Re: kornet.net abuse desk is mailing out W32.Nimda.E@mm worm
In message <195358945566.20011030133637@conti.nu>, Kai Schlichting writes:
If you or your staff have dealt with kornet.net (a Korean ISP belonging to Korean Telecom), and specifically abuse@kornet.net in the past, beware: It seems that they've been overrun by the brand-spanking-new W32.Nimda.E@mm worm (**) sometimes late last night.
Specific case in hand: yesterday at 9:40pm EST, I received a mail with a Subject: line of an UNRELATED abuse issue (hello MFNX/XO/ Above.net :) that contains a MIME attachment with an auto-playing "sound file" of sample.exe , openened in an <iframe> of your favorite Microsoft email client. Source IP of the mailing : 210.222.17.36 (/24).
Note, however, that the From: line on these Nimda variants is also forged; see http://securityresponse.symantec.com/avcenter/venc/data/w32.nimda.a@mm.html for details. (I received several messages saying that some mail I sent was infected with Nimda.E. This struck me as quite improbable, since I use NetBSD for all my email and other real work.) --Steve Bellovin, http://www.research.att.com/~smb Full text of "Firewalls" book now at http://www.wilyhacker.com
participants (1)
-
Steven M. Bellovin