloaded from http://www.f-secure.com

About F-Secure

F-Secure Corporation is the leading provider of centrally managed security
solutions for the mobile enterprise. The company's award-winning products
include antivirus, file encryption and network security solutions for major
platforms from desktops to servers and from laptops to handhelds.
Founded
in
1988, F-Secure has been listed on the Helsinki Exchanges since November
1999.
The company is headquartered in Helsinki, Finland, with the North American
headquarters in San Jose, California, as well as offices in Germany, Sweden,
Japan and the United Kingdom and regional offices in the USA. F-Secure is
supported by a network of value added resellers and distributors in over 90
countries around the globe. Through licening and distribution agreements,
the
company's security applications are available for the products of the
leading
handheld equipment manufacturers, such as Nokia and HP.

Finland:
F-Secure Corporation
Mikko Hypponen, Director, Anti-Virus Research
PL 24
FIN-00181 Helsinki
Tel +358 9 2520 5513
Fax. +358 9 2520 5001
Email (e-mail address removed)


For more information, please contact:

Media contact in the USA:
F-Secure Inc.
Heather Deem,
675 N. First Street, 5th Floor
San Jose, CA 95112
Tel +1 408 350 2178
Fax +1 408 938 6701
Email (e-mail address removed)


http://www.F-Secure.com/


Mailing list policy

You have previously expressed interest in our products, or have asked to be
included on one of our press release lists by personally giving us your
e-mail address for this purpose. Our mailing list are for the exclusive use
and the expressed purpose of F-Secure and are not sold or given to third
parties.

If you no longer wish to receive our press releases, or your email address
has been added to our lists without your consent, you can unsubscribe at
http://www.F-Secure.com/news/subscribe.html

If you only wish to receive our press releases concerning viruses,
please go to
http://www.F-Secure.com/news/subscribe.html
and first unsubscribe from
(e-mail address removed)-Secure.com
and then subscribe to
(e-mail address removed)-Secure.com

*****************************************
Jaana Sirkiä, Communications Manager
F-Secure Corporation
PL 24
FIN 00181-Helsinki
Tel. +358 9 2520 5290
Fax +358 9 2520 5018
Mobile +358 400 303096
http://www.F-Secure.com
*******************************************
 
J

Jonathan Maltz [MS-MVP]

Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Karl Levinson [x y] mvp said:
Relatively new information about the Sobig.F worm activity happening TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and Sunday 24
August 2003, computers that are currently infected with the Sobig.F worm
will be directed by the worm to connect to the Internet and then download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus authors are not
making the download executable available until the attack begins.

Antivirus updates downloaded August 19 or later should detect Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as well as 995
through 999 UDP [the former for command and control outbound from the
infected device possibly involving the "master servers," the others opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones the worm will
attempt to download from, but this list is not yet public information as far
as I know. Reportedly it may be on www.google.com/groups, but I didn't see
it when I searched.

Sobig.F infected machines may be using UDP port 123 [NTP] to check the time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the following file and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this mystery program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.com/avcenter/venc/data/[email protected]

Other sites with information:

http://www.trendmicro.com/vinfo/vir.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the F-secure.com mailing
list [though it's corroborated by the Symantec web site as well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on Friday at 19:00 UTC

F-Secure Corporation is warning about a new level of attack to be unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most widespread worm in
the world, has created massive e-mail outages globally since it was found on
Tuesday the 18th of August - four days ago. The worm spreads itself via
infected e-mail attachments in e-mails with a spoofed sender address. Total
amount of infected e-mails seen in the Internet since this attack started is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its sleeve. All the
infected computers are entering a second phase today, on Friday the 22nd of
August, 2003. These computers are using atom clocks to synchronize the
activation to start exactly at the same time around the world: at 19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on Saturday in Sydney).

On this moment, the worm starts to connect to machines found from an
encrypted list hidden in the virus body. The list contains the address of 20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs, connected to the Internet
with always-on DSL connections", says Mikko Hypponen, Director of Anti-Virus
Research at F-Secure. "Most likely the party behind Sobig.F has broken into
these computers and they are now being misused to be part of this attack".

The worm connects to one of these 20 servers and authenticates itself with a
secret 8-byte code. The servers respond with a web address. Infected
machines
download a program from this address - and run it. At this moment it is
completely unknown what this mystery program will do.

F-Secure has been able to break into this system and crack the encryption,
but currently the web address sent by the servers doesn't go anywhere. "The
developers of the virus know that we could download the program beforehand,
analyse it and come up with countermeasures", says Hypponen. "So apparently
their plan is to change the web address to point to the correct address or
addresses just seconds before the deadline. By the time we get a copy of the
file, the infected computers have already downloaded and run it".

Right now, nobody knows what this program does. It could do damage, like
deleting files or unleash network attacks. Earlier versions of Sobig have
executed similar but simpler routines. With Sobig.E, the worm downloaded a
program which removed the virus itself (to hide its tracks), and then
started
to steal users network and web passwords. After this the worm installed a
hidden email proxy, which has been used by various spammers to send their
bulk commercial emails through these machines without the owners of the
computers knowing anything about it. Sobig.F might do something similar -
but
we won't know until 19:00 UTC today.

"As soon as we were able to crack the encryption used by the worm to hide
the
list of the 20 machines, we've been trying to close them down", explains
Mikko Hypponen. F-Secure has been working with officials, authorities and
various CERT organizations to disconnect these machines from the Internet.
"Unfortunately, the writers of this virus have been waiting for this move
too." These 20 machines are chosen from the networks of different operators,
making it quite likely that there won't be enough time to take them all down
by 19:00 UTC. Even if just one stays up, it will be enough for the worm.

The advanced techniques used by the worm make it quite obvious it's not
written by a typical teenage virus writer. The fact that previous Sobig
variants we're used by spammers on a large scale adds an element of
financial
gain. Who's behind all this? "Looks like organized crime to me", comments
Mikko Hypponen.

F-Secure is monitoring the Sobig.F developments through the night on Friday
the 22nd. Updates will be posted to Sobig.F's virus description at
http://www.f-secure.com/v-descs/sobig_f.shtml


F-Secure Anti-Virus can detect and stop this worm. F-Secure Anti-Virus can
be
downloaded from http://www.f-secure.com

About F-Secure

F-Secure Corporation is the leading provider of centrally managed security
solutions for the mobile enterprise. The company's award-winning products
include antivirus, file encryption and network security solutions for major
platforms from desktops to servers and from laptops to handhelds. Founded in
1988, F-Secure has been listed on the Helsinki Exchanges since November
1999.
The company is headquartered in Helsinki, Finland, with the North American
headquarters in San Jose, California, as well as offices in Germany, Sweden,
Japan and the United Kingdom and regional offices in the USA. F-Secure is
supported by a network of value added resellers and distributors in over 90
countries around the globe. Through licening and distribution agreements,
the
company's security applications are available for the products of the
leading
handheld equipment manufacturers, such as Nokia and HP.

Finland:
F-Secure Corporation
Mikko Hypponen, Director, Anti-Virus Research
PL 24
FIN-00181 Helsinki
Tel +358 9 2520 5513
Fax. +358 9 2520 5001
Email (e-mail address removed)


For more information, please contact:

Media contact in the USA:
F-Secure Inc.
Heather Deem,
675 N. First Street, 5th Floor
San Jose, CA 95112
Tel +1 408 350 2178
Fax +1 408 938 6701
Email (e-mail address removed)


http://www.F-Secure.com/


Mailing list policy

You have previously expressed interest in our products, or have asked to be
included on one of our press release lists by personally giving us your
e-mail address for this purpose. Our mailing list are for the exclusive use
and the expressed purpose of F-Secure and are not sold or given to third
parties.

If you no longer wish to receive our press releases, or your email address
has been added to our lists without your consent, you can unsubscribe at
http://www.F-Secure.com/news/subscribe.html

If you only wish to receive our press releases concerning viruses,
please go to
http://www.F-Secure.com/news/subscribe.html
and first unsubscribe from
(e-mail address removed)-Secure.com
and then subscribe to
(e-mail address removed)-Secure.com

*****************************************
Jaana Sirkiä, Communications Manager
F-Secure Corporation
PL 24
FIN 00181-Helsinki
Tel. +358 9 2520 5290
Fax +358 9 2520 5018
Mobile +358 400 303096
http://www.F-Secure.com
*******************************************
 
B

Bill Sanderson

nah - what the worm was to get from the 20 machines was a pointer to another
machine. It never happened--the 20 machines were left pointing to a porn
site.

Jonathan Maltz said:
Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Karl Levinson [x y] mvp said:
Relatively new information about the Sobig.F worm activity happening TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and Sunday 24
August 2003, computers that are currently infected with the Sobig.F worm
will be directed by the worm to connect to the Internet and then download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus authors are not
making the download executable available until the attack begins.

