Jump to content
RemedySpot.com

Old & New Computer Virus

Rate this topic


Guest guest

Recommended Posts

I saw this last night. Most of the below is very old stuff except for the Facebook one - Dec. 05, 2008

What reminded me I had to reboot and the first thing I saw was to update Acrobat,

http://abcnews.go.com/search?searchtext=Acrobat%20Virus & type=

Page 1 of 360 pages for "Acrobat Virus":

Verizon-Alltel, Fast Times at Broadcom or http://abcnews.go.com/Technology/PCWorld/story?id=5014551... adds Flash to Acrobat: Adobe unveiled acrobat.com, featuring beta ... provided details about Acrobat 9.0 document-sharing software, which is ... . New crypto virus a looming threat: A variant has emerged of the ... Jun. 6, 2008 | Weil; Idg News Service

6. New crypto virus a looming threat: A variant has emerged of the Windows-based encryptor virus Gpcode, which hasn't been around for more than a year. This is the virus that encrypts a victim's data and then demands a ransom to unscramble the data. This variant uses 1,024-bit algorithm that security researchers have not been able to crack, making it a potentially major threat, according to Kaspersky Labs, which discovered the variant. "Up until now, we were able to crack the algorithms," says Roel Schouwenberg, senior antivirus researcher at Kaspersky Lab.

'Peachy' Virus Isn't So Peachy or http://abcnews.go.com/Technology/story?id=98343 & page=1... Virus; Adobe PDF ... 'Peachy' Virus Isn't So Peachy ... found the first virus able to propagate through Adobe’s encrypted ... Aug. 10, 2001

Security experts have found the first virus able to propagate through Adobe’s encrypted portable document format (PDF) files, a format once thought to be virtually impenetrable.

Named Peachy by experts at Web security firm McAfee on Tuesday, the e-mail virus hides itself in PDF files and infects other computer systems by sending the file as an attachment through the Microsoft Outlook e-mail program.

The virus exploits a feature in Acrobat that combines other files with the PDF code. The virus is located in visual basic script contained in the PDF file and is launched when a user clicks on a peach icon located within the document.

Dec. 5, 2008 | Bigg

Facebook Virus Turns Your Computer into a Zombie or http://abcnews.go.com/Technology/PCWorld/story?id=6401270... Facebook Virus Turns Your Computer into a Zombie ... "Koobface" virus. "Koobface" comes through an e-mail sent by one of your ... Therein lies the virus, cloaked in a "flash_player.exe" file. According ... Dec. 5, 2008 | Brennon Slattery; Pc World

Hey, I have this hilarious video of you dancing. Your face is so red. You should check it out.

If you've received a message like that through Facebook or MySpace, you may have been exposed to the "Koobface" virus. "Koobface" comes through an e-mail sent by one of your social networking site friends inviting you to scope out a video.

Once the URL is clicked, "Koobface" prompts you to update your Flash player before the video can be displayed. Therein lies the virus, cloaked in a "flash_player.exe" file. According to the Kaspersky Lab, an antivirus organization working closely with Facebook, "the worms transform victim machines into zombie computers to form botnets."

The McAfee Security Blog explains that when "Koobface" infects your computer, it prompts a downloaded service named Security Accounts Manager (SamSs) to load on start-up. SamSs then proxies all HTTP traffic, stealing results from popular search engines and hijacking them to lesser-known search sites.

http://www.symantec.com/norton/security_response/index.jsp

Email

MEDIUMRISK

Use Extra Caution

Adobe Reader/Acrobat 8 JavaScript vulnerabilty In-the-wild exploitation of a recent vulnerability in Reader and Acrobat 8 has been seen. Attackers may exploit this issue by enticing victims into opening maliciously crafted files. Apply available fixes immediately.

Security Update for Adobe Reader 8 and Acrobat 8

Web Activities

MEDIUMRISK

Use Extra Caution

Adobe Reader/Acrobat 8 JavaScript vulnerabilty In-the-wild exploitation of a recent vulnerability in Reader and Acrobat 8 has been seen. Attackers may exploit this issue by enticing victims into opening maliciously crafted files. Apply available fixes immediately.

