ECHURCH-USA Archives

The Electronic Church

ECHURCH-USA@LISTSERV.ICORS.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Sharon Hooley <[log in to unmask]>
Reply To:
The Electronic Church <[log in to unmask]>
Date:
Thu, 2 Feb 2006 18:41:01 -0700
Content-Type:
text/plain
Parts/Attachments:
text/plain (135 lines)
Hi!

got these from the Pro Tech group.

Sharon

    It's an old fashion type virus but with lots of variations, all it does
is destroy your Windows/Windows Office installation and mail itself to
everyone
in your address book.
It's already widespread and Feb. 3 is the date it's set for. The worm, which
uses the lure of sexually explicit Kama Sutra photographs to trick e-mail
users
into executing an attachment, is programmed to deliver the destructive
payload on the third day of every month.

Heads up till Monday at the least and if you've been letting the anti-virus
update and scan slide do it now and repeat it daily till then.

The problem may not be that you're all that careless but that you're in the
address book of people who are.
If you're the one who cleans up the computers of family and friends they're
either going to get together and buy you a new Radeon 1900 or nVidia 7800
and
take you out for a good dinner or they're going to be doing the same update
and check.
Warn 'em now.

  More info here:
http://shorterlink.com/?3YRMGE

MCH FORUMS (free registration)
http://mycomputerheadaches.tz4.com

Microsoft Security Advisory (904420)  Win32/Mywife.E@mm  Published: January 
30, 2006

  Microsoft wants to make customers aware of the Mywife mass mailing malware 
variant named [log in to unmask] The mass mailing malware tries to entice 
users
through social engineering efforts into opening an attached file in an 
e-mail message. If the recipient opens the file, the malware sends itself to 
all
the contacts that are contained in the system's address book. The malware 
may also spread over writeable network shares on systems that have blank 
administrator
passwords.
  Customers who are using the most recent and updated antivirus software 
could be at a reduced risk of infection from the Win32/Mywife.E@mm malware. 
Customers
should verify this with their antivirus vendor. Antivirus vendors have 
assigned different names to this malware but the Common Malware Enumeration 
(CME)
group has assigned it ID CME-24.

  On systems that are infected by [log in to unmask], the malware is intended 
to permanently corrupt a number of common document format files on the third
day of every month. February 3, 2006 is the first time this malware is 
expected to permanently corrupt the content of specific document format 
files. The
malware also modifies or deletes files and registry keys associated with 
certain computer security-related applications. This prevents these 
applications
from running when Windows starts. For more information, see the Microsoft 
Virus Encyclopedia.
http://www.microsoft.com/security/encyclopedia/details.aspx?Name=Win32/Mywife.E@mm

As with all currently known variants of the Mywife malware, this variant 
does not make use of a security vulnerability, but is dependant on the user 
opening
an infected file attachment. The malware also attempts to scan the network 
looking for systems it can connect to and infect It does this in the context
of the user. If it fails to connect to one of these systems, it tries again 
by logging on with "Administrator" as the user name together with a blank 
password.

  Customers who believe that they are infected with the Mywife malware, or 
who are not sure whether they are infected, should contact their antivirus 
vendor.
Alternatively, Windows Live Safety Center Beta Web site provides the ability 
to choose "Protection Scan" to ensure that systems are free of infection.
Additionally, the Windows OneCare Live Beta, which is available for English 
language systems, provides detection for and protection against the Mywife
malware and its known variants.
  For more information about the Mywife malware, to help determine whether 
you have been infected by the malware, and for instructions on how to repair
your system if you have been infected, see the Microsoft Virus Encyclopedia. 
For Microsoft Virus Encyclopedia references, see the "Overview" section. We
continue to encourage customers to use caution with unknown file attachments 
and to follow our Protect Your PC guidance of enabling a firewall, getting
software updates, and installing antivirus software. Customers can learn 
more about these steps by visiting the Protect Your PC Web site.

LINKS:
  Windows Live Safety Center Beta
http://safety.live.com/site/en-US/default.htm
Windows OneCare Live Beta
http://www.windowsonecare.com/
Protect Your PC
http://www.microsoft.com/athome/security/protect/windowsxpsp2/Default.mspx

For evil to prosper requires only that good men remain silent!
  MCH FORUMS (free registration)
http://mycomputerheadaches.tz4.com
Those that would give up essential liberty in pursuit of a little temporary 
security deserve neither liberty nor security.

---------------------------------
Yahoo! Autos. Looking for a sweet ride? Get pricing, reviews, & more on new 
and used cars.

[Non-text portions of this message have been removed]

<<< Just a friendly reminder to please trim your messages as a courtesy to 
members on Digest Mode and/or still using Dial-Up connections and have to 
pay
for their time to download the mail.  Visit our web site:
http://tinyurl.com/63nxj >>>

YAHOO! GROUPS LINKS

List of 3 items
.  Visit your group "
Pro_Tech"
on the web.
.  To unsubscribe from this group, send an email to:
[log in to unmask]
.  Your use of Yahoo! Groups is subject to the
Yahoo! Terms of Service.
list end

No virus found in this incoming message.
Checked by AVG Free Edition.
Version: 7.1.375 / Virus Database: 267.14.25/246 - Release Date: 1/30/2006

ATOM RSS1 RSS2