Trend Micro News Letter


Recommended Posts

i havent recieved one of these for some time so im not sure if it has been posted or not

take care

marty

Dear Trend Micro customer,

As of February 2, 2005, 6:55 PM (GMT - 08:00), TrendLabs has declared a

Medium Risk Virus Alert to control the spread of WORM_BROPIA.F.

TrendLabs has received numerous infection reports indicating that this

malware is spreading in the Bolivia, U.S., Korea, Taiwan, Mexico, and

China.

This is a memory-resident worm that drops a copy of itself in the root

folder using different interesting file names with a PIF extension.

It attempts to propagate by sending copies of itself to all MSN Messenger

contacts.

It also drops the file WINHOST.EXE in the Windows system folder. Trend

Micro detects the said file as WORM_AGOBOT.AJC.

It has an anti-debugging technique, which enables it not to run if any of

the following debugging applications are present on the affected system:

? NT-ice

? Softice

It also drops and displays an image file, named SEXY.JPG.

TrendLabs will be releasing the following EPS deliverables:

TMCM Outbreak Prevention Policy 144

Official Pattern Release 2.390.00

Damage Cleanup Template 505

For more information on WORM_BROPIA.F, you can visit our Web site at:

http://www.trendmicro.com/vinfo/virusencyc...e=WORM_BROPIA.F

You can modify subscription settings for Trend Micro newsletters at:

http://www.trendmicro.com/subscriptions/default.asp

----------------------------------------------o0o----

IMPORTANT NOTE!

TrendLabs will also be releasing a 3-digit pattern file 988 that

corresponds with the pattern indicated in this email. This 3-digit pattern is a

special release for users running non-NPF compliant products (i.e., old

3-digit pattern format) and is designed to provide protection against the

most current malware threats. Users running non-NPF compliant products are

still urged to apply the NPF solution <http://www.trendmicro.com/en/support/npf/overview.htm>. These users may also upgrade to the latest

product version. Only NPF-compliant products will be able to update with

regular pattern releases.

______________________________________________________________________

This message was sent by Trend Micro's Newsletters Editor using Responsys

Interact .

To unsubscribe from Trend Micro's Newsletters Editor:

http://trendnewsletter.rsc03.net/servlet/o...RFpgLmDgLmDgSE0

To update your subscription preference, or to change your email address:

http://trendnewsletter.rsc03.net/servlet/w...3vyf_8yvwb7_.40

To view our permission marketing policy:

http://www.rsvp0.net

Copyright 1989-2004 Trend Micro, Inc. All rights reserved

Trend Micro, Inc., 10101 N. De Anza Blvd., Suite 200, Cupertino, CA

95014

Link to post
Share on other sites

Thanks for the information Marty.

I wonder if this is the one that Intel warned everyone not to click on yesterday. My hubby forgot the name of it by the time he told me.

Norton has sure been busy this week with antivirus definitions updates, so there must be lots of new junk from slime jerks cranking out more of the stuff that would harm us all.

Check often for updates, do your scans, and stay safe folks.

P.S.

Either this flu bug is really getting to me worse than I thought, or the continual barrage by the garbage dealers of worms, virus, and trojans and the constant need to get updates to stay safe from it all. Hubby and I should have gotten a flu shot too, except for shortage problem, thankfully we are on the road to better I think.

Anyhow I forgot to add my usual signoff.

God bless everyone.

Edited by thesidekickcat
Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...