maybe this should be on sec focus but.
Patrick_McAllister at WASHGAS.COM
Patrick_McAllister at WASHGAS.COM
Fri Aug 1 18:39:55 UTC 2003
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MIMAIL.A
Forrest Houston
<fhouston at east.is To: Drew Weaver <drew.weaver at thenap.com>
i.edu> cc: "'nanog at merit.edu'" <nanog at merit.edu>
Sent by: Subject: Re: maybe this should be on sec focus but.
owner-nanog at merit
.edu
08/01/2003 02:28
PM
That's funny, I had atleast one person here receive a similar email which
was forwarded on to me. I ran it through McAfee (4.5.1 engine, 4.0.4280
DAT) and it picked it right up (Trojan Name: Exploit-Code Base
http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=99383).
Potentially it's a different incident than what they are talking about but
the admin at domainname and the attachment are similar (it was a zip file
containing an html file [according to the extensions]).
Forrest
On Fri, 1 Aug 2003, Drew Weaver wrote:
> I have had like 4 users call and tell me that they're
receiving
> email from admin at ourdomainname with a unidentified attachment, possibly a
> worm that exploits the new Microsoft vulnerability last week, all 4 of
these
> people reported that their updated this morning antivirus software missed
> it.
>
>
>
> FYI.
>
>
>
>
>
>
More information about the NANOG
mailing list