[65640] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: new nasty email virus trick to bypass scanners

daemon@ATHENA.MIT.EDU (Mike Tancsa)
Wed Dec 3 22:46:19 2003

Date: Wed, 03 Dec 2003 22:48:26 -0500
To: nanog@merit.edu
From: Mike Tancsa <mike@sentex.net>
In-Reply-To: <20031204031954.37EAA5DDFE@segue.merit.edu>
Errors-To: owner-nanog-outgoing@merit.edu



NAI has it as well now

http://vil.nai.com/vil/content/v_100856.htm

         ---Mike

At 10:20 PM 03/12/2003, Damian Gerow wrote:

>On Wed, 3 Dec 2003, Steven M. Bellovin wrote:
> > Is this in the wild yet?  Any other details worth looking for?
> > Symantec's AV site apparently has nothing on it.
>
>I would say so - I got it in my inbox earlier this afternoon, and I
>traditionally get about three viruses a month.
>
>The virus itself is *exactly* like Mmimail.M, as reported by Symantec.
>Except that wendy.zip was definitely password protected.
>
>   - Damian


home help back first fref pref prev next nref lref last post