[32245] in bugtraq

home help back first fref pref prev next nref lref last post

Mimail.C

daemon@ATHENA.MIT.EDU (Alan)
Fri Oct 31 12:01:48 2003

Date: 31 Oct 2003 15:18:23 -0000
Message-ID: <20031031151823.26363.qmail@sf-www1-symnsj.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Alan <alan.tennent@y3kgroup.com>
To: bugtraq@securityfocus.com



The irritation has begun  :/
A new version of Mimail.C has cropped up.  It spoofs the recipients domain and sends the mail as 'james@<spoofed domain>' and has an attachment: pictures.jpg.exe

Some clients have reported massive amounts of lag due to its mass mailing and one client's firewall dropped as a result, although this might not be related.

More info can be found on:
http://www.f-secure.com/v-descs/bics.shtml

Antigen pics the attachment up as I-Worm.WatchNet

Keep an eye out and inform your users

cheers

home help back first fref pref prev next nref lref last post