home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   ANTI_VIRUS      Anti-Virus Discussion & News      523 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 267 of 523   
   Ben Ritchey to All   
   US-CERT Bulletin   
   15 Apr 15 10:42:18   
   
   NCCIC / US-CERT   
      
   National Cyber Awareness System:   
      
   TA15-105A: Simda Botnet   
   04/15/2015 08:51 AM EDT   
      
      
   Original release date: April 15, 2015   
      
   Systems Affected   
   Microsoft Windows   
      
   Overview   
   The Simda botnet – a network of computers infected with self-propagating   
   malware – has compromised more than 770,000 computers worldwide [1].   
      
   The United States Department of Homeland Security (DHS), in collaboration with   
   Interpol and the Federal Bureau of Investigation (FBI), has released this   
   Technical Alert to provide further information about the Simda botnet, along   
   with prevention and mitigation recommendations.   
      
   Description   
   Since 2009, cyber criminals have been targeting computers with unpatched   
   software and compromising them with Simda malware [2]. This malware may   
   re-route a user’s Internet traffic to websites under criminal control or can   
   be used to install additional malware.   
      
   The malicious actors control the network of compromised systems (botnet)   
   through backdoors, giving them remote access to carry out additional attacks   
   or to “sell” control of the botnet to other criminals [1]. The backdoors also   
   morph their presence every few hours, allowing low anti-virus detection rates   
   and the means for stealthy operation [3].   
      
   Impact   
   A system infected with Simda may allow cyber criminals to harvest user   
   credentials, including banking information; install additional malware; or   
   cause other malicious attacks. The breadth of infected systems allows Simda   
   operators flexibility to load custom features tailored to individual targets.   
      
   Solution   
   Users are recommended to take the following actions to remediate Simda   
   infections:   
      
   Use and maintain anti-virus software - Anti-virus software recognizes and   
   protects your computer against most known viruses. It is important to keep   
   your anti-virus software up-to-date (see Understanding Anti-Virus Software for   
   more information).   
   Change your passwords - Your original passwords may have been compromised   
   during the infection, so you should change them (see Choosing and Protecting   
   Passwords for more information).   
   Keep your operating system and application software up-to-date - Install   
   software patches so that attackers cannot take advantage of known problems or   
   vulnerabilities. Many operating systems offer automatic updates. If this   
   option is available, you should enable it (see Understanding Patches for more   
   information).   
   Use anti-malware tools - Using a legitimate program that identifies and   
   removes malware can help eliminate an infection. Users can consider employing   
   a remediation tool (examples below) that will help with the removal of Simda   
   from your system.   
             Kaspersky Lab : http://www.kaspersky.com/security-scan   
      
             Microsoft: http://www.microsoft.com/security/scanner/e   
   -us/default.aspx   
      
             Trend Micro: http://housecall.trendmicro.com/   
      
   Check to see if your system is infected – The link below offers a simplified   
   check for beginners and a manual check for experts.   
             Cyber Defense Institute:  http://www.cyberdefense.jp/simda/   
      
   The above are examples only and do not constitute an exhaustive list. The U.S.   
   government does not endorse or support any particular product or vendor.   
      
   References   
   [1] INTERPOL Coordinates Global Operation to Take Down Simda Botnet   
   [2] Microsoft partners with Interpol, industry to disrupt global malware   
   attack affecting more than 770,000 PCs in past six mo   
   [3] Botnet that Enslaved 770,000 PCs Worldwide Comes Crashing Down   
   Revision History   
   April 15, 2015: Initial Release   
      
   ----------------------------------------------------------------   
   -------------- -   
      
   This product is provided subject to this Notification and this Privacy & Use   
   policy.   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   OTHER RESOURCES:   
   Contact Us | Security Publications | Alerts and Tips | Related Resources   
   STAY CONNECTED:   
   Sign up for email updates   
      
   SUBSCRIBER SERVICES:   
   Manage Preferences  |  Unsubscribe  |  Help   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf   
   of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray   
   Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 Powered by GovDelivery   
      
      
      
   --   
   Guardien Fide   :^)   
      
      Ben  aka cMech  Web: http://cmech.dynip.com   
                    Email: fido4cmech(at)lusfiber.net   
                 Home page: http://cmech.dynip.com/homepage/   
              WildCat! Board 24/7  +1-337-984-4794  any BAUD 8,N,1   
      
   --- GoldED+/W32-MSVC   
    * Origin: FIDONet - The Positronium Repository (1:393/68)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca