RadioBanter

RadioBanter (https://www.radiobanter.com/)
-   Antenna (https://www.radiobanter.com/antenna/)
-   -   Virus/Worm email messages (https://www.radiobanter.com/antenna/462-virus-worm-email-messages.html)

W3JDR September 22nd 03 12:25 PM

I was getting several hundred of these a day. I got the idea to take my
email address out of my Chat group profiles, just in case some hacker
software was 'harvesting' email addressesfrom these sites. When I removed my
email address from the Yahoo Chat groups I was subscribed to, the spam
seemed to stop dead in its tracks. All has been quiet for some time now.

Coincidence??

Joe
W3JDR


"Bob Miller" wrote in message
...
On Sat, 20 Sep 2003 18:42:36 -0000, "David Robbins"
wrote:


"Steve" wrote in message
om...

"Cecil Moore" wrote in message
...
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp

Yes, 14 yesterday and 4 so far this morning.


you must not have many friends who have you in their address book... i

got
about 1000 overnight last night and about 2500 the day before.


I only get about 3 or 4 emails a week from the spammers. Mostly about
penile enlargement, for some reason.

I recently changed my email address, and set my ISP email anti-spam
filter to "light". That sure cut down on the email.

I also have no firewall and no anti-virus protection, but the computer
works fine, day after day, regardless of how much I get on the
Internet.

Bob
k5qwg







Mike Painter September 22nd 03 04:36 PM


"Ken Bessler" wrote in message
...

"Zoran Brlecic" wrote in message
...
Bill wrote:

"bright Indian programmers" do not exist. If you are going to count

on
that
craphole of a place to produce anything usable, then you have a hard

wake up
coming. A nation without flush toilets is hardly technologically

advanced
to write an OS of any merit...just think...those idiots have nuclear
weapons...probably aimed at themselves.



Funny... some people would claim the same about trailer trash rednecks
like you.


Next he'll point out that Chandrasekhar was not *really* Indian.
Admittedly he was not a programmer but was a fairly bright person.




Richard Clark September 22nd 03 05:36 PM

On 22 Sep 2003 15:52:11 GMT, "Dick Carroll;"
wrote:
Is is not correct to say that Windows was left vulnerable so that
other computers can deliberately enter and assess remote computers for
various reasons, such as determining whether or not the copy of the OS
in use had been properly :"registered" before issuing updates?

I'm not a programmer but it seems that might xerainly be a very good
reason.
In other words, all these security "holes" are perhaps not accidental.
When a virus writer takes advantage of one of them the "patch" issued
to "fix" it mught just be specific to that particular violation, instead
of permanently taking care of the problem.

I know that the Windows series is an extremely complex piece of work,
but the virii
issuers seem to have little trouble finding cracks that Bill's
programmers couldn't
anticipate..

Dick


Hi Dick,

Your claim
I'm not a programmer

Should have been the point where you stopped writing.

The security holes are not inadvertent mistakes that anyone could have
suffered in the face of such a monumental work as Windows. These
holes (and I am not talking about the current round of affairs, as
neither was J. McLaughlin) are deliberate design "features" that
Chairman Bill and MS claim to be what the user population clamor for.

In other words, insecure software is being deliberately constructed
and sold for the express purpose of satisfying Market issues. MS is
quite blunt in this admission, and aggressively so! Many years ago,
the computer community bewailed MS's determination to allow raw
sockets to be made available at the user level. As you are "not a
programmer" you probably never heard this debate, and yet it is part
and parcel to the features of insecure design. MS snubbed the
security experts (Not Invented Here syndrome) and went their own way -
the body count over those same years testify to it in the millions.
Unfortunately the income measures in the billions and security is
buried in the digits with the corpses of dead machines.

The feature called DCOM is so insecure, that it leads the way in
current hacker fields of delight. DCOM is a patchwork quilt of an
older Marketing concept called COM (which has been largely ignored by
software professionals such that MS tried to "sex" it up by adding a
"D" to make it "Distributed," yet another Market slide) which in turn
was spun off from OLE. All of these have technical basis in
implementation, but were designed in whole ignorance of security
requirements. You have absolutely no need for DCOM, and yet as a
service to you MS has deliberately left access to it on your machine
open to anyone on the internet.