Antivirus updates downloaded August 19 or later should detect Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as well as 995
through 999 UDP [the former for command and control outbound from the
infected device possibly involving the "master servers," the others opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones the worm will
attempt to download from, but this list is not yet public information as far
as I know. Reportedly it may be on www.google.com/groups, but I didn't see
it when I searched.

Sobig.F infected machines may be using UDP port 123 [NTP] to check the time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the following file and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this mystery program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.com/avcenter/venc/data/[email protected]
Other sites with information:
http://www.trendmicro.com/vinfo/vir.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the F-secure.com mailing
list [though it's corroborated by the Symantec web site as well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on Friday at 19:00 UTC

F-Secure Corporation is warning about a new level of attack to be unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most widespread worm in
the world, has created massive e-mail outages globally since it was
found
on
Tuesday the 18th of August - four days ago. The worm spreads itself via
infected e-mail attachments in e-mails with a spoofed sender address. Total
amount of infected e-mails seen in the Internet since this attack
started
is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its sleeve. All the
infected computers are entering a second phase today, on Friday the 22nd of
August, 2003. These computers are using atom clocks to synchronize the
activation to start exactly at the same time around the world: at 19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on Saturday in Sydney).

On this moment, the worm starts to connect to machines found from an
encrypted list hidden in the virus body. The list contains the address
of
20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs, connected to the Internet
with always-on DSL connections", says Mikko Hypponen, Director of Anti-Virus
Research at F-Secure. "Most likely the party behind Sobig.F has broken into
these computers and they are now being misused to be part of this attack".

The worm connects to one of these 20 servers and authenticates itself
with
a
secret 8-byte code. The servers respond with a web address. Infected
machines
download a program from this address - and run it. At this moment it is
completely unknown what this mystery program will do.

F-Secure has been able to break into this system and crack the encryption,
but currently the web address sent by the servers doesn't go anywhere. "The
developers of the virus know that we could download the program beforehand,
analyse it and come up with countermeasures", says Hypponen. "So apparently
their plan is to change the web address to point to the correct address or
addresses just seconds before the deadline. By the time we get a copy of the
file, the infected computers have already downloaded and run it".

Right now, nobody knows what this program does. It could do damage, like
deleting files or unleash network attacks. Earlier versions of Sobig have
executed similar but simpler routines. With Sobig.E, the worm downloaded a
program which removed the virus itself (to hide its tracks), and then
started
to steal users network and web passwords. After this the worm installed a
hidden email proxy, which has been used by various spammers to send their
bulk commercial emails through these machines without the owners of the
computers knowing anything about it. Sobig.F might do something similar -
but
we won't know until 19:00 UTC today.

"As soon as we were able to crack the encryption used by the worm to hide
the
list of the 20 machines, we've been trying to close them down", explains
Mikko Hypponen. F-Secure has been working with officials, authorities and
various CERT organizations to disconnect these machines from the Internet.
"Unfortunately, the writers of this virus have been waiting for this move
too." These 20 machines are chosen from the networks of different operators,
making it quite likely that there won't be enough time to take them all down
by 19:00 UTC. Even if just one stays up, it will be enough for the worm.

The advanced techniques used by the worm make it quite obvious it's not
written by a typical teenage virus writer. The fact that previous Sobig
variants we're used by spammers on a large scale adds an element of
financial
gain. Who's behind all this? "Looks like organized crime to me", comments
Mikko Hypponen.

F-Secure is monitoring the Sobig.F developments through the night on Friday
the 22nd. Updates will be posted to Sobig.F's virus description at
http://www.f-secure.com/v-descs/sobig_f.shtml


F-Secure Anti-Virus can detect and stop this worm. F-Secure Anti-Virus can
be
downloaded from http://www.f-secure.com

About F-Secure

F-Secure Corporation is the leading provider of centrally managed security
solutions for the mobile enterprise. The company's award-winning products
include antivirus, file encryption and network security solutions for major
platforms from desktops to servers and from laptops to handhelds.
Founded
in
1988, F-Secure has been listed on the Helsinki Exchanges since November
1999.
The company is headquartered in Helsinki, Finland, with the North American
headquarters in San Jose, California, as well as offices in Germany, Sweden,
Japan and the United Kingdom and regional offices in the USA. F-Secure is
supported by a network of value added resellers and distributors in over 90
countries around the globe. Through licening and distribution agreements,
the
company's security applications are available for the products of the
leading
handheld equipment manufacturers, such as Nokia and HP.

Finland:
F-Secure Corporation
Mikko Hypponen, Director, Anti-Virus Research
PL 24
FIN-00181 Helsinki
Tel +358 9 2520 5513
Fax. +358 9 2520 5001
Email (e-mail address removed)


For more information, please contact:

Media contact in the USA:
F-Secure Inc.
Heather Deem,
675 N. First Street, 5th Floor
San Jose, CA 95112
Tel +1 408 350 2178
Fax +1 408 938 6701
Email (e-mail address removed)


http://www.F-Secure.com/


Mailing list policy

You have previously expressed interest in our products, or have asked to be
included on one of our press release lists by personally giving us your
e-mail address for this purpose. Our mailing list are for the exclusive use
and the expressed purpose of F-Secure and are not sold or given to third
parties.

If you no longer wish to receive our press releases, or your email address
has been added to our lists without your consent, you can unsubscribe at
http://www.F-Secure.com/news/subscribe.html

If you only wish to receive our press releases concerning viruses,
please go to
http://www.F-Secure.com/news/subscribe.html
and first unsubscribe from
(e-mail address removed)-Secure.com
and then subscribe to
(e-mail address removed)-Secure.com

*****************************************
Jaana Sirkiä, Communications Manager
F-Secure Corporation
PL 24
FIN 00181-Helsinki
Tel. +358 9 2520 5290
Fax +358 9 2520 5018
Mobile +358 400 303096
http://www.F-Secure.com
*******************************************
 
J

Jonathan Maltz [MS-MVP]

Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Bill Sanderson said:
nah - what the worm was to get from the 20 machines was a pointer to another
machine. It never happened--the 20 machines were left pointing to a porn
site.

Jonathan Maltz said:
Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Karl Levinson [x y] mvp said:
Relatively new information about the Sobig.F worm activity happening TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and Sunday 24
August 2003, computers that are currently infected with the Sobig.F worm
will be directed by the worm to connect to the Internet and then download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus authors are not
making the download executable available until the attack begins.

Antivirus updates downloaded August 19 or later should detect Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as well as 995
through 999 UDP [the former for command and control outbound from the
infected device possibly involving the "master servers," the others opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones the worm will
attempt to download from, but this list is not yet public information
as
far
as I know. Reportedly it may be on www.google.com/groups, but I
didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123 [NTP] to check the time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the following file and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this mystery program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the F-secure.com mailing
list [though it's corroborated by the Symantec web site as well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on Friday at 19:00 UTC

F-Secure Corporation is warning about a new level of attack to be unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most widespread
worm
in
the world, has created massive e-mail outages globally since it was
found
on
Tuesday the 18th of August - four days ago. The worm spreads itself via
infected e-mail attachments in e-mails with a spoofed sender address. Total
amount of infected e-mails seen in the Internet since this attack
started
is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its sleeve. All the
infected computers are entering a second phase today, on Friday the
22nd
of
August, 2003. These computers are using atom clocks to synchronize the
activation to start exactly at the same time around the world: at 19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on Saturday in Sydney).

On this moment, the worm starts to connect to machines found from an
encrypted list hidden in the virus body. The list contains the address
of
20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs, connected to the Internet
with always-on DSL connections", says Mikko Hypponen, Director of Anti-Virus
Research at F-Secure. "Most likely the party behind Sobig.F has broken into
these computers and they are now being misused to be part of this attack".

The worm connects to one of these 20 servers and authenticates itself
with
a
secret 8-byte code. The servers respond with a web address. Infected
machines
download a program from this address - and run it. At this moment it is
completely unknown what this mystery program will do.

F-Secure has been able to break into this system and crack the encryption,
but currently the web address sent by the servers doesn't go anywhere. "The
developers of the virus know that we could download the program beforehand,
analyse it and come up with countermeasures", says Hypponen. "So apparently
their plan is to change the web address to point to the correct
address
or of
the
downloaded
installed
a all
down Founded over
90 to
be exclusive
use
 
B

Bill Sanderson

I'm not sure I have all the details right, but it's clear that whoever is
behind this isn't done yet. There may be more to come from this iteration,
and most folks are predicting another iteration on September 11th.

Jonathan Maltz said:
Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Bill Sanderson said:
nah - what the worm was to get from the 20 machines was a pointer to another
machine. It never happened--the 20 machines were left pointing to a porn
site.

Jonathan Maltz said:
Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.



Relatively new information about the Sobig.F worm activity happening
TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and Sunday 24
August 2003, computers that are currently infected with the Sobig.F worm
will be directed by the worm to connect to the Internet and then download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus authors
are
not
making the download executable available until the attack begins.

Antivirus updates downloaded August 19 or later should detect Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as well as 995
through 999 UDP [the former for command and control outbound from the
infected device possibly involving the "master servers," the others opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones the worm will
attempt to download from, but this list is not yet public
information
as
far
as I know. Reportedly it may be on www.google.com/groups, but I didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123 [NTP] to check the
time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the following
file
and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this mystery program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the F-secure.com mailing
list [though it's corroborated by the Symantec web site as well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on Friday at
19:00
UTC
F-Secure Corporation is warning about a new level of attack to be
unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most widespread worm
in
the world, has created massive e-mail outages globally since it was found
on
Tuesday the 18th of August - four days ago. The worm spreads itself via
infected e-mail attachments in e-mails with a spoofed sender address.
Total
amount of infected e-mails seen in the Internet since this attack started
is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its sleeve. All the
infected computers are entering a second phase today, on Friday the 22nd
of
August, 2003. These computers are using atom clocks to synchronize the
activation to start exactly at the same time around the world: at 19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on Saturday in
Sydney).

On this moment, the worm starts to connect to machines found from an
encrypted list hidden in the virus body. The list contains the
address
of
20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs, connected to the Internet
with always-on DSL connections", says Mikko Hypponen, Director of
Anti-Virus
Research at F-Secure. "Most likely the party behind Sobig.F has broken
into
these computers and they are now being misused to be part of this attack".

The worm connects to one of these 20 servers and authenticates
itself
with
a
secret 8-byte code. The servers respond with a web address. Infected
machines
download a program from this address - and run it. At this moment it is
completely unknown what this mystery program will do.

F-Secure has been able to break into this system and crack the encryption,
but currently the web address sent by the servers doesn't go anywhere.
"The
developers of the virus know that we could download the program
beforehand,
analyse it and come up with countermeasures", says Hypponen. "So
apparently
their plan is to change the web address to point to the correct
address
or
addresses just seconds before the deadline. By the time we get a
copy
of downloaded installed authorities
and Anti-Virus
can F-Secure
is
asked
unsubscribe
 
J

Jonathan Maltz [MS-MVP]

According to Karl's original announcement it should be Sunday, no?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Bill Sanderson said:
I'm not sure I have all the details right, but it's clear that whoever is
behind this isn't done yet. There may be more to come from this iteration,
and most folks are predicting another iteration on September 11th.

Jonathan Maltz said:
Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Bill Sanderson said:
nah - what the worm was to get from the 20 machines was a pointer to another
machine. It never happened--the 20 machines were left pointing to a porn
site.

Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
Sunday
24
August 2003, computers that are currently infected with the
Sobig.F
worm
will be directed by the worm to connect to the Internet and then
download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus authors are
not
making the download executable available until the attack begins.

Antivirus updates downloaded August 19 or later should detect Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as well as 995
through 999 UDP [the former for command and control outbound from the
infected device possibly involving the "master servers," the others
opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones the worm
will
attempt to download from, but this list is not yet public
information
as
far
as I know. Reportedly it may be on www.google.com/groups, but I didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123 [NTP] to check the
time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the following file
and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this mystery
program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the F-secure.com
mailing
list [though it's corroborated by the Symantec web site as well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on Friday at 19:00
UTC

F-Secure Corporation is warning about a new level of attack to be
unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most
widespread
worm
in
the world, has created massive e-mail outages globally since it was
found
on
Tuesday the 18th of August - four days ago. The worm spreads
itself
via
infected e-mail attachments in e-mails with a spoofed sender address.
Total
amount of infected e-mails seen in the Internet since this attack
started
is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its sleeve. All the
infected computers are entering a second phase today, on Friday
the
22nd
of
August, 2003. These computers are using atom clocks to synchronize the
activation to start exactly at the same time around the world: at
19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on Saturday in
Sydney).

On this moment, the worm starts to connect to machines found from an
encrypted list hidden in the virus body. The list contains the address
of
20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs, connected to the
Internet
with always-on DSL connections", says Mikko Hypponen, Director of
Anti-Virus
Research at F-Secure. "Most likely the party behind Sobig.F has broken
into
these computers and they are now being misused to be part of this
attack".

The worm connects to one of these 20 servers and authenticates itself
with
a
secret 8-byte code. The servers respond with a web address. Infected
machines
download a program from this address - and run it. At this moment
it
is
completely unknown what this mystery program will do.

F-Secure has been able to break into this system and crack the
encryption,
but currently the web address sent by the servers doesn't go anywhere.
"The
developers of the virus know that we could download the program
beforehand,
analyse it and come up with countermeasures", says Hypponen. "So
apparently
their plan is to change the web address to point to the correct address
or
addresses just seconds before the deadline. By the time we get a
copy
of
the
file, the infected computers have already downloaded and run it".

Right now, nobody knows what this program does. It could do
damage,
like
deleting files or unleash network attacks. Earlier versions of Sobig
have
executed similar but simpler routines. With Sobig.E, the worm downloaded
a
program which removed the virus itself (to hide its tracks), and then
started
to steal users network and web passwords. After this the worm installed
a
hidden email proxy, which has been used by various spammers to send
their
bulk commercial emails through these machines without the owners
of
the
computers knowing anything about it. Sobig.F might do something
similar -
but
we won't know until 19:00 UTC today.

"As soon as we were able to crack the encryption used by the worm to
hide
the
list of the 20 machines, we've been trying to close them down", explains
Mikko Hypponen. F-Secure has been working with officials, authorities
and
various CERT organizations to disconnect these machines from the
Internet.
"Unfortunately, the writers of this virus have been waiting for this
move
too." These 20 machines are chosen from the networks of different
operators,
making it quite likely that there won't be enough time to take
them
all
down
by 19:00 UTC. Even if just one stays up, it will be enough for the worm.

The advanced techniques used by the worm make it quite obvious
it's
not
written by a typical teenage virus writer. The fact that previous Sobig
variants we're used by spammers on a large scale adds an element of
financial
gain. Who's behind all this? "Looks like organized crime to me",
comments
Mikko Hypponen.

F-Secure is monitoring the Sobig.F developments through the night on
Friday
the 22nd. Updates will be posted to Sobig.F's virus description at
http://www.f-secure.com/v-descs/sobig_f.shtml


F-Secure Anti-Virus can detect and stop this worm. F-Secure Anti-Virus
can
be
downloaded from http://www.f-secure.com

About F-Secure

F-Secure Corporation is the leading provider of centrally managed
security
solutions for the mobile enterprise. The company's award-winning
products
include antivirus, file encryption and network security solutions for
major
platforms from desktops to servers and from laptops to handhelds.
Founded
in
1988, F-Secure has been listed on the Helsinki Exchanges since November
1999.
The company is headquartered in Helsinki, Finland, with the North
American
headquarters in San Jose, California, as well as offices in Germany,
Sweden,
Japan and the United Kingdom and regional offices in the USA. F-Secure
is
supported by a network of value added resellers and distributors
in
over
90
countries around the globe. Through licening and distribution
agreements,
the
company's security applications are available for the products of the
leading
handheld equipment manufacturers, such as Nokia and HP.

Finland:
F-Secure Corporation
Mikko Hypponen, Director, Anti-Virus Research
PL 24
FIN-00181 Helsinki
Tel +358 9 2520 5513
Fax. +358 9 2520 5001
Email (e-mail address removed)


For more information, please contact:

Media contact in the USA:
F-Secure Inc.
Heather Deem,
675 N. First Street, 5th Floor
San Jose, CA 95112
Tel +1 408 350 2178
Fax +1 408 938 6701
Email (e-mail address removed)


http://www.F-Secure.com/


Mailing list policy

You have previously expressed interest in our products, or have
asked
to
be
included on one of our press release lists by personally giving us your
e-mail address for this purpose. Our mailing list are for the exclusive
use
and the expressed purpose of F-Secure and are not sold or given to third
parties.

