- 21 Oct 2002
:though not for users of Kaspersky Anti-Virus. Kaspersky Labs, an international data-security software developer, announces the detection of a new modification of the network worm 'Opasoft' (also known as 'Opaserv' and 'Brasil'). Kaspersky Labs has already recorded numerous registered infections...
- 17 Oct 2002
Network Worms I-Worm.Chet I-Worm.Gismor I-Worm.Pepex Worm.P2P.Relmony Windows Viruses Win32.Ramlide Win32.Porex Linux Viruses Linux.Gildo Trojan Programs Backdoor.Cabrotor Trojan.Spy.GreenScreen Macro Viruses Macro.Word97.Nori Virus Constructors Constructor.VBS.SSIWG
- 16 Oct 2002
Kaspersky Labs recommends computer users urgently install patch to defend against "Netdex". Kaspersky Labs, an international data-security software developer, reports the detection of the Trojan horse 'Netdex', which exploits a vulnerability in the security system of the Microsoft Virtual...
- 10 Oct 2002
The Internet worm "Fleming" has been detected stealing registration information from computer games. Kaspersky Labs, an international data-security software developer, announces the detection of a multi-component malicious program spreading itself via the popular Internet chat program Windows...
- 07 Oct 2002
In connection with the numerous infections the world over at the hands of the Tanatos and Opasoft Internet worms, Kaspersky Labs has developed a free-of-charge utility for detecting and deleting these malicious programs. The utility can be downloaded from the Kaspersky Labs web site here. Both...
- 04 Oct 2002
Worm "Mighty" Intensifies the Threat Against Linux.
Following on the heals of the "Slapper" worm, which only two weeks ago was detected attacking Linux computers, comes the next outbreak, this time the work of the Linux-worm "Mighty". Presently Kaspersky Lab has registered over 1,600 infected systems the world over.
Many features of "Mighty" are taken from its predecessor, the network worm "Slapper". Like "Slapper", "Mighty" infects computers running Linux and the Apache Web-server and also uses the OpenSSL Security System exploit to gain access. Moreover, "Mighty" partly borrows the source code spreading method from "Slapper": to ensure compatibility with all versions of OpenSSL, one of the worm's components (sslx.c, which is responsible for penetration via the security system vulnerability) recompiles itself anew on each computer.
In addition to infecting systems, "Mighty" also sets up a backdoor utility (designed to gain unauthorized control). In turn, this utility connects with one of the remote IRC channels where it receives ill-intentioned commands, which it then executes on the infected system. In this way "Mighty" is able to leak out confidential information, corrupt important data, and also use infected machines to conduct distributed DoS attacks and other nasty activities.
To avert infection, Kaspersky Lab, above all recommends users
- 03 Oct 2002
How should you protect your computer? As was reported on October 1st, the Internet suffered a new epidemic courtesy of the 'Opasoft' worm, which aggressively asserted itself as one of the three most widespread malicious programs by recording numerous incidences in a myriad of countries the...
- 02 Oct 2002
Kaspersky Labs presents the Virus Top 20 for the month of September. The percentage shown represents the percentage of registered incidences. I-Worm.Klez 72.93 I-Worm.Lentin 23.62 Win95.CIH 0.27 Trojan.Win32.Filecoder 0.17 Macro.Word97.Thus 0.13 I-Worm.Sircam 0.13 I-Worm.Magistr 0.11 Macro.Word97.Flop 0.04 I-Worm.Cervivec 0.04 I-Worm.Hybris 0.03 Backdoor.Death 0.03 Macro.Word97.Ethan 0.03 Win32.FunLove 0.02 Macro.Word97.Marker 0.02 Macro.Word97.TheSecond 0.02 Trojan.PSW.M2 0.01 Backdoor.Antilam 0.01 Worm.Linux.Slapper 0.01 Palm.Phage 0.01 Nuker.Win32.Nabber 0.01
- 01 Oct 2002
Kaspersky Labs, an international data-security software developer, announces the emergence of already the second virus epidemic this week. This time, the multi-component program "Opasoft", combines the characteristics of a network worm and a Trojan program designed to gain unauthorized remote...