None of these issues are trivial. None of them require poking and
prodding to discover or crack. None of them came without advanced
warning (and one site has had fixes months in advance of MS). None of
them were designed by accident, or through the misfortune of Windows
being too complex to debug 100% faithfully. What is worse, MS even
submitted a security patch in the last two weeks that did not work!
Making allowances for them is generous in the extreme.

I note that you post from a revolving IP, such that if you had not, I
could have connected to your machine to give you a demonstration of
how open you are to attack. It involves a command built into NT that
is designed EXPRESSLY to allow me to do this! I don't need hacker
tools, just a DOS session and the command line interpreter will do the
rest. If you ever consider moving up to townsqr's hi-speed
connectivity, you better get these on-ramps to your system controlled!

73's
Richard Clark, KB7QHC

Jim Kelley September 22nd 03 06:20 PM



David Robbins wrote:

"Steve" wrote in message
m...

"Cecil Moore" wrote in message
...
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp

Yes, 14 yesterday and 4 so far this morning.


you must not have many friends who have you in their address book... i got
about 1000 overnight last night and about 2500 the day before.


My guess is, they're getting addresses from newgroups.

ac6xg

Mike Andrews September 22nd 03 06:52 PM

Jim Kelley wrote:


David Robbins wrote:

"Steve" wrote in message
m...

"Cecil Moore" wrote in message
...
Is anyone else being deluged with Virus/Worm email messages?
--
73, Cecil http://www.qsl.net/w5dxp

Yes, 14 yesterday and 4 so far this morning.


you must not have many friends who have you in their address book... i got
about 1000 overnight last night and about 2500 the day before.


My guess is, they're getting addresses from newgroups.


That has been confirmed.

--
"I cannot imagine what it's like to know nearly everything about
systems and have to deal, daily, with people who know nearly nothing
about systems. It's like being a cosmologist at an astrology
convention)...." -- James Lileks

Mark Keith September 22nd 03 07:32 PM

Roger Halstead wrote in message

I would respectfully suggest that you upgrade to one of the later
versions of Netscape. 3.1 is about as open to giving out your
information as any produced.


I only use it to read mail. I don't browse with it. Besides, thats a
different issue than the micro viruses being discussed. P.S I have
newer versions of netscape. KInd of like playing cards. Take your
pick.


It's a knee jerk reaction to blame the OS (which do have lots of holes
in them), but in reality the blame for well over 90% of the problem
comes directly from us...the users.


No, it's not a knee jerk reaction. The OS security problems I refer to
have nothing to do with the discussed macro viruses. They are
altogether different problems. Just as serious though. Probably more
so.



The new ones are no worse than 98, or 98 SE.


They sure are no better. I would say worse....But, it's not really
important. I don't have any trouble with any of these worms, viruses,
etc. So anything I say can hardly be called a knee jerk reaction. I
have plenty of unmolested time to think about it. MK

Jim Kelley September 22nd 03 07:43 PM

If you're so sure about your 'invulnerability', why do you have seven
email filters? Try turning them off and see what you get. ;-)

jk


Richard Clark wrote:

On Mon, 22 Sep 2003 17:52:22 +0000 (UTC), (Mike
Andrews) wrote:

My guess is, they're getting addresses from newgroups.


That has been confirmed.


Hi Mike

How?

I've been a participant here for years with my address freely
available. Not one hit from this virus, not even 30 emails during the
entire period and only one (1) at the peak. Other correspondents here
complain of 1000's in a single day, and 10MB mail storage being
saturated.

Do you have a link to an authoritative site that offers evidence of
your statement?

73's
Richard Clark, KB7QHC


Jim Kelley September 22nd 03 08:41 PM

You seem to have missed the point. The particular operating system you
happen to run has nothing to do with whether or not viruses are sent to
your email address.

