Alert: W32/Myparty-mm on the loose

From: Russ (Russ.Cooper@RC.ON.CA)
Date: 01/28/02


Date:         Mon, 28 Jan 2002 08:45:22 -0500
From: Russ <Russ.Cooper@RC.ON.CA>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM

Be aware that this morning you will likely find a copy of this new mass
mailer in your mail systems. This is a pure social engineering attack,
it contains an attachment named as a URL with a .com extension. Since
.com is also an application, it will be run as such if its
double-clicked on. Check with your AV company for updates and/or
filtering criteria. If you can, be sure you have attachment filtering
enabled at your mail gateway. Outlook Email Security Update, and Outlook
2002, both catch this attachment and prevent it from being available for
the user to click on.

Cheers,
Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor

oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
Delivery co-sponsored by VeriSign - The Internet Trust Company
oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
FREE E-COMMERCE SECURITY INFRASTRUCTURE GUIDE
When building an e-commerce site, you want to start with a strong, secure
foundation. Learn how with VeriSign's FREE White Paper, "Building an
E-Commerce Trust Infrastructure." See how you can authenticate your site to
customers, use 128-Bit SSL encryption to secure your web servers, and accept
secure payments online. Click here:
http://www.verisign.com/cgi-bin/go.cgi?a=n116965650045000
oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo



Relevant Pages