Security Update for Adobe Reader 8 and Acrobat 8

Instant Messaging

MEDIUMRISK

Use Extra Caution

Microsoft addresses several client-side flaws Microsoft released fixes for several client-side vulnerabilities affecting multiple products. Attackers may exploit these issues by enticing victims into opening maliciously crafted files. Apply available fixes immediately. >Microsoft Security Bulletin Summary for November

File Sharing

MEDIUMRISK

Use Extra Caution

Adobe Reader/Acrobat 8 JavaScript vulnerabilty In-the-wild exploitation of a recent vulnerability in Reader and Acrobat 8 has been seen. Attackers may exploit this issue by enticing victims into opening maliciously crafted files. Apply available fixes immediately.

Security Update for Adobe Reader 8 and Acrobat 8

How They AttackThreats today have become more complicated. They tend to use multiple vectors to spread, thus increasing their chances of infection. Once on the system, these threats tend to show little to no symptoms so they can survive undetected.

Vulnerabilities

Spyware

Spam

Malware

Phishing

What is Cybercrime? Over the last 18 months, an ominous change has swept across the Internet. The tools driving the new attacks and fueling the blackmarket are crimeware - bots, Trojan horses, and spyware.

Cybercrime Stories

Are you like E?

Never had a virus

Shop in store, not online

Use popular search engines

Read how you could become a cybercrime victim or

http://www.symantec.com/norton/cybercrime/stories.jsp

Link to comment
Share on other sites

I got this 3 days ago and here is what i did.This virus takes away admin from you in your computer in your owner account.I clicked start, control panel, then user accountsOpen a new user account in your computer and give it admin responsibilities.password protect the new account.then open your owner account and take away admin responsibilities and also with any other accounts you see. At this point you lock the virus where it is. I did a manual search thru regedit and got rid of it but unless you know alot about computers i suggest you lock it down where it is and use a anti virus program to get rid of it.I also suggest you go to the microsoft website and download this program, Just takes a few mouse clicks to return your computer back the way it was before you

get a virus or wormhttp://www.microsoft.com/windows/products/winfamily/sharedaccess/default.mspxHope everyone feels good today.JeffFrom: Jo Lynne <jolynne4@...>Subject: Old & New Computer Virus"Jo Lynne" <jolynne4@...>Date: Saturday, December 6, 2008, 12:02 AM

I saw this last night. Most of the below is very old stuff except for the Facebook one - Dec. 05, 2008

What reminded me I had to reboot and the first thing I saw was to update Acrobat,

http://abcnews. go.com/search? searchtext= Acrobat%20Virus & type=

Page 1 of 360 pages for "Acrobat Virus":

Verizon-Alltel, Fast Times at Broadcom or http://abcnews. go.com/Technolog y/PCWorld/ story?id= 5014551... adds Flash to Acrobat: Adobe unveiled acrobat.com, featuring beta ... provided details about Acrobat 9.0 document-sharing software, which is ... . New crypto virus a looming threat: A variant has emerged of the ... Jun. 6, 2008 | Weil; Idg News Service

6. New crypto virus a looming threat: A variant has emerged of the Windows-based encryptor virus Gpcode, which hasn't been around for more than a year. This is the virus that encrypts a victim's data and then demands a ransom to unscramble the data. This variant uses 1,024-bit algorithm that security researchers have not been able to crack, making it a potentially major threat, according to Kaspersky Labs, which discovered the variant. "Up until now, we were able to crack the algorithms," says Roel Schouwenberg, senior antivirus researcher at Kaspersky Lab.

'Peachy' Virus Isn't So Peachy or http://abcnews. go.com/Technolog y/story?id= 98343 & page=1... Virus; Adobe PDF ... 'Peachy' Virus Isn't So Peachy ... found the first virus able to propagate through Adobe¢s encrypted ... Aug. 10, 2001

Security experts have found the first virus able to propagate through Adobe¢s encrypted portable document format (PDF) files, a format once thought to be virtually impenetrable.