If you no longer wish to receive our press releases, or your email
address
has been added to our lists without your consent, you can
unsubscribe
at
http://www.F-Secure.com/news/subscribe.html

If you only wish to receive our press releases concerning viruses,
please go to
http://www.F-Secure.com/news/subscribe.html
and first unsubscribe from
(e-mail address removed)-Secure.com
and then subscribe to
(e-mail address removed)-Secure.com

*****************************************
Jaana Sirkiä, Communications Manager
F-Secure Corporation
PL 24
FIN 00181-Helsinki
Tel. +358 9 2520 5290
Fax +358 9 2520 5018
Mobile +358 400 303096
http://www.F-Secure.com
*******************************************
 
J

Jonathan Maltz [MS-MVP]

Oh. :-/

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Bill Sanderson said:
Right--the present sobig-F will have another go on Sunday. However, the
present sobig version apparently dies on 9/10, and past experience leads
experts to expect a replacement.......

Jonathan Maltz said:
According to Karl's original announcement it should be Sunday, no?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Bill Sanderson said:
I'm not sure I have all the details right, but it's clear that whoever is
behind this isn't done yet. There may be more to come from this iteration,
and most folks are predicting another iteration on September 11th.

Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


nah - what the worm was to get from the 20 machines was a pointer to
another
machine. It never happened--the 20 machines were left pointing to a
porn
site.

Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will
be
deleted without reading.



Relatively new information about the Sobig.F worm activity happening
TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and Sunday
24
August 2003, computers that are currently infected with the Sobig.F
worm
will be directed by the worm to connect to the Internet and then
download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus authors
are
not
making the download executable available until the attack begins.

Antivirus updates downloaded August 19 or later should detect
Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as well as
995
through 999 UDP [the former for command and control outbound from
the
infected device possibly involving the "master servers," the others
opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones
the
worm
will
attempt to download from, but this list is not yet public
information
as
far
as I know. Reportedly it may be on www.google.com/groups, but I
didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123 [NTP] to check
the
time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the following
file
and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this mystery
program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the F-secure.com
mailing
list [though it's corroborated by the Symantec web site as well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on Friday at
19:00
UTC

F-Secure Corporation is warning about a new level of attack to be
unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most widespread
worm
in
the world, has created massive e-mail outages globally since
it
was
found
on
Tuesday the 18th of August - four days ago. The worm spreads itself
via
infected e-mail attachments in e-mails with a spoofed sender
address.
Total
amount of infected e-mails seen in the Internet since this attack
started
is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its sleeve. All
the
infected computers are entering a second phase today, on
Friday
the
22nd
of
August, 2003. These computers are using atom clocks to synchronize
the
activation to start exactly at the same time around the world: at
19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on
Saturday
in from moment owners
of worm for
this element
of night
description
at distributors
in
giving
given
 
O

Ogre

I wonder how bad this problem would be if the majority of home users
installed a firewall program or some kind of layered defence. I was talking
to a DSL user the other night and I asked him what firewall he was using, he
replied ''What is a firewall?''

From what I can see the worm needs unrestricted access to the TCP/UDP
communication Ports, access to the important Run sections of the Registry
and it needs to be able to execute a foreign program on the infected host.
Would this worm be successful if a user was running a properly configured
firewall ? would it be able to add itself to the Registry Run sections if
the user was running a program which monitored these sections ? (Regprot or
GuardDog)

Could the worm execute if the user was running a program such as Abtrusion
Protector or System Safety Monitor (free). Both of these programs alert the
user upon unauthorised programs trying to execute.

I think these increasing worm attacks will always be effective as long as
the (majority) home user is unaware of the importance of computer security
and a layered defence. If I understand right, SoBig.F requires the user to
click on an unknown attachment in their email in order to be able to
execute/infect. Regardless of Anti-Virus updates or patches, these attacks
will always be successful unless the average user does something about it. I
think proactive solutions such as sandboxing (ww.finjan.com) could be more
effective than reactive solutions such as AntiVirus.




Jonathan Maltz said:
Oh. :-/

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Bill Sanderson said:
Right--the present sobig-F will have another go on Sunday. However, the
present sobig version apparently dies on 9/10, and past experience leads
experts to expect a replacement.......

Jonathan Maltz said:
According to Karl's original announcement it should be Sunday, no?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


I'm not sure I have all the details right, but it's clear that
whoever
is
behind this isn't done yet. There may be more to come from this
iteration,
and most folks are predicting another iteration on September 11th.

Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


nah - what the worm was to get from the 20 machines was a
pointer
to
a
porn
site.

Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


message

Relatively new information about the Sobig.F worm activity
happening
TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and
Sunday
24
August 2003, computers that are currently infected with the
Sobig.F
worm
will be directed by the worm to connect to the Internet and then
download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus authors
are
not
making the download executable available until the attack begins.

Antivirus updates downloaded August 19 or later should detect
Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as
well
as
995
through 999 UDP [the former for command and control outbound from
the
infected device possibly involving the "master servers," the
others
opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones the
worm
will
attempt to download from, but this list is not yet public
information
as
far
as I know. Reportedly it may be on www.google.com/groups,
but
I
didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123 [NTP] to check
the
time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the following
file
and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this mystery
program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the F-secure.com
mailing
list [though it's corroborated by the Symantec web site as well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack
starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on
Friday
at to
be sleeve.
All world:
at Saturday Director
of
get
a for
the description products
of giving given
 
J

Jonathan Maltz [MS-MVP]

If every user had a good firewall and AV, then this, and many other, worms
wouldn't spread. In this case, it connected to other servers (well, it was
supposed to) so a good firewall would've blocked that. In the case of
Blaster, that spread by connecting to other computers, so that would've been
stopped as well

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Ogre said:
I wonder how bad this problem would be if the majority of home users
installed a firewall program or some kind of layered defence. I was talking
to a DSL user the other night and I asked him what firewall he was using, he
replied ''What is a firewall?''

From what I can see the worm needs unrestricted access to the TCP/UDP
communication Ports, access to the important Run sections of the Registry
and it needs to be able to execute a foreign program on the infected host.
Would this worm be successful if a user was running a properly configured
firewall ? would it be able to add itself to the Registry Run sections if
the user was running a program which monitored these sections ? (Regprot or
GuardDog)

Could the worm execute if the user was running a program such as Abtrusion
Protector or System Safety Monitor (free). Both of these programs alert the
user upon unauthorised programs trying to execute.

I think these increasing worm attacks will always be effective as long as
the (majority) home user is unaware of the importance of computer security
and a layered defence. If I understand right, SoBig.F requires the user to
click on an unknown attachment in their email in order to be able to
execute/infect. Regardless of Anti-Virus updates or patches, these attacks
will always be successful unless the average user does something about it. I
think proactive solutions such as sandboxing (ww.finjan.com) could be more
effective than reactive solutions such as AntiVirus.




Jonathan Maltz said:
Oh. :-/

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Bill Sanderson said:
Right--the present sobig-F will have another go on Sunday. However, the
present sobig version apparently dies on 9/10, and past experience leads
experts to expect a replacement.......

According to Karl's original announcement it should be Sunday, no?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


I'm not sure I have all the details right, but it's clear that whoever
is
behind this isn't done yet. There may be more to come from this
iteration,
and most folks are predicting another iteration on September 11th.

Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will
be
deleted without reading.


nah - what the worm was to get from the 20 machines was a
pointer
to
another
machine. It never happened--the 20 machines were left
pointing
to
a
porn
site.

Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask
for,
it
will
be
deleted without reading.


message

Relatively new information about the Sobig.F worm activity
happening
TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and
Sunday
24
August 2003, computers that are currently infected with the
Sobig.F
worm
will be directed by the worm to connect to the Internet
and
then
download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus
authors
are
not
making the download executable available until the attack
begins.

Antivirus updates downloaded August 19 or later should detect
Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as well
as
995
through 999 UDP [the former for command and control outbound
from
the
infected device possibly involving the "master servers," the
others
opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the
ones
the
worm
will
attempt to download from, but this list is not yet public
information
as
far
as I know. Reportedly it may be on www.google.com/groups,
but
I
didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123 [NTP] to
check
the
time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the following
file
and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this
mystery
program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the
F-secure.com
mailing
list [though it's corroborated by the Symantec web site as
well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack
starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on
Friday
at
19:00
UTC

F-Secure Corporation is warning about a new level of
attack
to since
it to
the Sobig.F
has Hypponen.
"So get
versions
of tracks),
and
spammers
to from
the waiting
for to
me",
 
S

svaardt

It's a pity Microsoft couldnt post a patch for their OS's to include better
security by default or to make it simpler for an end-user to enable
security.

perhaps Something like:

Enable Security:
* I know nothing of security do it for me:
This machine is :
* a standalone machine connected to the Internet
* connects directly to the internet and to one of more of my home
machines

* I have a medium level of knowledge about security
...

* I am a security expert let me change all items
...




