Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    ANTI_VIRUS    |    Anti-Virus Discussion & News    |    523 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 280 of 523    |
|    Ben Ritchey to All    |
|    US-CERT warning    |
|    03 Dec 15 19:59:41    |
      U.S. Department of Homeland Security US-CERT              National Cyber Awareness System:              TA15-337A: Dorkbot       12/03/2015 06:40 PM EST                     Original release date: December 03, 2015              Systems Affected       Microsoft Windows              Overview       Dorkbot is a botnet used to steal online payment, participate in distributed       denial-of-service (DDoS) attacks, and deliver other types of malware to       victims’ computers. According to Microsoft, the family of malware used in this       botnet “has infected more than one million personal computers in over 190       countries over the course of the past year.” The United States Department of       Homeland Security (DHS), in collaboration with the Federal Bureau of       Investigation (FBI) and Microsoft, is releasing this Technical Alert to       provide further information about Dorkbot.              Description       Dorkbot-infected systems are used by cyber criminals to steal sensitive       information (such as user account credentials), launch denial-of-service (DoS)       attacks, disable security protection, and distribute several malware variants       to victims’ computers. Dorkbot is commonly spread via malicious links sent       through social networks instant message programs or through infected USB       devices.              In addition, Dorkbot’s backdoor functionality allows a remote attacker to       exploit infected system. According to Microsoft’s analysis, a remote attacker       may be able to:              Download and run a file from a specified URL;       Collect logon information and passwords through form grabbing, FTP, POP3, or       Internet Explorer and Firefox cached login details; or       Block or redirect certain domains and websites (e.g., security sites).       Impact       A system infected with Dorkbot may be used to send spam, participate in DDoS       attacks, or harvest users' credentials for online services, including banking       services.              Solution       Users are advised to take the following actions to remediate Dorkbot       infections:              Use and maintain anti-virus software – Anti-virus software recognizes and       protects your computer against most known viruses. Even though Dorkbot is       designed to evade detection, security companies are continuously updating       their software to counter these advanced threats. Therefore, it is important       to keep your anti-virus software up-to-date. If you suspect you may be a       victim of Dorkbot, update your anti-virus software definitions and run a       full-system scan. (See Understanding Anti-Virus Software for more information.)       Change your passwords – Your original passwords may have been compromised       during the infection, so you should change them. (See Choosing and Protecting       Passwords for more information.)       Keep your operating system and application software up-to-date – Install       software patches so that attackers cannot take advantage of known problems or       vulnerabilities. You should enable automatic updates of the operating system       if this option is available. (See Understanding Patches for more information.)       Use anti-malware tools – Using a legitimate program that identifies and       removes malware can help eliminate an infection. Users can consider employing       a remediation tool (see example below) to help remove Dorkbot from their       systems.        Disable Autorun – Dorkbot tries to use the Windows Autorun function to       propagate via removable drives (e.g., USB flash drive). You can disable       Autorun to stop the threat from spreading.       Microsoft       http://www.microsoft.com/security/scanner/en-us/default.aspx              The above example does not constitute an exhaustive list. The U.S. Government       does not endorse or support any particular product or vendor.              References       Microsoft Malware Protection Center – Worm: Win32/Dorkbot       Microsoft Malware Protection Center – Microsoft assists law enforcement to       help disrupt Dorkbot botnets       Revision History       December 3, 2015: Initial Publication              ----------------------------------------------------------------       -------------- -              This product is provided subject to this Notification and this Privacy & Use       policy.                     ----------------------------------------------------------------       -------------- -       A copy of this publication is available at www.us-cert.gov. If you need help       or have questions, please send an email to info@us-cert.gov. Do not reply to       this message since this email was sent from a notification-only address that       is not monitored. To ensure you receive future US-CERT products, please add       US-CERT@ncas.us-cert.gov to your address book.       OTHER RESOURCES:       Contact Us | Security Publications | Alerts and Tips | Related Resources       STAY CONNECTED:       Sign up for email updates              SUBSCRIBER SERVICES:       Manage Preferences | Unsubscribe | Help                     ----------------------------------------------------------------       -------------- -       This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf       of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray       Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 Powered by GovDelivery              === Cut ===                     --       Guardien Fide :^)               Ben aka cMech Web: http://cmech.dynip.com        Email: fido4cmech(at)lusfiber.net        Home page: http://cmech.dynip.com/homepage/        WildCat! Board 24/7 +1-337-984-4794 any BAUD 8,N,1              --- GoldED+/W32-MSVC        * Origin: FIDONet - The Positronium Repository (1:393/68)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca