Red Hat NETSCAPE ENTREPRISE SERVER 6.1 - 08-2002 ADMINISTRATOR Manual de usuario Pagina 27

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 33
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 26
NIPC CyberNotes #2002-12 Page 27 of 33 06/17/2002
WORM_ENEMANY.D (Aliases: W32.Enemany.D@mm, ENEMANY.D) (Internet Worm): This
nondestructive, non-memory resident mass-mailing worm sends copies of itself via e-mail to all contacts
listed in an infected user's Microsoft Outlook address book.
WORM_FISHLET.A (Internet Worm): This mass-mailing worm uses its own SMTP (Simple Mail
Transfer Protocol) engine to send copies of itself to all e-mail addresses that it finds in the Microsoft
(WAB) Windows Address Book. The e-mail messages arrive with the following characteristics:
Subject: Order
Message Body: Dear eBay customer,
Thank you for using eBay Services.
_____________________________
Your order Num. is: 31547
Delivery time: 7 days ...
Attachment: ???.exe
*where ??? is a random filename
WORM_FRETHEM.B (Internet Worm): This memory-resident variant of WORM_FRETHEM.A
propagates via e-mail, using its own SMTP engine to send e-mail messages with the subject line "Re: Your
password!" It gathers e-mail addresses from the infected user's Windows Address Book (WAB) and from
certain files in Microsoft Outlook Express mail archives.
WORM_FRETHEM.C (Alias: I-Worm.Frethem.c) (Internet Worm): This memory-resident variant of
WORM_FRETHEM.A propagates via e-mail, using its own SMTP (Simple Mail Transfer Protocol) engine
to send e-mail messages with itself as an attachment. It gathers e-mail addresses from an infected user's
Windows Address Book (WAB) and from certain files in Microsoft Outlook Express mail archives. This
worm sends out e-mail messages with the following details:
Subject: Re: Your password!
Message Body: Your password is W8dqwq8q918213
Attachment: Your password placed in password.txt yourpassword.exe
WORM_FRETHEM.D (Alias: W32.Frethem.D@mm) Win32 Worm): This nondestructive variant of
WORM_FRETHEM.A, a memory-resident worm, propagates as an attachment in an e-mail with the
following details:
Subject: Re: Your password!
Message Body: ATTENTION! You can access very important information by this
password DO NOT SAVE password to disk use your mind now press cancel
Attachment: Decrypt-password.exe
This worm sends the e-mail to all e-mail addresses listed in the infected user's Windows Address Book and
in .DBX files, in which the Microsoft Outlook Express archives e-mails.
WORM_FRETHEM.E (Aliases: W32.Frethem.D@mm, FRETHEM.E) (Internet Worm): This non-
destructive, memory-resident variant of WORM_FRETHEM.A propagates via Microsoft Outlook by
sending e-mail to all addresses listed in the infected user's Windows Address Book, and in .DBX files
where Microsoft Outlook Express archives e-mails. It arrives as an attachment to an e-mail message with
the following:
Subject: Re: Your password!
Message Body: ATTENTION! You can access very important information by this password
DO NOT SAVE password to disk use your mind now press cancel
Attachments: Decrypt-password.exe password.txt
The file attachment, DECRYPT-PASSWORD.EXE, automatically executes when this e-mail message is
previewed or opened.
WORM_FRETHEM.F (Internet Worm): This variant of WORM_FRETHEM.B propagates via e-mail,
using its own SMTP (Simple Mail Transfer Protocol) engine to send e-mail messages with a copy of itself
as an attachment. It gathers e-mail addresses from the infected user's Windows Address Book (WAB) and
Vista de pagina 26
1 2 ... 22 23 24 25 26 27 28 29 30 31 32 33

Comentarios a estos manuales

Sin comentarios