martymas Posted November 13, 2004 Report Share Posted November 13, 2004 hi team this is a news letter from TM. martyTREND MICRO WEEKLY VIRUS REPORT(by TrendLabs Global Antivirus and Research Center) *********************************************************************------------------------------------------------------------------------Date: Friday November 12, 2004------------------------------------------------------------------------To read an HTML version of this newsletter, go to: http://www.trendmicro.com/en/security/report/overview.htmIssue Preview: 1. Trend Micro Updates - Pattern File & Scan Engine Updates2. Mining for Gold – TROJ_GETEGOLD.A (Low Risk)3. Top 10 Most Prevalent Global Malware 4. Trend Micro URL Filtering Module - Important Product Update NowAvailable5. Trend Micro Announces Network VirusWall 300NOTE: Long URLs may break into two lines in some mail readers. Should this occur, please copy and paste the URL into your browser window.************************************************************************1. Trend Micro Updates - Pattern File & Scan Engine Updates ------------------------------------------------------------------------PATTERN FILE: 2.246.00 http://www.trendmicro.com/download/pattern.aspSCAN ENGINE: 7.100 http://www.trendmicro.com/download/engine.asp 2. Mining for Gold – TROJ_GETEGOLD.A (Low Risk)------------------------------------------------------------------------TROJ_GETEGOLD.A targets users with e-gold accounts. E-gold is anintegrated account-based payment system mainly utilized for e-commerce. ThisTrojan does not employ typical phishing techniques, such as logging userkeystrokes in text files that can be sent to a remote malicious user.Instead, when a user accesses thee-gold account login form it opens a hidden duplicate Internet Explorer(IE) window accessing that same URL. It then fills the duplicate Web form,which eventually leads to illegal account access. The Trojan periodicallydrains the funds of the compromised account by a certain percentage, andthe stolen funds are then transferred to another e-gold account. ThisTrojan runs on Windows 95, 98, ME, NT, 2000, and XP and is currently spreadingin-the-wild.Upon execution, this Trojan drops itself as SVHOST.EXE in the Windowsfolder. It then creates a registry entry that allows it to automaticallyexecute at every Windows startup. When a user accesses the URL http://e-gold.com/acct/login.html, this Trojan opens a hidden duplicate InternetExplorer page of the said URL, which it fills, in order to drain a targetuser’s e-Gold account. To successfully perform this function, this Trojan uses InternetExplorer’s built-in OLE automation functions. This method is similar to APIhooks used by PE viruses. In this case, this Trojan executes certainfunctions for every change in the URL address that occurs. The following URLs cause this Trojan to execute certain functions: e-gold.com/acct/acct.asp e-gold.com/acct/balance.asp e-gold.com/acct/spend.asp e-gold.com/acct/verify.asp https://www.e-gold.com/acct/acct.asp https://www.e-gold.com/acct/balance.asp https://www.e-gold.com/acct/spend.aspE-gold account holders should monitor e-gold Security Alerts at thefollowing URL: http://www.e-gold.com/unsecure/alert.html If you would like to scan your computer for TROJ_GETEGOLD.A or thousandsof other worms, viruses, Trojans and malicious code, visit HouseCall, Trend Micro's free, online virus scanner at: http://housecall.trendmicro.com/TROJ_GETEGOLD.A is detected and cleaned by Trend Micro pattern file#2.245.01 and above. For additional information about TROJ_GETEGOLD.A please visit: http://www.trendmicro.com/vinfo/virusencyc...TROJ_GETEGOLD.A3. Top 10 Most Prevalent Global Malware (from November 5, 2004 to November 11, 2004)------------------------------------------------------------------------1. WORM_NETSKY.P2. HTML_NETSKY.P3. WORM_BAGLE.AT4. WORM_NETSKY.D5. JAVA_BYTEVER.A6. PE_ZAFI.B7. WORM_BAGLE.AU8. WORM_NETSKY.C9. WORM_NETSKY.B10. TROJ_DELF.AR4. Trend Micro URL Filtering Module - Important Product Update NowAvailable------------------------------------------------------------------------ Trend Micro URL Filtering, an optional module integrated with Trend MicroInterScan Web Security Suite, enables companies to manage employee Internetuse by restricting access to unwanted Web sites. If you have installed InterScan Web Security Suite with URL Filteringmodule, an important product update is now available:For Windows: InterScan Web Security Suite Patch for Windows v2.0 For Linux: InterScan Web Security Suite Patch for Linux v2.0 For Solaris: InterScan Web Security Suite Patch for Solaris v2.0 PLEASE NOTE: This is a mandatory patch as all unpatched systems will beunable to receive URL Filtering updates after January, 2005.You may obtain the patch by visiting: http://www.trendmicro.com/download/product.asp?productid=34If you have questions or need assistance, please contact Trend MicroTechnical Support in your area: http://kb.trendmicro.com/solutions/include...TechSupport.asp5. Trend Micro Announces Network VirusWall 300------------------------------------------------------------------------ Trend Micro recently launched the Network VirusWall 300 outbreakprevention appliance intended to protect mission-critical devices such as AutomaticTeller Machines (ATM machines), self-service ticketing kiosks and medicaldevices. Building on the success of the Network VirusWall 1200 for networksegments, the Network VirusWall 300 appliance protects individual devices and can:-Prevent network worms and enable remote clean-up of network worminfections using threat-specific knowledge from TrendLabs(SM)-Isolate devices from the network and quarantine infected devices-Ease deployment through a simple hardware architecture that avoids thecompatibility, performance, and stability issues of software security solutionsTo learn more about the Network VirusWall 300 please visit: http://www.trendmicro.com/en/products/netw...00/overview.htm ***********************************************************************************______________________________________________________________________This message was sent by Trend Micro's Newsletters Editor using ResponsysInteract .To unsubscribe from Trend Micro's Newsletters Editor: http://trendnewsletter.rsc03.net/servlet/o...RFpgLmDgLmDgSE0To update your subscription preference, or to change your email address:http://trendnewsletter.rsc03.net/servlet/w...kNlyLihkm_UU_UVTo view our permission marketing policy: http://www.rsvp0.netCopyright 1989-2004 Trend Micro, Inc. All rights reservedTrend Micro, Inc., 10101 N. De Anza Blvd., Suite 200, Cupertino, CA95014 Quote Link to post Share on other sites
sultan_emerr Posted November 14, 2004 Report Share Posted November 14, 2004 Thanks for the alert, Marty. Quote Link to post Share on other sites
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.