kornet.net abuse desk is mailing out W32.Nimda.E at mm worm

Steven M. Bellovin smb at research.att.com
Tue Oct 30 19:13:42 UTC 2001


In message <195358945566.20011030133637 at conti.nu>, Kai Schlichting writes:
>
>If you or your staff have dealt with kornet.net (a Korean ISP belonging
>to Korean Telecom), and specifically abuse at kornet.net in the past, beware:
>It seems that they've been overrun by the brand-spanking-new W32.Nimda.E at mm
>worm (**) sometimes late last night.
>
>Specific case in hand: yesterday at 9:40pm EST, I received a mail
>with a  Subject: line of an UNRELATED abuse issue (hello MFNX/XO/
>Above.net :) that contains a MIME attachment with an auto-playing
>"sound file" of sample.exe , openened in an <iframe> of your favorite
>Microsoft email client. Source IP of the mailing : 210.222.17.36 (/24).

Note, however, that the From: line on these Nimda variants is also 
forged; see http://securityresponse.symantec.com/avcenter/venc/data/[email protected]
for details.  (I received several messages saying that some mail I sent 
was infected with Nimda.E.  This struck me as quite improbable, since I 
use NetBSD for all my email and other real work.)

		--Steve Bellovin, http://www.research.att.com/~smb
		Full text of "Firewalls" book now at http://www.wilyhacker.com





More information about the NANOG mailing list