fanf: (Default)
[personal profile] fanf
12:30: I notice lots of odd forged email, which looks like it's a virus but unlike one i've seen before. Save it to a file so I can scan it with a proper virus scanner on another machine. I come up blank. I check http://vil.nai.com/vil/newly-discovered-viruses.asp
but none of the descriptions match this virus.

12:50: I send a few copies to NAI's virus reporting address. Almost immediately get an autoreply saying that they also do not know about this virus. I check my filters, and there appears to be lots of it going through and being zapped on the way because of its executable attachment.

13:50: I get a second reply confirming that this is a new virus, with an extra.dat for detecting it. I test the extra.dat on the file I submitted and it duly detects the virus in each message.

14:00: I install the extra.dat in my email filters and it starts spotting copies almost immediately.

14:30: I send another message to NAI saying that I'm using the extra.dat in anger, and that it appears to be a fast-spreading virus.

14:50: I get a reply thanking me for my feedback and saying that they're keeping a close eye on this threat.

15:20: The threat is upgraded from Low to Medium. So far today we've filtered 4600 infected messages, of which 650 have been Bagle (60% of viruses since 14:00).

15:50: I do a run of my infected host finder. Someone in the University managed to get infected at 15:00.

16:05: 1000 copies now deleted.

17:10: Automated DAT file update gets the official fingerprint from NAI, so the extra.dat is no longer necessary. Still, it has been good for 3 hours and 1800 copies worth of protection.

Date: 2004-02-17 15:43 (UTC)
reddragdiva: (geek)
From: [personal profile] reddragdiva
And as it appears significant, I've just added a Wikipedia entry for it. (look up "Bagle" or "Bagle worm".)

Date: 2004-02-17 16:22 (UTC)
From: [identity profile] oldbloke.livejournal.com
We switched on our "no executable attachments" filename extension list [1] on our mailservers just a few days ago.
Fingers crossed.

[1] The MS supplied one, despite representations... blocks Access database files but not Word, Excel, or Powerpoint. bah!

Re:

Date: 2004-02-17 21:53 (UTC)
From: [identity profile] oldbloke.livejournal.com
Well, 130.88.*.* is us. The 200s are all mission critical stuff. Not sure about the 203s. I'll ask around tomorrow. You might enquire of doctor@mcc.ac.uk - postmaster@ will only walk round to his office and pass any message on.

Date: 2004-02-17 20:51 (UTC)
From: [identity profile] glitterboy1.livejournal.com
Someone in the University managed to get infected at 15:00.

Wasn't me, guv. I think that the recent successes in reducing the frequency of these things have made users complacent. :-(

Thanks for mentioning the extra.dat. We stuck it in later to good effect.

Date: 2004-02-18 09:34 (UTC)
From: [identity profile] oldbloke.livejournal.com
Apparently Sophos call it Tanx-A and we started blocking it about 1pm.
Huzzah!

December 2025

S M T W T F S
 123456
78910111213
14151617181920
21222324 252627
28293031   

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated 2025-12-30 21:24
Powered by Dreamwidth Studios