Spyware, Viruses, & Security forum

General discussion

VIRUS ALERTS - May 16, 2005

Discussion is locked
You are posting a reply to: VIRUS ALERTS - May 16, 2005
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VIRUS ALERTS - May 16, 2005
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
W32/Rbot-ACQ

In reply to: VIRUS ALERTS - May 16, 2005

Aliases Backdoor.Win32.IRCBot.aw
W32/Sdbot.g.gen
WORM_RBOT.GEN

Type Worm

W32/Rbot-ACQ is a worm with backdoor Trojan functionality.
W32/Rbot-ACQ connects to an IRC channel and listens for backdoor commands from a remote attacker.


http://www.sophos.com/virusinfo/analyses/w32rbotacq.html

Collapse -
W32/Agobot-AAD

In reply to: VIRUS ALERTS - May 16, 2005

Aliases Backdoor.Win32.Agobot.acc
WORM_AGOBOT.ATF

Type Worm

W32/Agobot-AAD is an internet worm and backdoor Trojan.
W32/Agobot-AAD spreads by copying itself to network shares protected by weak passwords.
W32/Agobot-AAD runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

http://www.sophos.com/virusinfo/analyses/w32agobotaad.html

Collapse -
Troj/Banker-HD

In reply to: VIRUS ALERTS - May 16, 2005

Aliases Trojan-Spy.Win32.Banker.ea

Type Trojan

Troj/Banker-HD is a password stealing Trojan for the Windows platform.
Troj/Banker-HD monitors which URLs are visited by the web browser and creates fake web pages for certain Brazilian banking sites in order to log account information. The logged information is sent to remote users via email.

http://www.sophos.com/virusinfo/analyses/trojbankerhd.html

Collapse -
Troj/Sober-Q

In reply to: VIRUS ALERTS - May 16, 2005

Aliases Email-Worm.Win32.Sober.q
W32/Sober.q@MM
WORM_SOBER.U

Type Trojan

Troj/Sober-Q is a mass mailing spamming Trojan for the Windows platform.
Some of the spam emails sent out by the Trojan can have the following subject lines:
'4,8 Mill. Osteuropaeer durch Fischer-Volmer Erlass'
'Auf Streife durch den Berliner Wedding'
'Auslaender bevorzugt'
'Deutsche Buerger trauen sich nicht ...'
'Auslaenderpolitik'
'Blutige Selbstjustiz'
'Dresden 1945'
'Gegen das Vergessen'
'Deutsche werden kuenftig beim Arzt abgezockt'
'Tuerkei in die EU'
'Vorbildliche Aktion'
'60 Jahre Befreiung: Wer feiert mit?'
'Multi-Kulturell = Multi-Kriminell'
'Turkish Tabloid Enrages Germany with Nazi Comparisons'
'The ***** Lived Like a German'
'Armenian Genocide Plagues Ankara 90 Years On'


http://www.sophos.com/virusinfo/analyses/trojsoberq.html

Collapse -
W32/Rbot-ACN

In reply to: VIRUS ALERTS - May 16, 2005

Aliases Backdoor.Win32.Rbot.od

Type Worm

W32/Rbot-ACN is a worm which attempts to spread to remote network shares. It also contains backdoor Trojan functionality, allowing unauthorised remote access to the infected computer via IRC channels while running in the background as a service process.
W32/Rbot-ACN copies itself to the Windows System32 folder as msnmesg.exe and creates entries in the registry to run itself on system startup.

http://www.sophos.com/virusinfo/analyses/w32rbotacn.html

Collapse -
W32/Oscabot-E

In reply to: VIRUS ALERTS - May 16, 2005

Aliases W32/Sdbot.worm.gen.bh

Type Worm

W32/Oscabot-E is an instant messaging worm that can exploit users of AOL Instant Messaging clients.
W32/Oscabot-E connects to a specific channel on an IRC service and waits for an attacker to instruct the bot to send messages to contacts in the infected user's AOL contacts list. The message will read:
"check this out, is that you?".

http://www.sophos.com/virusinfo/analyses/w32oscabote.html

Collapse -
Troj/Bancos-CS

In reply to: VIRUS ALERTS - May 16, 2005

Aliases Win32/Spy.Banker

Type Trojan

Troj/Bancos-CS is a password-stealing Trojan that targets Brazilian banking websites.
Troj/Bancos-CS displays fake user interfaces in order to persuade the user to enter confidential details such as credit card number, login name, password, and PIN code. Stolen information is sent by email to a remote user.

http://www.sophos.com/virusinfo/analyses/trojbancoscs.html

Collapse -
Troj/Feutel-G

In reply to: VIRUS ALERTS - May 16, 2005

Type Trojan

Troj/Feutel-G is a backdoor Trojan for the Windows platform.
Troj/Feutel-G may arrive in an email claiming to contain a screen-saver. The attached executable will drop and run a legitimate screen-saver application and Troj/Feutel-G.

http://www.sophos.com/virusinfo/analyses/trojfeutelg.html

Collapse -
Troj/BeyDl-A

In reply to: VIRUS ALERTS - May 16, 2005

Collapse -
Troj/BeyProxy-A

In reply to: VIRUS ALERTS - May 16, 2005

Collapse -
W32/Kelvir-X

In reply to: VIRUS ALERTS - May 16, 2005

Collapse -
WM97/Lebone-A

In reply to: VIRUS ALERTS - May 16, 2005

Type Virus

WM97/Lebone-A is a macro virus for Microsoft Word that adds a viral macro to the active document when the document closed.
WM97/Lebone-A modifies the active document by inserting the string:
"A vida pode ser feliz!!"
WM97/Lebone-A attempts to stop processes associated with files that are located in the Windows, Windows system and Windows Command folders, and have either EXE or COM extension.
Also on the 6th, 13th, 17th, 23rd and 28th WM97/Lebone-A displays the message " Virus modificou seus arquivos!!", "Word texto informa!!" and attempts to stop processes associated with files that are located in the root and Windows folders, and that have one of the following extensions:
COM, INI, TXT, GIF, XLS, PDF

http://www.sophos.com/virusinfo/analyses/wm97lebonea.html

Collapse -
Troj/Gorgs-A

In reply to: VIRUS ALERTS - May 16, 2005

Collapse -
Dial/MPB-A

In reply to: VIRUS ALERTS - May 16, 2005

Collapse -
W32/Oscabot-D

In reply to: VIRUS ALERTS - May 16, 2005

Aliases Backdoor.Win32.Agent.jn
IM-Worm.Win32.Pakes
W32/Oscarbot

Type Worm

W32/Oscabot-D is a worm with backdoor functionality for the Windows platform that allows unauthorised remote access to the infected computer via IRC channels.
W32/Oscabot-D attempts to spread via AOL Instant Messenger (AIM) after receiving the appropriate command from a remote intruder by sending the following message with the link to the worm copy:
This was cool, check it out

http://www.sophos.com/virusinfo/analyses/w32oscabotd.html

Popular Forums

icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

DEALS, DEALS, DEALS!

Best Black Friday Deals

CNET editors are busy culling the list and highlighting what we think are the best deals out there this holiday season.