Named Peachy by experts at Web security firm McAfee on Tuesday, the e-mail virus hides itself in PDF files and infects other computer systems by sending the file as an attachment through the Microsoft Outlook e-mail program.

The virus exploits a feature in Acrobat that combines other files with the PDF code. The virus is located in visual basic script contained in the PDF file and is launched when a user clicks on a peach icon located within the document.

Dec. 5, 2008 | Bigg

Facebook Virus Turns Your Computer into a Zombie or http://abcnews. go.com/Technolog y/PCWorld/ story?id= 6401270... Facebook Virus Turns Your Computer into a Zombie ... "Koobface" virus. "Koobface" comes through an e-mail sent by one of your ... Therein lies the virus, cloaked in a "flash_player. exe" file. According ... Dec. 5, 2008 | Brennon Slattery; Pc World

Hey, I have this hilarious video of you dancing. Your face is so red. You should check it out.

If you've received a message like that through Facebook or MySpace, you may have been exposed to the "Koobface" virus. "Koobface" comes through an e-mail sent by one of your social networking site friends inviting you to scope out a video.

Once the URL is clicked, "Koobface" prompts you to update your Flash player before the video can be displayed. Therein lies the virus, cloaked in a "flash_player. exe" file. According to the Kaspersky Lab, an antivirus organization working closely with Facebook, "the worms transform victim machines into zombie computers to form botnets."

The McAfee Security Blog explains that when "Koobface" infects your computer, it prompts a downloaded service named Security Accounts Manager (SamSs) to load on start-up. SamSs then proxies all HTTP traffic, stealing results from popular search engines and hijacking them to lesser-known search sites.

http://www.symantec .com/norton/ security_ response/ index.jsp

Email

MEDIUMRISK

Use Extra Caution

Adobe Reader/Acrobat 8 JavaScript vulnerabilty In-the-wild exploitation of a recent vulnerability in Reader and Acrobat 8 has been seen. Attackers may exploit this issue by enticing victims into opening maliciously crafted files. Apply available fixes immediately.

Security Update for Adobe Reader 8 and Acrobat 8

Web Activities

MEDIUMRISK

Use Extra Caution

Adobe Reader/Acrobat 8 JavaScript vulnerabilty In-the-wild exploitation of a recent vulnerability in Reader and Acrobat 8 has been seen. Attackers may exploit this issue by enticing victims into opening maliciously crafted files. Apply available fixes immediately.

Security Update for Adobe Reader 8 and Acrobat 8

Instant Messaging

MEDIUMRISK

Use Extra Caution

Microsoft addresses several client-side flaws Microsoft released fixes for several client-side vulnerabilities affecting multiple products. Attackers may exploit these issues by enticing victims into opening maliciously crafted files. Apply available fixes immediately. >Microsoft Security Bulletin Summary for November

File Sharing

MEDIUMRISK

Use Extra Caution

Adobe Reader/Acrobat 8 JavaScript vulnerabilty In-the-wild exploitation of a recent vulnerability in Reader and Acrobat 8 has been seen. Attackers may exploit this issue by enticing victims into opening maliciously crafted files. Apply available fixes immediately.

Security Update for Adobe Reader 8 and Acrobat 8

How They AttackThreats today have become more complicated. They tend to use multiple vectors to spread, thus increasing their chances of infection. Once on the system, these threats tend to show little to no symptoms so they can survive undetected.

Vulnerabilities

Spyware

Spam

Malware

Phishing

What is Cybercrime? Over the last 18 months, an ominous change has swept across the Internet. The tools driving the new attacks and fueling the blackmarket are crimeware - bots, Trojan horses, and spyware.

Cybercrime Stories

Are you like E?

Never had a virus

Shop in store, not online

Use popular search engines

Read how you could become a cybercrime victim or

http://www.symantec .com/norton/ cybercrime/ stories.jsp

Link to comment
Share on other sites

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...