Jonathan Maltz said:
If every user had a good firewall and AV, then this, and many other, worms
wouldn't spread. In this case, it connected to other servers (well, it was
supposed to) so a good firewall would've blocked that. In the case of
Blaster, that spread by connecting to other computers, so that would've been
stopped as well

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Ogre said:
I wonder how bad this problem would be if the majority of home users
installed a firewall program or some kind of layered defence. I was talking
to a DSL user the other night and I asked him what firewall he was
using,
he
replied ''What is a firewall?''

From what I can see the worm needs unrestricted access to the TCP/UDP
communication Ports, access to the important Run sections of the Registry
and it needs to be able to execute a foreign program on the infected host.
Would this worm be successful if a user was running a properly configured
firewall ? would it be able to add itself to the Registry Run sections if
the user was running a program which monitored these sections ? (Regprot or
GuardDog)

Could the worm execute if the user was running a program such as Abtrusion
Protector or System Safety Monitor (free). Both of these programs alert the
user upon unauthorised programs trying to execute.

I think these increasing worm attacks will always be effective as long as
the (majority) home user is unaware of the importance of computer security
and a layered defence. If I understand right, SoBig.F requires the user to
click on an unknown attachment in their email in order to be able to
execute/infect. Regardless of Anti-Virus updates or patches, these attacks
will always be successful unless the average user does something about
it.
I
think proactive solutions such as sandboxing (ww.finjan.com) could be more
effective than reactive solutions such as AntiVirus.




Jonathan Maltz said:
Oh. :-/

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Right--the present sobig-F will have another go on Sunday. However, the
present sobig version apparently dies on 9/10, and past experience leads
experts to expect a replacement.......

According to Karl's original announcement it should be Sunday, no?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


I'm not sure I have all the details right, but it's clear that whoever
is
behind this isn't done yet. There may be more to come from this
iteration,
and most folks are predicting another iteration on September 11th.

Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


nah - what the worm was to get from the 20 machines was a pointer
to
another
machine. It never happened--the 20 machines were left
pointing
to
a
porn
site.

Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask
for,
it
will
be
deleted without reading.


message

Relatively new information about the Sobig.F worm activity
happening
TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and
Sunday
24
August 2003, computers that are currently infected with the
Sobig.F
worm
will be directed by the worm to connect to the Internet and
then
download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus
authors
are
not
making the download executable available until the attack
begins.

Antivirus updates downloaded August 19 or later should detect
Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998
as
well
as
995
through 999 UDP [the former for command and control outbound
from
the
infected device possibly involving the "master servers," the
others
opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones
the
worm
will
attempt to download from, but this list is not yet public
information
as
far
as I know. Reportedly it may be on
www.google.com/groups,
but
I
didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123
[NTP]
to
check
the
time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the
following
file
and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this
mystery
program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the
F-secure.com
mailing
list [though it's corroborated by the Symantec web site as
well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack
starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on Friday
at
19:00
UTC

F-Secure Corporation is warning about a new level of
attack
to
be
unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most
widespread
worm
in
the world, has created massive e-mail outages globally since
it
was
found
on
Tuesday the 18th of August - four days ago. The worm spreads
itself
via
infected e-mail attachments in e-mails with a spoofed sender
address.
Total
amount of infected e-mails seen in the Internet since this
attack
started
is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its sleeve.
All
the
infected computers are entering a second phase today, on
Friday
the
22nd
of
August, 2003. These computers are using atom clocks to
synchronize
the
activation to start exactly at the same time around the world:
at
19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on
Saturday
in
Sydney).

On this moment, the worm starts to connect to machines found
from
an
encrypted list hidden in the virus body. The list
contains
the
address
of
20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs,
connected
part
of crack
the
doesn't
go we
get versions spammers to
take enough
for for
the
 
J

Jonathan Maltz [MS-MVP]

They have a balloon that says "we downloaded updates now click to install
them" already by default. If they just sporadically rebooted users
machines, then they'd be yelled at, and it seems if they _don't_ reboot
user's machines, then they get screamed at as well, catch 22

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


svaardt said:
It's a pity Microsoft couldnt post a patch for their OS's to include better
security by default or to make it simpler for an end-user to enable
security.

perhaps Something like:

Enable Security:
* I know nothing of security do it for me:
This machine is :
* a standalone machine connected to the Internet
* connects directly to the internet and to one of more of my home
machines

* I have a medium level of knowledge about security
...

* I am a security expert let me change all items
...




Jonathan Maltz said:
If every user had a good firewall and AV, then this, and many other, worms
wouldn't spread. In this case, it connected to other servers (well, it was
supposed to) so a good firewall would've blocked that. In the case of
Blaster, that spread by connecting to other computers, so that would've been
stopped as well

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Ogre said:
I wonder how bad this problem would be if the majority of home users
installed a firewall program or some kind of layered defence. I was talking
to a DSL user the other night and I asked him what firewall he was
using,
he
replied ''What is a firewall?''

From what I can see the worm needs unrestricted access to the TCP/UDP
communication Ports, access to the important Run sections of the Registry
and it needs to be able to execute a foreign program on the infected host.
Would this worm be successful if a user was running a properly configured
firewall ? would it be able to add itself to the Registry Run sections if
the user was running a program which monitored these sections ?
(Regprot
or
GuardDog)

Could the worm execute if the user was running a program such as Abtrusion
Protector or System Safety Monitor (free). Both of these programs
alert
the
user upon unauthorised programs trying to execute.

I think these increasing worm attacks will always be effective as long as
the (majority) home user is unaware of the importance of computer security
and a layered defence. If I understand right, SoBig.F requires the
user
to
click on an unknown attachment in their email in order to be able to
execute/infect. Regardless of Anti-Virus updates or patches, these attacks
will always be successful unless the average user does something about
it.
I
think proactive solutions such as sandboxing (ww.finjan.com) could be more
effective than reactive solutions such as AntiVirus.




Oh. :-/

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


Right--the present sobig-F will have another go on Sunday.
However,
the
present sobig version apparently dies on 9/10, and past experience leads
experts to expect a replacement.......

According to Karl's original announcement it should be Sunday, no?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will
be
deleted without reading.


I'm not sure I have all the details right, but it's clear that
whoever
is
behind this isn't done yet. There may be more to come from this
iteration,
and most folks are predicting another iteration on September 11th.

Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask
for,
it
will
be
deleted without reading.


message
nah - what the worm was to get from the 20 machines was a
pointer
to
another
machine. It never happened--the 20 machines were left pointing
to
a
porn
site.

Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for,
it
will
be
deleted without reading.


"Karl Levinson [x y] mvp" <[email protected]>
wrote
in
message

Relatively new information about the Sobig.F worm activity
happening
TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August
2003
and
Sunday
24
August 2003, computers that are currently infected
with
the
Sobig.F
worm
will be directed by the worm to connect to the
Internet
and
then
download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus
authors
are
not
making the download executable available until the attack
begins.

Antivirus updates downloaded August 19 or later should
detect
Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as
well
as
995
through 999 UDP [the former for command and control outbound
from
the
infected device possibly involving the "master
servers,"
the
others
opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones
the
worm
will
attempt to download from, but this list is not yet public
information
as
far
as I know. Reportedly it may be on www.google.com/groups,
but
I
didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123
[NTP]
to
check
the
time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the
following
file
and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this
mystery
program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the
F-secure.com
mailing
list [though it's corroborated by the Symantec web
site
as
well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack
starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on
Friday
at
19:00
UTC

F-Secure Corporation is warning about a new level of attack
to
be
unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most
widespread
worm
in
the world, has created massive e-mail outages globally since
it
was
found
on
Tuesday the 18th of August - four days ago. The worm spreads
itself
via
infected e-mail attachments in e-mails with a spoofed sender
address.
Total
amount of infected e-mails seen in the Internet since this
attack
started
is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its
sleeve.
All
the
infected computers are entering a second phase today, on
Friday
the
22nd
of
August, 2003. These computers are using atom clocks to
synchronize
the
activation to start exactly at the same time around the
world:
at
19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on
Saturday
in
Sydney).

On this moment, the worm starts to connect to machines found
from
an
encrypted list hidden in the virus body. The list contains
the
address
of
20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs,
connected
to
the
Internet
with always-on DSL connections", says Mikko Hypponen,
Director
of
Anti-Virus
Research at F-Secure. "Most likely the party behind Sobig.F
has
broken
into
these computers and they are now being misused to be
part
of
this
attack".

The worm connects to one of these 20 servers and
authenticates
itself
with
a
secret 8-byte code. The servers respond with a web address.
Infected
machines
download a program from this address - and run it. At this
moment
it
is
completely unknown what this mystery program will do.

