[65640] in North American Network Operators' Group
Re: new nasty email virus trick to bypass scanners
daemon@ATHENA.MIT.EDU (Mike Tancsa)
Wed Dec 3 22:46:19 2003
Date: Wed, 03 Dec 2003 22:48:26 -0500
To: nanog@merit.edu
From: Mike Tancsa <mike@sentex.net>
In-Reply-To: <20031204031954.37EAA5DDFE@segue.merit.edu>
Errors-To: owner-nanog-outgoing@merit.edu
NAI has it as well now
http://vil.nai.com/vil/content/v_100856.htm
---Mike
At 10:20 PM 03/12/2003, Damian Gerow wrote:
>On Wed, 3 Dec 2003, Steven M. Bellovin wrote:
> > Is this in the wild yet? Any other details worth looking for?
> > Symantec's AV site apparently has nothing on it.
>
>I would say so - I got it in my inbox earlier this afternoon, and I
>traditionally get about three viruses a month.
>
>The virus itself is *exactly* like Mmimail.M, as reported by Symantec.
>Except that wendy.zip was definitely password protected.
>
> - Damian