[Thread Prev] [Thread Next] [Thread Index] [Date Prev] [Date Next] [Date Index]

paleonet Customized viruses



Folks,

No, typically the virus/worm attacks are NOT customized for a particular
person. What the authors of these programs are doing is assuming you know
the people in your email address lists and that a potential host is more
likely to open the attachment if it is somehow personalized. So you are
seeing viruses and worms imbedding themselves into files selected from what
is available on the infected pc with email subjects like "For your comment",
"As you requested", "Here is the information", etc. If you get something
like this, you are more likely to open (and execute) the attachment with the
infected payload. Another clue: look for multiple file types instead of the
usual 8.3 file name (as in image.doc.pif).

What to do? If you aren't expecting an attachment, don't open it.
Immediately update your virus definitions and scan your attachment
directory. If an infection is detected, just delete the file. If you are
expecting an attachment from a known and trusted source, scan it anyway. By
keeping virus auto-protection feature running, this usually happens as a
matter of course. If you don't keep your definitions up to date, however,
scanning with out-of-date information is only marginally better than not
scanning at all; you are at risk.

If you detect a virus, you really only need to contact the person it came
from. And, remember, most of the viruses and worms are stealthy; they don't
announce themselves immediately. They like to quietly replicate themselves
and send out copies. The user of the infected machine is most likely not
aware the machine is infected.

Keep your virus definitions current.

Brandon C. Nuttall

BNUTTALL@KGS.MM.UKY.EDU  Kentucky Geological Survey
(859) 257-5500           University of Kentucky
(859) 257-1147 (fax)     228 Mining & Mineral Resources Bldg
                         Lexington, Kentucky 40506-0107
www.uky.edu/KGS/home.htm
www.uky.edu/KGS/PTTC/home.htm