F-Secure has been able to break into this system and crack
the
encryption,
but currently the web address sent by the servers
doesn't
go
anywhere.
"The
developers of the virus know that we could download the
program
beforehand,
analyse it and come up with countermeasures", says Hypponen.
"So
apparently
their plan is to change the web address to point to the
correct
address
or
addresses just seconds before the deadline. By the
time
we and
run could
do by
the machines
from crime
to through
the with
the offices
in
products,
or or
your
 
B

Bill Sanderson

XP is the only Microsoft OS which includes firewall functionality.

The firewall is not turned on by default. This may change with future OS
versions, and even future SP's on XP, I suspect.

However, in lieu of turning the firewall on by default, there's the network
configuration wizard which, if the network is accurately described, will
turn on the firewall on the appropriate Internet connection. This wizard is
about as close to your suggestion as we have so far. It seemed a good
compromise at the time (avoid firewalling interfaces used for file and print
sharing, thus breaking that, but learn from the user which interface is the
Internet-facing one and firewall that.)

I've no clear idea what proportion of XP Pro installs which could be
firewalled (i.e. they are not behind cable modems hooked directly to hubs,
for example), in fact are--I would guess most, but I've never seen it
discussed.

svaardt said:
It's a pity Microsoft couldnt post a patch for their OS's to include better
security by default or to make it simpler for an end-user to enable
security.

perhaps Something like:

Enable Security:
* I know nothing of security do it for me:
This machine is :
* a standalone machine connected to the Internet
* connects directly to the internet and to one of more of my home
machines

* I have a medium level of knowledge about security
...

* I am a security expert let me change all items
...




Jonathan Maltz said:
If every user had a good firewall and AV, then this, and many other, worms
wouldn't spread. In this case, it connected to other servers (well, it was
supposed to) so a good firewall would've blocked that. In the case of
Blaster, that spread by connecting to other computers, so that would've been
stopped as well

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Ogre said:
I wonder how bad this problem would be if the majority of home users
installed a firewall program or some kind of layered defence. I was talking
to a DSL user the other night and I asked him what firewall he was
using,
he
replied ''What is a firewall?''

From what I can see the worm needs unrestricted access to the TCP/UDP
communication Ports, access to the important Run sections of the Registry
and it needs to be able to execute a foreign program on the infected host.
Would this worm be successful if a user was running a properly configured
firewall ? would it be able to add itself to the Registry Run sections if
the user was running a program which monitored these sections ?
(Regprot
or
GuardDog)

Could the worm execute if the user was running a program such as Abtrusion
Protector or System Safety Monitor (free). Both of these programs
alert
the
user upon unauthorised programs trying to execute.

I think these increasing worm attacks will always be effective as long as
the (majority) home user is unaware of the importance of computer security
and a layered defence. If I understand right, SoBig.F requires the
user
to
click on an unknown attachment in their email in order to be able to
execute/infect. Regardless of Anti-Virus updates or patches, these attacks
will always be successful unless the average user does something about
it.
I
think proactive solutions such as sandboxing (ww.finjan.com) could be more
effective than reactive solutions such as AntiVirus.




Oh. :-/

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


Right--the present sobig-F will have another go on Sunday.
However,
the
present sobig version apparently dies on 9/10, and past experience leads
experts to expect a replacement.......

According to Karl's original announcement it should be Sunday, no?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will
be
deleted without reading.


I'm not sure I have all the details right, but it's clear that
whoever
is
behind this isn't done yet. There may be more to come from this
iteration,
and most folks are predicting another iteration on September 11th.

Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask
for,
it
will
be
deleted without reading.


message
nah - what the worm was to get from the 20 machines was a
pointer
to
another
machine. It never happened--the 20 machines were left pointing
to
a
porn
site.

Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for,
it
will
be
deleted without reading.


"Karl Levinson [x y] mvp" <[email protected]>
wrote
in
message

Relatively new information about the Sobig.F worm activity
happening
TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August
2003
and
Sunday
24
August 2003, computers that are currently infected
with
the
Sobig.F
worm
will be directed by the worm to connect to the
Internet
and
then
download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus
authors
are
not
making the download executable available until the attack
begins.

Antivirus updates downloaded August 19 or later should
detect
Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as
well
as
995
through 999 UDP [the former for command and control outbound
from
the
infected device possibly involving the "master
servers,"
the
others
opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones
the
worm
will
attempt to download from, but this list is not yet public
information
as
far
as I know. Reportedly it may be on www.google.com/groups,
but
I
didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123
[NTP]
to
check
the
time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the
following
file
and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this
mystery
program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the
F-secure.com
mailing
list [though it's corroborated by the Symantec web
site
as
well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack
starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on
Friday
at
19:00
UTC

F-Secure Corporation is warning about a new level of attack
to
be
unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most
widespread
worm
in
the world, has created massive e-mail outages globally since
it
was
found
on
Tuesday the 18th of August - four days ago. The worm spreads
itself
via
infected e-mail attachments in e-mails with a spoofed sender
address.
Total
amount of infected e-mails seen in the Internet since this
attack
started
is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its
sleeve.
All
the
infected computers are entering a second phase today, on
Friday
the
22nd
of
August, 2003. These computers are using atom clocks to
synchronize
the
activation to start exactly at the same time around the
world:
at
19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on
Saturday
in
Sydney).

On this moment, the worm starts to connect to machines found
from
an
encrypted list hidden in the virus body. The list contains
the
address
of
20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs,
connected
to
the
Internet
with always-on DSL connections", says Mikko Hypponen,
Director
of
Anti-Virus
Research at F-Secure. "Most likely the party behind Sobig.F
has
broken
into
these computers and they are now being misused to be
part
of
this
attack".

The worm connects to one of these 20 servers and
authenticates
itself
with
a
secret 8-byte code. The servers respond with a web address.
Infected
machines
download a program from this address - and run it. At this
moment
it
is
completely unknown what this mystery program will do.

F-Secure has been able to break into this system and crack
the
encryption,
but currently the web address sent by the servers
doesn't
go
anywhere.
"The
developers of the virus know that we could download the
program
beforehand,
analyse it and come up with countermeasures", says Hypponen.
"So
apparently
their plan is to change the web address to point to the
correct
address
or
addresses just seconds before the deadline. By the
time
we and
run could
do by
the machines
from crime
to through
the with
the offices
in
products,
or or
your
 
K

Ken Schaefer

: XP is the only Microsoft OS which includes firewall functionality.


Doesn't Windows 2003 Server include this as well?


: The firewall is not turned on by default. This may change with future OS
: versions, and even future SP's on XP, I suspect.


When detecting network settings as part of the mini-setup, doesn't it get
enabled if you select the option that you're connecting to a broadband
connection? (not sure, since I always choose the other option for work
machines, and don't have XP connected to broadband at home)

Cheers
Ken
 
J

Jonathan Maltz [MS-MVP]

Windows Server 2003 has the XP firewall as well. Not something I'd
recommend for use on a server, however

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.
 
J

John E. Carty

But you'll never get people to stop opening suspicious attachments from
people they don't even know :-(


Jonathan Maltz said:
If every user had a good firewall and AV, then this, and many other, worms
wouldn't spread. In this case, it connected to other servers (well, it was
supposed to) so a good firewall would've blocked that. In the case of
Blaster, that spread by connecting to other computers, so that would've been
stopped as well

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Ogre said:
I wonder how bad this problem would be if the majority of home users
installed a firewall program or some kind of layered defence. I was talking
to a DSL user the other night and I asked him what firewall he was
using,
he
replied ''What is a firewall?''

From what I can see the worm needs unrestricted access to the TCP/UDP
communication Ports, access to the important Run sections of the Registry
and it needs to be able to execute a foreign program on the infected host.
Would this worm be successful if a user was running a properly configured
firewall ? would it be able to add itself to the Registry Run sections if
the user was running a program which monitored these sections ? (Regprot or
GuardDog)

Could the worm execute if the user was running a program such as Abtrusion
Protector or System Safety Monitor (free). Both of these programs alert the
user upon unauthorised programs trying to execute.

I think these increasing worm attacks will always be effective as long as
the (majority) home user is unaware of the importance of computer security
and a layered defence. If I understand right, SoBig.F requires the user to
click on an unknown attachment in their email in order to be able to
execute/infect. Regardless of Anti-Virus updates or patches, these attacks
will always be successful unless the average user does something about
it.
I
think proactive solutions such as sandboxing (ww.finjan.com) could be more
effective than reactive solutions such as AntiVirus.




Jonathan Maltz said:
Oh. :-/

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Right--the present sobig-F will have another go on Sunday. However, the
present sobig version apparently dies on 9/10, and past experience leads
experts to expect a replacement.......

According to Karl's original announcement it should be Sunday, no?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


I'm not sure I have all the details right, but it's clear that whoever
is
behind this isn't done yet. There may be more to come from this
iteration,
and most folks are predicting another iteration on September 11th.

Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


nah - what the worm was to get from the 20 machines was a pointer
to
another
machine. It never happened--the 20 machines were left
pointing
to
a
porn
site.

Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask
for,
it
will
be
deleted without reading.


message

Relatively new information about the Sobig.F worm activity
happening
TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August 2003 and
Sunday
24
August 2003, computers that are currently infected with the
Sobig.F
worm
will be directed by the worm to connect to the Internet and
then
download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus
authors
are
not
making the download executable available until the attack
begins.

Antivirus updates downloaded August 19 or later should detect
Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998
as
well
as
995
through 999 UDP [the former for command and control outbound
from
the
infected device possibly involving the "master servers," the
others
opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones
the
worm
will
attempt to download from, but this list is not yet public
information
as
far
as I know. Reportedly it may be on
www.google.com/groups,
but
I
didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123
[NTP]
to
check
the
time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the
following
file
and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this
mystery
program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the
F-secure.com
mailing
list [though it's corroborated by the Symantec web site as
well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack
starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on Friday
at
19:00
UTC

F-Secure Corporation is warning about a new level of
attack
to
be
unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most
widespread
worm
in
the world, has created massive e-mail outages globally since
it
was
found
on
Tuesday the 18th of August - four days ago. The worm spreads
itself
via
infected e-mail attachments in e-mails with a spoofed sender
address.
Total
amount of infected e-mails seen in the Internet since this
attack
started
is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its sleeve.
All
the
infected computers are entering a second phase today, on
Friday
the
22nd
of
August, 2003. These computers are using atom clocks to
synchronize
the
activation to start exactly at the same time around the world:
at
19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on
Saturday
in
Sydney).

On this moment, the worm starts to connect to machines found
from
an
encrypted list hidden in the virus body. The list
contains
the
address
of
20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs,
connected
part
of crack
the
doesn't
go we
get versions spammers to
take enough
for for
the
 
K

Karl Levinson [x y] mvp

Well, firewalls don't tend to block email viruses, and antivirus doesn't
tend to block worms that spread like wildfire on the first day or three.
The Grisoft antivirus that we recommend so much around here only updates
every week [or month?] by default, and if the computer is not on line at the
time, who knows if the antivirus even gets updated ever. If I remember
correctly, Sobig only came out last Tuesday and spread wildly that same day,
so some copies of AVG haven't even tried to run the update since then, so
that wouldn't be the user's fault. Also, AVG's updates are at least a MB in
size each time you run the update, a bit of a problem for 56K home users.

Most organizations probably only had a few hours on Tuesday after the
discovery of the virus to get all their antivirus updates in place, and in
an organization of thousands of computers, or a mother at work while her
children are at home on line, that just isn't enough time to react. A few
hours is barely enough time to send out an email warning people, let alone
reach all the company's antivirus server and internet email gateway
administrators and get them to reconfigure all their devices.

There are a LOT of large organizations that had both firewalls and antivirus
that got Sobig and other worms. So, the problem is a little trickier than
just blaming the victim. It may make sense to blame the victim if a patch
or update is a few months old, but not if the update is just a few hours or
days old.

Having said that, I think Norton's corporate edition update scheme is way
better than many of the update solutions out there [both in terms of ability
to roll out small mini-updates of just a few KB on demand at the last minute
and watch which devices don't have it yet in a central server log], so I
think those customers may be in a little better position to roll out large
numbers of updates on demand. Unfortunately, people keep buying other crap
that doesn't do automatic updates as well.
 
K

Karl Levinson [x y] mvp

They tried this with the Outlook Security Update that blocks attachments by
default. It was unpopular with many users and people come here every day
asking how to disable it, and then disable it.

The problem is that increased security equals decreased functionality, and
when you remove a Microsoft customer's functionality after they already
purchased it, they get grumpy, even if you try to clearly document and
announce the fact that they'll be losing this functionality on the download
page for the update. Also, three levels of security settings are not
necessarily enough to cover all the different situations out there, one set
of security settings that work for a home user is going to cause problems
for a corporate or roaming dual-location laptop user. Plus, one thing you'd
really need is a firewall, and you can't silently push a third party
firewall to, say, Windows 2000 and ME users. What if they're already
running or behind a firewall?


svaardt said:
It's a pity Microsoft couldnt post a patch for their OS's to include better
security by default or to make it simpler for an end-user to enable
security.

perhaps Something like:

Enable Security:
* I know nothing of security do it for me:
This machine is :
* a standalone machine connected to the Internet
* connects directly to the internet and to one of more of my home
machines

* I have a medium level of knowledge about security
...

* I am a security expert let me change all items
...




Jonathan Maltz said:
If every user had a good firewall and AV, then this, and many other, worms
wouldn't spread. In this case, it connected to other servers (well, it was
supposed to) so a good firewall would've blocked that. In the case of
Blaster, that spread by connecting to other computers, so that would've been
stopped as well

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will be
deleted without reading.


Ogre said:
I wonder how bad this problem would be if the majority of home users
installed a firewall program or some kind of layered defence. I was talking
to a DSL user the other night and I asked him what firewall he was
using,
he
replied ''What is a firewall?''

From what I can see the worm needs unrestricted access to the TCP/UDP
communication Ports, access to the important Run sections of the Registry
and it needs to be able to execute a foreign program on the infected host.
Would this worm be successful if a user was running a properly configured
firewall ? would it be able to add itself to the Registry Run sections if
the user was running a program which monitored these sections ?
(Regprot
or
GuardDog)

Could the worm execute if the user was running a program such as Abtrusion
Protector or System Safety Monitor (free). Both of these programs
alert
the
user upon unauthorised programs trying to execute.

I think these increasing worm attacks will always be effective as long as
the (majority) home user is unaware of the importance of computer security
and a layered defence. If I understand right, SoBig.F requires the
user
to
click on an unknown attachment in their email in order to be able to
execute/infect. Regardless of Anti-Virus updates or patches, these attacks
will always be successful unless the average user does something about
it.
I
think proactive solutions such as sandboxing (ww.finjan.com) could be more
effective than reactive solutions such as AntiVirus.




Oh. :-/

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


Right--the present sobig-F will have another go on Sunday.
However,
the
present sobig version apparently dies on 9/10, and past experience leads
experts to expect a replacement.......

According to Karl's original announcement it should be Sunday, no?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will
be
deleted without reading.


I'm not sure I have all the details right, but it's clear that
whoever
is
behind this isn't done yet. There may be more to come from this
iteration,
and most folks are predicting another iteration on September 11th.

Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask
for,
it
will
be
deleted without reading.


message
nah - what the worm was to get from the 20 machines was a
pointer
to
another
machine. It never happened--the 20 machines were left pointing
to
a
porn
site.

Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for,
it
will
be
deleted without reading.


"Karl Levinson [x y] mvp" <[email protected]>
wrote
in
message

Relatively new information about the Sobig.F worm activity
happening
TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22 August
2003
and
Sunday
24
August 2003, computers that are currently infected
with
the
Sobig.F
worm
will be directed by the worm to connect to the
Internet
and
then
download
and run a mystery program.

No one knows what this program will do. AFAIK, the virus
authors
are
not
making the download executable available until the attack
begins.

Antivirus updates downloaded August 19 or later should
detect
Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998 as
well
as
995
through 999 UDP [the former for command and control outbound
from
the
infected device possibly involving the "master
servers,"
the
others
opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the ones
the
worm
will
attempt to download from, but this list is not yet public
information
as
far
as I know. Reportedly it may be on www.google.com/groups,
but
I
didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123
[NTP]
to
check
the
time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the
following
file
and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of this
mystery
program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the
F-secure.com
mailing
list [though it's corroborated by the Symantec web
site
as
well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet attack
starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious program on
Friday
at
19:00
UTC

F-Secure Corporation is warning about a new level of attack
to
be
unleashed
by the Sobig.F worm today.

Windows e-mail worm Sobig.F, which is currently the most
widespread
worm
in
the world, has created massive e-mail outages globally since
it
was
found
on
Tuesday the 18th of August - four days ago. The worm spreads
itself
via
infected e-mail attachments in e-mails with a spoofed sender
address.
Total
amount of infected e-mails seen in the Internet since this
attack
started
is
close to 100 million.

However, the Sobig.F worm has a surprise attack in its
sleeve.
All
the
infected computers are entering a second phase today, on
Friday
the
22nd
of
August, 2003. These computers are using atom clocks to
synchronize
the
activation to start exactly at the same time around the
world:
at
19:00:00
UTC (12:00 in San Francisco, 20:00 in London, 05:00 on
Saturday
in
Sydney).

On this moment, the worm starts to connect to machines found
from
an
encrypted list hidden in the virus body. The list contains
the
address
of
20
computers located in USA, Canada and South Korea.

