Endpoint Protection

 View Only
  • 1.  Virus ( spam ) Here you have.

    Posted Sep 09, 2010 03:40 PM
    There is a new virus out break where you are getting e-mails from outlook withsubject line here we go.
    .in the e-mail there is a link to a pdf file
    dont click on the link it is a threat.
    Symantec theam is working on it.


  • 2.  RE: Virus ( spam ) Here you have.

    Posted Sep 09, 2010 03:45 PM


  • 3.  RE: Virus ( spam ) Here you have.

    Posted Sep 09, 2010 04:08 PM
    Antivirus and antispam.  Not the same thing.  An email spam attack is not a virus outbreak.


  • 4.  RE: Virus ( spam ) Here you have.

    Posted Sep 10, 2010 03:48 AM
    Issue – A fast spreading socially engineered threat is currently infecting many customers
    Thursday Sep 9th, 2010, Symantec is actively tracking a new, malicious computer worm that spreads using a socially engineered email attack.  The threat arrives in the form of a standard email that directs the recipient to click on a link embedded in the email. This link points to a malicious program file that is disguised as a PDF file, hosted on the internet. When the user clicks on this link, their computer downloads and launches the malicious file; this process installs the worm onto the victim’s computer. Initial analysis indicates that the worm disables many common AV products (but it does not successfully attack Norton/Symantec products). Once running on the computer, the threat attempts to email a copy of the original email to all email addresses found in the infected user’s email address book. The threat also attempts to spread from computer to computer over the local network (e.g., within the enterprise intranet) by copying itself to open drive shares found on other machines on the network. Once the threat copies itself to another machine, if a user even opens the folder that contains the threat on this new machine, this will launch the threat and cause it to spread further through both email and over shared drives.
     
    Enterprise customers using a Rapid Release signature set dated Sep 9th 2009 rev 023 (or later) are already completely protected. This will stop all new infections.  The definition will also be included in the next regular definition set which will be published at 16:00 PST (Sep 9th 2009)
     
    Norton customers were also protected via pulse updates definitions at 10:15 PST (Sep 9th 2009).
     
    The initial signature for this threat was named Trojan.Horse but has since been renamed to W32.Imsolk.A@mm.


    Threat Details (What does the threat do?)

    The worm uses email for its initial propagation (an email purporting to include a link to a requested document).  Once inside corporations it can spread rapidly via shared drives and removal drives.  It also attempts to spread via email by gathering email addresses from the compromised computer.
     
    The email looks like the following:
     
    Hello:
    This is The Document I told you about, you can find it Here. <link to .SCR file>
    Please check it and reply as soon as possible.
    Cheers,
    <name>

     
    Once the link is followed it proceeds to download the actual malicious threat W32.Imsolk.B@mm which infects the compromised machine.


    Protection Details (Am I protected?)

    Yes, if you are running either a Symantec Corporate Anti-virus product (Symantec Anti-Virus or Symantec Endpoint Protection) or a Norton Anti-virus product (NIS, NAV or N360) and have current virus definitions as follows.
     

    • The initial variant (called “Trojan.Horse”) was discovered by Symantec at 09:00 PST on Sep 9th, 2010 and we released a new signature to detect and remediate known infections in the rapid release definitions set dated Sep 9th 2010 rev 023 (or later), released at about 10:15PST 2010.
     

    • Any Norton product configured to download pulse updates (the default setting) will also have received this new signature on or around 10:15PST 2010.
     

    • The initial signature (Trojan.Horse) has since been renamed to W32.Imsolk.B@mm. This name will appear in subsequent definition sets.
     

    • Full definitions with this new name will be released at 16:00 PST.

    Best Practices

    1. Disable network sharing and/or disconnect infected computers from the local network and Internet.
     

    1. Block outbound traffic to the domains/ IP addresses contained in the social engineered email to prevent users connecting to distribution sites to download.
     

    1. Disable AutoPlay to prevent the automatic launching of executable files on network and removable drives and disconnect the drives when not in required.

      Once inside the boundary of an Enterprise, Windows file shares and removable thumb drives are a common infection vector for this type of threat and autorun.inf files make these especially prone to attack. Symantec recommends turning off autorun.inf where practical.
     
    Technical Support already has the following knowledge base articles on the topic:
                                                                                                 This is a generic write-up that includes a variety of techniques including directly editing the Windows key registry.
      This includes specific instructions on how to use the policy feature of SEP to disable autorun.inf files.


  • 5.  RE: Virus ( spam ) Here you have.

    Posted Sep 10, 2010 06:34 AM

    Block the below URLs

     hxxp://members.multimania.co.uk/yahoophoto/tryme.iq
    hxxp://members.multimania.co.uk/yahoophoto/ff.iq
    hxxp://members.multimania.co.uk/yahoophoto/gc.iq
    hxxp://members.multimania.co.uk/yahoophoto/ie.iq
    hxxp://members.multimania.co.uk/yahoophoto/im.iq
    hxxp://members.multimania.co.uk/yahoophoto/m.iq
    hxxp://members.multimania.co.uk/yahoophoto/op.iq
    hxxp://members.multimania.co.uk/yahoophoto/pspv.iq
    hxxp://members.multimania.co.uk/yahoophoto/rd.iq
    hxxp://members.multimania.co.uk/yahoophoto/w.iq
    hxxp://members.multimania.co.uk/yahoophoto/SendEmail.iq
    hxxp://members.multimania.co.uk/yahoophoto/hst.iq
    hxxp://members.multimania.co.uk/yahoophoto/re.iq
     
    1. Block emails with the subject line “Here you have”
    2. Turn off Autorun across network
    3. Turn on network scanning
    4. Block the MD5 of the threat and all files associated
      1. 0x2bde56d8fb2df4438192fb46cd0cc9c9 Main binary
      2. 0x6af5491540b35ea502aadde3a358e2c9 
      3. 0xac5808334832032b0e7df1a2351e207f 
      4. 0x37a89021ab1fbe5668c3974abc794bd4
      5. 0x862dfc205db452c3c5127b1c721ec1a8
      6. 0x60e5a03029eac3972550507e96ee4b83
     
     
    There is no report that  this threat is corrupting the AV, so a virus def update can remediate the threat.


  • 6.  RE: Virus ( spam ) Here you have.

    Posted Sep 10, 2010 07:35 AM

    Here is a writeup for the same

    W32.Imsolk.B@mm
    Web URL: http://www.symantec.com/security_response/writeup.jsp?docid=2010-090922-4703-99

    Certified LiveUpdate definitions have now been posted for the same.