Log In

Reset Password

Good riddance Nimda, now prepare for the Vote worm

After a week on the prowl W32.Nimda.Amm, also known as Nimda, is still infecting computers running Microsoft Internet Explorer 5.01 and 5.5, and servers running Microsoft IIS 4.0 and 5.0.

So far the virus is soaking up as much as ten percent of the Internet's capacity, security software firm Network Associates Inc. has said. The virus spreads by the usual means - through e-mail - but marks advancement on the weapons used by the dastardly hackers who create this stuff.

Usually viruses infect only those who still open unexpected e-mail attachments, which then launches the virus. The Nimda worm attacks Microsoft Outlook and Express users, arriving as an apparently blank message with an attachment called `readme.exe'.

The user only has to open the message or view it in the preview pane to begin the infection. Once it's infected a machine, Nimda exposes local hard drives to the network, and continues to spread further.

The virus exploits a bug in older versions of Internet Explorer and a fix was posted by Microsoft in May this year. How do you tell if you're already protected? In your Internet Explorer "Help" tab, go to "About Internet Exporer". If Q299618 is listed in the "Update Versions" section then you're protected. If it is not then get the patch at the Microsoft website (www.microsoft.com) and go to the security section. Nimda is classified as "high risk" by McAfee and Symantec.

If you're unsure whether you've been infected, which may be difficult to determine, then go to the Symantec site for a removal tool and instructions on what to do to restore damaged files.

Watch out for another virus, which cruelly is preying on the emotions aroused by the terrorist attack on the US. The Vote Virus - called by some experts as the most destructive e-mail bug yet - is currently attacking and eating into computers around North America, exploiting war worries and public concern over the terrorist attacks in the United States.

The virus message appears with the subject line: "Fwd: Peace BeTweeN AmeriCa And IsLaM!" and the body of the e-mail reads: "Hi iS iT A waR Against AmeriCa Or IsLaM !? Let's Vote To Live in Peace!" When the receiver opens an attachment entitled "WTC.exe", the virus copies itself to all addresses in the Outlook address book and puts the message "AmeRiCa...Few Days Will Show You What We Can Do!!! It's Our Turn" on any Web page or e-mail that looks like a Web page.

When a computer is restarted, the virus wipes out the Windows operating system and any virus applications, exposing the hard drive to the Internet or a network.

It then displays the message: "I promiss We WiLL Rule The World Again...By The Way, You Are Captured by ZaCker!!!"

The Vote Virus began spreading early Monday and has affected at least 50 large corporate computer networks in North America. Now is a good time to ensure that your virus protection program is updated and configured properly.

For Norton Antivirus, open up the "Options" section and go through each tab selection, especially E-mail section. Ensure that protection for your e-mail client is turned on. Somehow or the other mine got turned off, probably by mistake, and Norton wasn't monitoring Outlook Express.

In a related issue SecurityFocus magazine is warning that hackers, virus-writers and Web site defacers would face life imprisonment without the possibility of parole under legislation proposed by the Bush administration that would classify most computer crimes as acts of terrorism.

The proposed Anti-Terrorism Act (ATA) also would expand the US government's legal powers to conduct electronic surveillance, access business records, and detain suspected terrorists.

Included in the list of terrorism offences are provisions of the Computer Fraud and Abuse Act that make it illegal to crack a computer for the purpose of obtaining anything of value, or to deliberately cause damage. Launching a malicious program that harms a system, like a virus, or making an extortionate threat to damage a computer are included in the definition of terrorism.

An unfortunate consequence of the terrorist attack is that those who would extend the states powers of surveillance of its citizens, in the US and elsewhere, have now taken the opportunity to push their agenda, without the counterbalancing caution of privacy rights advocates.

It's difficult to speak up for privacy when you fear being labelled as one who would allow such an atrocity to happen again. No one knows whether such surveillance would have caught the terrorists, but the argument has plausibility by assuming that the terrorists were able to carry out the US attack because such powers were not in place.

A recent Wired article reports that federal law enforcement agencies approached ISPs and web providers to deploy its controversial DCS1000 software, formerly known as Carnivore.

The software intercepts and monitors Internet communications. Reportedly, most companies that have been approached are supportive of the FBI's request. Next comes more widespread use of keystroke monitoring, and laws banning strong encryption use.

Watch out for signs of this creeping intrusion in a government near you.

Tech Tattle deals with topics relating to technology. You can contact Ahmed at editoroffshoreon.com or (33) 467901474.