HP3000-L Archives

August 2001, Week 4

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
David T Darnell <[log in to unmask]>
Reply To:
David T Darnell <[log in to unmask]>
Date:
Wed, 22 Aug 2001 13:53:50 -0700
Content-Type:
text/plain
Parts/Attachments:
text/plain (42 lines)
Well, downloading the .exe attachment caused VirusScan to identify the file as infected with [log in to unmask]

This worm has been around since at least March, I guess, using both Outlook AND Netscape mail for distribution.

Randomness of the subject line and attachment name make it less obvious.

Curiously (or not) Yahoo's attachment scan did not detect the worm.

-Dave






        David T Darnell

        08/22/2001 08:56:10 AM

To: [log in to unmask]@internet
cc:
Subject: OT: Email: Possible email bomb?

I received an email in my Yahoo! account that looks kinda suspicious:

From: Royce Clay <[log in to unmask]>

Subject: "^M"transmit "Joe^M"transmit "<cr><lf>"waitfor

Truncated Text: A combination of operators and arguments that evaluates to a result.

Attachments: _ISDEL.EXE, SCRIPT.DOC

I'm not opening the attachments, of course. Just wondering what others know about this.

Thnx,

Dave

* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *

ATOM RSS1 RSS2