"These 20 machines seem to be typical home PCs,
connected
to
the
Internet
with always-on DSL connections", says Mikko Hypponen,
Director
of
Anti-Virus
Research at F-Secure. "Most likely the party behind Sobig.F
has
broken
into
these computers and they are now being misused to be
part
of
this
attack".

The worm connects to one of these 20 servers and
authenticates
itself
with
a
secret 8-byte code. The servers respond with a web address.
Infected
machines
download a program from this address - and run it. At this
moment
it
is
completely unknown what this mystery program will do.

F-Secure has been able to break into this system and crack
the
encryption,
but currently the web address sent by the servers
doesn't
go
anywhere.
"The
developers of the virus know that we could download the
program
beforehand,
analyse it and come up with countermeasures", says Hypponen.
"So
apparently
their plan is to change the web address to point to the
correct
address
or
addresses just seconds before the deadline. By the
time
we and
run could
do by
the machines
from crime
to through
the with
the offices
in
products,
or or
your
 
B

Bill Sanderson

You are quite right about TCP/IP filtering. It is there, but how many
end-users will know how to use it?

I think the tool that MS has developed that comes closest to your thinking
is the MBSA--Microsoft Baseline Security Analyzer. It's no panacea,
though--it's real work to go through and understand what it is reporting and
figure out how to make the changes it recommends through a variety of
different UI's.

svaardt said:
WRONG.

What about the TCP/IP filtering, this is a form of firewalling... sadly it
isnt implemented properly. Interestingly if you're in the UK, I think
according to the 1974 Trade Descriptions act, you could sue and win a case
against MS for improper labelling on this tab.... anyone willing to try ?
Why because the tab says is blocks the IP protocol numbers you enter... but
it doesnt blcok #1.

Back to my 3 Levels of security. 3 Maybe too simplistic - but more than 7
and you're too complicated - GUI studies have shown this to be true, I
never mentioned the default level it could be OFF for all I care, just so
long as its there to make setup easier. And the setup could emcompass all MS
security - policy settings, TCP/IP settings etc...it's all too piecemeal at
the moment, and they consider themselves focusing on security... it's not
the business users that cause WORMs but the End Users who havent the time to
learn about the intricies of MS security.. no wonder Linux does well - its
easier to setup and install, but..... lacks the wide spread applications at
the moment... if the MS office team were going to hedge themselves I'd bet
that they'd be developing a linux version of office at the moment. No I
am not starting a Linux vs MS discussion that's pointless - the MS King
rules everywhere - but the subjects are currently beginning to ask
questions... who knows revolution is in the wings...



Steve




Bill Sanderson said:
XP is the only Microsoft OS which includes firewall functionality.

The firewall is not turned on by default. This may change with future OS
versions, and even future SP's on XP, I suspect.

However, in lieu of turning the firewall on by default, there's the network
configuration wizard which, if the network is accurately described, will
turn on the firewall on the appropriate Internet connection. This
wizard
is
about as close to your suggestion as we have so far. It seemed a good
compromise at the time (avoid firewalling interfaces used for file and print
sharing, thus breaking that, but learn from the user which interface is the
Internet-facing one and firewall that.)

I've no clear idea what proportion of XP Pro installs which could be
firewalled (i.e. they are not behind cable modems hooked directly to hubs,
for example), in fact are--I would guess most, but I've never seen it
discussed.

svaardt said:
It's a pity Microsoft couldnt post a patch for their OS's to include better
security by default or to make it simpler for an end-user to enable
security.

perhaps Something like:

Enable Security:
* I know nothing of security do it for me:
This machine is :
* a standalone machine connected to the Internet
* connects directly to the internet and to one of more of my home
machines

* I have a medium level of knowledge about security
...

* I am a security expert let me change all items
...




If every user had a good firewall and AV, then this, and many other, worms
wouldn't spread. In this case, it connected to other servers (well, it
was
supposed to) so a good firewall would've blocked that. In the case of
Blaster, that spread by connecting to other computers, so that would've
been
stopped as well

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it
will
be
deleted without reading.


I wonder how bad this problem would be if the majority of home users
installed a firewall program or some kind of layered defence. I was
talking
to a DSL user the other night and I asked him what firewall he was
using,
he
replied ''What is a firewall?''

From what I can see the worm needs unrestricted access to the TCP/UDP
communication Ports, access to the important Run sections of the
Registry
and it needs to be able to execute a foreign program on the infected
host.
Would this worm be successful if a user was running a properly
configured
firewall ? would it be able to add itself to the Registry Run sections
if
the user was running a program which monitored these sections ? (Regprot
or
GuardDog)

Could the worm execute if the user was running a program such as
Abtrusion
Protector or System Safety Monitor (free). Both of these programs alert
the
user upon unauthorised programs trying to execute.

I think these increasing worm attacks will always be effective as long
as
the (majority) home user is unaware of the importance of computer
security
and a layered defence. If I understand right, SoBig.F requires the user
to
click on an unknown attachment in their email in order to be able to
execute/infect. Regardless of Anti-Virus updates or patches, these
attacks
will always be successful unless the average user does something about
it.
I
think proactive solutions such as sandboxing (ww.finjan.com) could be
more
effective than reactive solutions such as AntiVirus.




Oh. :-/

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual, step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for, it will
be
deleted without reading.


Right--the present sobig-F will have another go on Sunday. However,
the
present sobig version apparently dies on 9/10, and past experience
leads
experts to expect a replacement.......

According to Karl's original announcement it should be
Sunday,
no?
--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask
for,
it
will
be
deleted without reading.


message
I'm not sure I have all the details right, but it's clear that
whoever
is
behind this isn't done yet. There may be more to come
from
this
iteration,
and most folks are predicting another iteration on September
11th.

Ah, I see...heh

Thanks for the info

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask for,
it
will
be
deleted without reading.


was
a
pointer
to
another
machine. It never happened--the 20 machines were left
pointing
to
a
porn
site.

Anyone find out what this mystery EXE is?

--
--Jonathan Maltz [Microsoft MVP - Windows Server]
http://www.imbored.biz - A Windows Server 2003 visual,
step-by-step
tutorial site :)
Only reply by newsgroup. If I see an email I didn't ask
for,
it
will
be
deleted without reading.


in
message

Relatively new information about the Sobig.F worm
activity
happening
TODAY:

Around 3:00pm to 6:00pm today EST, Friday 22
August
2003
and
Sunday
24
August 2003, computers that are currently infected with
the
Sobig.F
worm
will be directed by the worm to connect to the Internet
and
then
download
and run a mystery program.

No one knows what this program will do. AFAIK, the
virus
authors
are
not
making the download executable available until the
attack
begins.

Antivirus updates downloaded August 19 or later should
detect
Sobig.F.

The Sobig.F worm is believed to use the ports UDP 8998
as
well
as
995
through 999 UDP [the former for command and control
outbound
from
the
infected device possibly involving the "master servers,"
the
others
opened
and listening inbound on the infected workstation].

There is a list of the host names and IP addresses the
ones
the
worm
will
attempt to download from, but this list is not yet
public
information
as
far
as I know. Reportedly it may be on
www.google.com/groups,
but
I
didn't
see
it when I searched.

Sobig.F infected machines may be using UDP port 123
[NTP]
to
check
the
time
once per hour from one of the time servers below:

200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21

A workstation infected with Sobig.F should contain the
following
file
and
registry entries:

%windir%\winppr32.exe e.g. c:\winnt\winppr32.exe

[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc


As new information is discovered about the purpose of
this
mystery
program
download, it will be posted at the sites below:

http://www.f-secure.com/v-descs/sobig_f.shtml
http://securityresponse.symantec.co.../virusencyclo/default5.asp?VName=WORM_SOBIG.F
&VSect=T
http://vil.nai.com/vil/content/v_100561.htm


I received this information pretty much only from the
F-secure.com
mailing
list [though it's corroborated by the Symantec web site
as
well].






-----Original Message-----
From: Sirkia, Jaana [mailto:[email protected]]
Sent: Friday, August 22, 2003 8:38 AM
To: (e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com;
(e-mail address removed)-Secure.com
Subject: MEDIA RELEASE:A potentially massive Internet
attack
starts
today





This press release comes from F-Secure. For more
information on F-Secure's mailing list policy,
see end of message.

PRESS RELEASE

August 22, 2003

A potentially massive Internet attack starts today
Sobig.F downloads and executes a mysterious
program
on the
most today,
clocks
to around
the
05:00
on download
the to
the downloaded
and Sobig.E,
the this
the used close
them networks
of fact
that adds
laptops
to in
the and
HP. releases,
or
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top