<?xml version="1.0" encoding="UTF-8"?>

<rss version="2.0"
 xmlns:blogChannel="http://backend.userland.com/blogChannelModule"
>

<channel>
<title>Topic &#x27;Re: Watch out for this Virus its spreading rapidly!!!!&#x27; in forum &#x27;Adelphia HSI&#x27; - dslreports.com</title>
<link>http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7042497</link>
<description></description>
<language>en</language>
<pubDate>Sat, 26 Mar 2022 03:43:36 EDT</pubDate>
<lastBuildDate>Sat, 26 Mar 2022 03:43:36 EDT</lastBuildDate>

<item>
<title>Re: Watch out for this Virus its spreading rapidly!!!!</title>
<link>http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7051032</link>
<description><![CDATA[UnKnown posted : Being an Admin of a few differnt mail servers what should i start looking for?<br><br>We dont get much mail and we do get routed threw www.nac.net  will they provide enough protection for us?]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7051032</guid>
<pubDate>Fri, 06 Jun 2003 19:30:05 EDT</pubDate>
</item>
<item>
<title>Re: Watch out for this Virus its spreading rapidly!!!!</title>
<link>http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7050941</link>
<description><![CDATA[MikBo posted : Hey jaymode how did it appear? was it a message with attachment?Or just a fwd from some one you know?We never open fwds. and attachments here,for that reason.<br><small>--<br>"Things will get better,despite our efforts to improve them!"--Will Rogers</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7050941</guid>
<pubDate>Fri, 06 Jun 2003 19:20:26 EDT</pubDate>
</item>
<item>
<title>Re: Watch out for this Virus its spreading rapidly!!!!</title>
<link>http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7047514</link>
<description><![CDATA[jaymode posted : it made it through my norton yesterday. I did not click it but deleted it immediately and notified the person whom I got it from because even though the email was not from someone I know, i know who it was too so I was able to tell them. I was surprised that I found it got to me before I read something about it.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7047514</guid>
<pubDate>Fri, 06 Jun 2003 12:22:38 EDT</pubDate>
</item>
<item>
<title>Re: Watch out for this Virus its spreading rapidly!!!!</title>
<link>http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7046308</link>
<description><![CDATA[TrainBuff posted : WOW....it seems like we must be more observant on our incoming mail. I'm always careful on what I open, but this is a new one. Thanks for the reply.<br><small>--<br>Train Yourself To Relax...Ride The New Haven Railroad</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7046308</guid>
<pubDate>Fri, 06 Jun 2003 09:37:59 EDT</pubDate>
</item>
<item>
<title>Re: Watch out for this Virus its spreading rapidly!!!!</title>
<link>http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7045888</link>
<description><![CDATA[cbyrd posted :  <BLOCKQUOTE><SMALL>said by <a href="/profile/806281" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=806281');">TrainBuff</a>:</SMALL><HR>I never heard of the "fake message bounce" virus. To show my ignorance, what is that one.<br> <HR></BLOCKQUOTE><br><br>It's one of the nastier methods of delivery IMO.  The virus sends out an email that appears to the untrained eye to be a "message undeliverable" or bounce.  The attached "log" is actually a virus, usually an html application (hta file).<br><br>I first saw it early this year.  The first version was an obvious fake bounce due to mispellings and awful grammar, but the latest version is a bit more convincing.<br><small>--<br>Sometimes it's easier to beg for forgiveness than ask for permission</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7045888</guid>
<pubDate>Fri, 06 Jun 2003 08:03:38 EDT</pubDate>
</item>
<item>
<title>Re: Watch out for this Virus its spreading rapidly!!!!</title>
<link>http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7045698</link>
<description><![CDATA[TrainBuff posted : I never heard of the "fake message bounce" virus. To show my ignorance, what is that one.<br><small>--<br>Train Yourself To Relax...Ride The New Haven Railroad</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7045698</guid>
<pubDate>Fri, 06 Jun 2003 07:20:38 EDT</pubDate>
</item>
<item>
<title>Re: Watch out for this Virus its spreading rapidly!!!!</title>
<link>http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7043162</link>
<description><![CDATA[cbyrd posted : I trapped over a dozen of this thing at the proxy at work today, meaning it made it through Mcafee (our 1st line of defense @ our provider).<br><br>The "fake message bounce" virus is on the move again too, I've seen it twice this week.<br><small>--<br>Sometimes it's easier to beg for forgiveness than ask for permission</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Watch-out-for-this-Virus-its-spreading-rapidly-7043162</guid>
<pubDate>Thu, 05 Jun 2003 22:09:34 EDT</pubDate>
</item>
<item>
<title>Watch out for this Virus its spreading rapidly!!!!</title>
<link>http://www.dslreports.com/forum/Watch-out-for-this-Virus-its-spreading-rapidly-7042497</link>
<description><![CDATA[L_ance posted : In case some of you don't know about this new  virus outbreak.<br>From MessageLabs<br><br>New Bugbear Virus Spreading Rapidly; Poses Significant Damage Threat<br>5 June 2003    <br><br>New York, NY, June 5, 2003 &#150; MessageLabs, the world&#146;s leading provider of managed email security services, today announced it has intercepted a very high volume of a new mass mailing virus, W32/Bugbear.B-mm, and has issued a high-level alert for enterprises.<br><br>MessageLabs first intercepted copies of the virus at 6:59 am on June 4 and as of 11:00 am EDT today has intercepted more than 35,000 copies of the virus across 106 countries while providing complete protection for MessageLabs customers (latest statistics available on the MessageLabs Web site).<br><br>W32/Bugbear.B-mm differs greatly from recent virus outbreaks. It appears to be very polymorphic and malicious in nature. It has the ability to repack or modify itself during each generation, presumably in an attempt to foil simple anti-virus signature fingerprinting techniques to detect it. The virus re-mails itself to the recipient&#146;s address book using a random email, which could potentially be highly confidential, found in the recipient&#146;s address book.<br><br>In copies of the virus that MessageLabs has stopped, the MS01-020 auto-open exploit has also been found, which will automatically execute the virus attachment just by reading the email on an un-patched Windows system.<br><br>Initial analysis indicates that this virus also attempts to disarm local security software, such as anti-virus or firewall software. It may also be able to spread via network shares, as was the case with the earlier Bugbear.A strain. Furthermore, it installs a key-logging trojan component and enables an unscrupulous hacker to take control of the infected machine and download a file containing the user&#146;s keystrokes, including information entered on websites such as passwords or credit-card details for example.<br><br>&#147;Bugbear.B is likely to be more damaging than any virus seen so far this year,&#148; said Mark Sunner, Chief Technology Officer at MessageLabs. &#147;Particularly worrying is the fact that not only can Bugbear leach confidential information from an infected machine, but it may also leave a backdoor wide open for hackers to take control of the machine and misappropriate passwords, credit-card details or for some other nefarious purpose.&#148;<br><br>To find more detailed information on the virus and to track its activity across the globe, please visit: &raquo;<A HREF="http://www.messagelabs.com/viruseye/threats/" >www.messagelabs.com/viru &middot;&middot;&middot; threats/</A><br><small>--<br>Lance</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Watch-out-for-this-Virus-its-spreading-rapidly-7042497</guid>
<pubDate>Thu, 05 Jun 2003 21:10:44 EDT</pubDate>
</item>
</channel>
</rss>
