rc5 worm

MooCow

Senior member
Oct 12, 1999
237
0
0
Would anyone know of an antivirus software that detects the worm? I've had to uninstall it (with dnet's dewormer ) twice from a local business's computers and while it's easy enough to get rid of I'd like to make sure it don't come back. I don't know what the deal is with it, but it kills the use of the network when it infects the system.

anywho here are the email addresses that were in the ini files
gentleps@muohio.edu
bymer@ukrpost.net

not sure if I should email them to inform them that their email addy is being used or not.
 

Jator

Golden Member
Jun 14, 2000
1,445
7
81
I had a friend who was a IT admin and he said the same thing, it kills the netowrk performance. Most of the worms have been discreditied by DNet, witha few exceptions. I'd let Dnet worry about the e-mail addy's, unless you recognize it as a TA e-mail. Then you might want to let that person know.

Jay
 

IsOs

Diamond Member
Oct 9, 1999
4,475
0
76
Could you tell us how do you suppose it got in your machine in the first place. That information is valuable in preventing other infections.
 

MooCow

Senior member
Oct 12, 1999
237
0
0
The only way I see the machines could get infected would be through email. Since these aren't my machines I'm not entirely sure what goes on with them. I've told the people who use them what rc5 is and that it isn't really and evil thing. I let them know I suspect emails to be the problem. And I showed them who to use the wormfree program. But I'd really like to make it so they don't have to worry about it at all. It's only 2 systems networked together, don't even have a hub between them. Only a few people ever use them to.

Jator: thanks for letting me know that someone else has had similar problems. I know gentleps@muohio.edu is in the top 10 (5?) for daily rc5 and isn't doing so bad in ogr either so I don't know if that's the reason someone used their email or if that's the reason they're in such a high spot. If we ever get stats back I'll look and see where bymer@ukrpost.net stands in the rankings

Edit: thanks for the link engineer
 

Moose

Member
Apr 8, 2000
180
0
0
We suspect they used gentleps@muohio.edu because itis my email address (which is available from my plan) as well as being at the top of the stats.

The major virus detection software packages detect the worm install. Every once in awhile one of them will include dnetc.exe in the detection and we correct them as quick as we can. We have been working very closely with them to stay ontop of the problem.

As far as the worms go they are spread via open c-shares not email. Our wormfree program will prompt you to shut down your c shares and will close them for you if you want. One thing is that it sometimes takes running the wormfree program more than once. The "helperapp" (wininit.exe and the like) does not shut down right away and cannot be deleted right away causing it to not be deleted. It takes some time for the 10 or so threads that it has running to be killed.

I hope that makes sense.

moose
 

MooCow

Senior member
Oct 12, 1999
237
0
0
Ok now I can see why they'd use that email addy. Anywho I think I might be able to take care of it now that I've asked you guys Thanks Moose

 

MWalkden

Golden Member
Dec 7, 1999
1,082
0
0
You might consider loading Zone Alarm or like tool to disable the shares being exposed (the shares still exist, but Zone Alarm makes the PC appear as not being on line). I recommend you look at Steve Gibsons site and do the sheilds up testing (found at Sheilds Up). This will give you an idea of how this is comming into your system. If you require ports to be open you might want to run a seperate protocol for the LAN than you do for the Internet connection. What you do is bind file and print sharing to the LAN protocol and not to the Internet one.

I spent several hours reading anything I could find (actually spent most of my time searching for information) and didn't come up with much more than Engineer posted above. The worm simply looks for open shares on an IP, any IP, and tries to infect the system. Once it finds sucess on a LAN, it then explores the LAN with the rights assigned to the infected machine. This allows it to spread more easily.

The bad thing about this is the technique is easily duplicatable and the payload could be much worse. The obvious increase on the stats shows just how open networks are to infection.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |