BLIND-HAMS Archives

For blind ham radio operators

BLIND-HAMS@LISTSERV.ICORS.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
shawn klein <[log in to unmask]>
Reply To:
Blind-Hams For blind ham radio operators <[log in to unmask]>
Date:
Sat, 1 May 2004 08:58:40 -0700
Content-Type:
text/plain
Parts/Attachments:
text/plain (124 lines)
I checked it out myself on trend micro virus
encyclopedia, that 1's at
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=HTML_DELPLAYER.A
--- quadmomkate <[log in to unmask]> wrote:
> From: "quadmomkate" <[log in to unmask]>
> To: "Carol Cross" <[log in to unmask]>
> Subject: Fw:FW: important Virus warningg! PLEASE
> READ!!!!!!!
> Date: Fri, 30 Apr 2004 08:31:42 -0400
>
> I checked this out on snopes.com and it appears to
> be true. So, if you get
> an email saying that Osama Bin laden has been
> captured and look at the
> pictures, Don't open it!
>
> Kate
>
>
> > I'm not sure how true this is but I've just
> received it today!!!
> >
> > Osama bin Laden Captured
> >
> > Virus name:   Osama bin Laden Captured
> >
> >                   Status:   Real.
> >
> >                   Example:   [Collected on the
> Internet, 2004]
> >
> >
> >                           Subject: Osama bin Laden
> Captured
> >
> >                           Hey, Just got this from
> CNN, Osama Bin Laden has
> > been captured! A video and some pictures have been
> released. Go to the
> link
> > below for pictures, I will update the page with
> the video as soon as I
> can.
> >
> >
> >                   Origins:   There are few
> headlines that would grab the
> > attention of more computer users around the world
> than "Osama bin Laden
> > Captured," and that's exactly what whoever created
> this lure was counting
> on
> > to snare unsuspecting victims who use Microsoft
> platforms.
> >
> >                   "Osama bin Laden Captured" isn't
> a virus in itself; it's
> > the text of a message that includes a link to a
> file called EXPLOIT.EXE.
> > When a message recipient clicks on this link to
> view what he thinks are
> > pictures of Osama bin Laden's capture, he can end
> up downloading an
> > executable trojan known as Backdoor-AZU,
> BKDR_LARSLP.A, Download.Trojan,
> > TrojanProxy.Win32.Small.b, or Win32.Slarp.
> >
> >                   Clicking the embedded link in
> the "Osama bin Laden
> > Captured" message auto-executes a file called
> "EXPLOIT.EXE," which
> exploits
> > a known security hole to download the trojan.
> According to McAfee
> Security:
> >
> >                     The trojan opens a random port
> on the victim's
> machine.
> > It sends the port information to a webpage at IP
> address 66.139.77.145.
> The
> > trojan listens on the open port for instructions
> and redirects traffic to
> > other IP addresses. Spammers and hackers can take
> advantage of compromised
> > systems by using the infected computer as a
> middleman, allowing them to
> pass
> > information through it and remain anonymous.
> >
> >                   Microsoft has made available
> updates that close the hole
> > exploited by this trojan.
> >
> >                   Additional information:
> Backdoor-AZU
> >                         (McAfee Security)
> >                   Last updated:   27 April 2004
> >
> >             The URL for this page is
> > http://www.snopes.com/computer/virus/osama.asp
> >
> >
>
>
>
> ---
> Outgoing mail is certified Virus Free.
> Checked by AVG anti-virus system
> (http://www.grisoft.com).
> Version: 6.0.668 / Virus Database: 430 - Release
> Date: 4/24/2004
>





__________________________________
Do you Yahoo!?
Win a $20,000 Career Makeover at Yahoo! HotJobs
http://hotjobs.sweepstakes.yahoo.com/careermakeover

ATOM RSS1 RSS2