The Security Channel reminds you today that July 22, April 26 (this Thursday) is the day when CIH broke out. In particular, it reminds the majority of computer users to do a good job of anti-virus and immediately scan and kill viruses. Do not take CIH viruses lightly. First, do not use pirated software. Stick to genuine software, enable anti-virus software to monitor and upgrade the latest virus database in real time. Secondly, all software on the network, CD, and floppy disk should be checked with anti-virus software before installation or use. Be sure to install anti-virus software that can automatically clear viruses in the compressed package.
Among today's viruses, the "Cobo" variants, the "e" variants, the "downloader" variants, and the "QQ thieves" variants are worth noting.
The "Cobo" variant is a backdoor that uses vulnerabilities on infected computers to spread.
The "e" variant is a Web worm that uses a group of infected emails to spread.
The "QQ account theft" variant is a trojan virus that steals users' QQ accounts.
Virus name: Backdoor/Codbot. j
Chinese name: "Cobo" variant j
Virus length: 47616 bytes
Virus Type: Backdoor
Hazard level:★★
Affected Platforms: Win 9X/ME/NT/2000/XP/2003
The Backdoor/Codbot. j "Cobo" variant j is a Backdoor that uses vulnerabilities on infected computers to spread. After the "Cobo" variant j runs, it copies itself to the system directory. Modify the registry and create a service. Enable backdoors on TCP port 6556, connect to the specified site, listen for hacker commands, record users' keyboard and mouse operations, terminate specific processes, and download remote files. Enable specific ports and exploit Microsoft vulnerabilities to spread.
Virus name: I-Worm/BBEagle.mo
Chinese name: mo
Virus length: Variable
Virus Type: Network Worm
Hazard level:★★
Affected Platforms: Win 9X/ME/NT/2000/XP/2003
The I-Worm/BBEagle.mo "" variant mo is a Web Worm that uses a group of infected emails for transmission. After mo runs the variant, a copy of the worm is created on the infected computer. Modify the Registry to enable automatic startup. A false error image is displayed. Use rootkit Technology to hide itself and prevent being scanned and killed. Connect to the specified site, download a series of specified email addresses, and send Group emails with viruses. Terminate security-related processes, delete security-related files, and reduce security settings on infected computers.
[Content navigation] |
Page 1st: Be careful when sending a batch of emails containing viruses to steal QQ |
Page 2nd: Be careful when sending a batch of emails containing viruses to steal QQ |