Hi!
got these from the Pro Tech group.
Sharon
It's an old fashion type virus but with lots of variations, all it does
is destroy your Windows/Windows Office installation and mail itself to
everyone
in your address book.
It's already widespread and Feb. 3 is the date it's set for. The worm, which
uses the lure of sexually explicit Kama Sutra photographs to trick e-mail
users
into executing an attachment, is programmed to deliver the destructive
payload on the third day of every month.
Heads up till Monday at the least and if you've been letting the anti-virus
update and scan slide do it now and repeat it daily till then.
The problem may not be that you're all that careless but that you're in the
address book of people who are.
If you're the one who cleans up the computers of family and friends they're
either going to get together and buy you a new Radeon 1900 or nVidia 7800
and
take you out for a good dinner or they're going to be doing the same update
and check.
Warn 'em now.
More info here:
http://shorterlink.com/?3YRMGE
MCH FORUMS (free registration)
http://mycomputerheadaches.tz4.com
Microsoft Security Advisory (904420) Win32/Mywife.E@mm Published: January
30, 2006
Microsoft wants to make customers aware of the Mywife mass mailing malware
variant named [log in to unmask] The mass mailing malware tries to entice
users
through social engineering efforts into opening an attached file in an
e-mail message. If the recipient opens the file, the malware sends itself to
all
the contacts that are contained in the system's address book. The malware
may also spread over writeable network shares on systems that have blank
administrator
passwords.
Customers who are using the most recent and updated antivirus software
could be at a reduced risk of infection from the Win32/Mywife.E@mm malware.
Customers
should verify this with their antivirus vendor. Antivirus vendors have
assigned different names to this malware but the Common Malware Enumeration
(CME)
group has assigned it ID CME-24.
On systems that are infected by [log in to unmask], the malware is intended
to permanently corrupt a number of common document format files on the third
day of every month. February 3, 2006 is the first time this malware is
expected to permanently corrupt the content of specific document format
files. The
malware also modifies or deletes files and registry keys associated with
certain computer security-related applications. This prevents these
applications
from running when Windows starts. For more information, see the Microsoft
Virus Encyclopedia.
http://www.microsoft.com/security/encyclopedia/details.aspx?Name=Win32/Mywife.E@mm
As with all currently known variants of the Mywife malware, this variant
does not make use of a security vulnerability, but is dependant on the user
opening
an infected file attachment. The malware also attempts to scan the network
looking for systems it can connect to and infect It does this in the context
of the user. If it fails to connect to one of these systems, it tries again
by logging on with "Administrator" as the user name together with a blank
password.
Customers who believe that they are infected with the Mywife malware, or
who are not sure whether they are infected, should contact their antivirus
vendor.
Alternatively, Windows Live Safety Center Beta Web site provides the ability
to choose "Protection Scan" to ensure that systems are free of infection.
Additionally, the Windows OneCare Live Beta, which is available for English
language systems, provides detection for and protection against the Mywife
malware and its known variants.
For more information about the Mywife malware, to help determine whether
you have been infected by the malware, and for instructions on how to repair
your system if you have been infected, see the Microsoft Virus Encyclopedia.
For Microsoft Virus Encyclopedia references, see the "Overview" section. We
continue to encourage customers to use caution with unknown file attachments
and to follow our Protect Your PC guidance of enabling a firewall, getting
software updates, and installing antivirus software. Customers can learn
more about these steps by visiting the Protect Your PC Web site.
LINKS:
Windows Live Safety Center Beta
http://safety.live.com/site/en-US/default.htm
Windows OneCare Live Beta
http://www.windowsonecare.com/
Protect Your PC
http://www.microsoft.com/athome/security/protect/windowsxpsp2/Default.mspx
For evil to prosper requires only that good men remain silent!
MCH FORUMS (free registration)
http://mycomputerheadaches.tz4.com
Those that would give up essential liberty in pursuit of a little temporary
security deserve neither liberty nor security.
---------------------------------
Yahoo! Autos. Looking for a sweet ride? Get pricing, reviews, & more on new
and used cars.
[Non-text portions of this message have been removed]
<<< Just a friendly reminder to please trim your messages as a courtesy to
members on Digest Mode and/or still using Dial-Up connections and have to
pay
for their time to download the mail. Visit our web site:
http://tinyurl.com/63nxj >>>
YAHOO! GROUPS LINKS
List of 3 items
. Visit your group "
Pro_Tech"
on the web.
. To unsubscribe from this group, send an email to:
[log in to unmask]
. Your use of Yahoo! Groups is subject to the
Yahoo! Terms of Service.
list end
No virus found in this incoming message.
Checked by AVG Free Edition.
Version: 7.1.375 / Virus Database: 267.14.25/246 - Release Date: 1/30/2006
|