73, Jim AC6XG


Richard Clark wrote:

On Mon, 22 Sep 2003 11:43:30 -0700, Jim Kelley
wrote:

If you're so sure about your 'invulnerability', why do you have seven
email filters? Try turning them off and see what you get. ;-)

jk


Hi Jim,

I have, same old spam conforming to exactly what the filters were
designed to weed out. I had to wait quite a while for any to come in.

You think one filter would do it? Now there's dreaming in technicolor
and surround sound.

Among the 7, several cover 26 common explitives and variants of their
spellings (using a unix style of expression to describe them such as
X* where the star denotes 0 or more repetitions of the character X; I
do the same thing with $*). This sure beats the MS method of hotmail
security where you have to list every single person you trust (what a
crock) if you want to keep out the universe of smut. Methinks their
MSN butterfly is on the verge of intellectual extinction.

Of the others, I reject mail not addressed to me (a no brainer - eh?).

Agent would allow me to combine them all into one filter (a dream come
true?), but why bother. Most programming errors are caused by logical
statements that are so vast and cryptic that they are impossible to
read coherently - like any of 600 postings made by Cecil. ;-)

Anyway, I have been engaged in a series of emails since this last
posting (with Mike) where he is averaging 1 hit a minute, and me none
for this entire time. By his accounts, it is from newsgroup
harvesting, and it would seem the majority of sufferers here picked up
the infection somewhere else (not rraa). Of the dozen odd other
groups I follow, this topic is alien to correspondents who show no
signs of infection.

So, Jim, how have you fared during the deluge?

73's
Richard Clark, KB7QHC (with only 1 spam today)


Richard Clark September 22nd 03 09:44 PM

On Mon, 22 Sep 2003 12:41:50 -0700, Jim Kelley
wrote:

You seem to have missed the point. The particular operating system you
happen to run has nothing to do with whether or not viruses are sent to
your email address.

73, Jim AC6XG


Hi Jim,

I rely on the evidence of testimony here. 80% of the correspondents
who are also sufferers are using IE/OE in some form of Windows (hard
to do it otherwise). The servers (at least mine at Comcast which have
been infected by Blaster and infected my outgoing mail) are MS
products. MS products and OS's contain documented and autopsied
problems that support such virus activity.

I also use MS products (but certainly not their lame internet
applications). I have never performed a security upgrade, but instead
have simply disabled those faulty modules that they circulate as
product enhancements. Tools for such activity may be found at:
http://grc.com/default.htm
which provides more news and resource than all the nonsense wishing
away nightmares.

In that page's update TODAY is the warning:
"Many security watchers believe that a new worm, not unlike
"MSBlast" which targeted the previous DCOM/RPC vulnerability, is
virtually inevitable."

How many here even comprehend what DCOM is? Are we to be treated to a
new chorus of whines about how the ghosts of the internet haunt them?
I've had this problem fixed (courtesy of the same site) for several
months. Have you taken precautions? (I note you failed to respond to
my query about how you've fared through this latest attack.)

I can say without fear of contradiction that particular operating
systems (MS) are obviously correlated through history and actuality.
I also host a server on a fixed IP (http://12.230.78.56/) that has
surfed through all these disasters and still winging right along
unfazed. It supports an uncrackable OS simply because my net log
reveals no one is looking for anything but MS code. The only thing
that will crash it will be the log filling up (but no one is going to
find an executable to run - too many clowns and not enough
ringmasters).

As to having missed the point, I offer that part of my message you
missed reading:
Anyway, I have been engaged in a series of emails since this last
posting (with Mike) where he is averaging 1 hit a minute, and me none
for this entire time. By his accounts, it is from newsgroup
harvesting, and it would seem the majority of sufferers here picked up
the infection somewhere else (not rraa). Of the dozen odd other
groups I follow, this topic is alien to correspondents who show no
signs of infection.


These other users were also clearly (through header examination) MS
users. They were clearly not sufferers. That, or the Darwinian
mechanics thinned them out without chance for recovery (another MS
commonality) to complain, warn, or join in chorus of whine.

73's
Richard Clark, KB7QHC

Roger Halstead September 23rd 03 12:59 AM

On Mon, 22 Sep 2003 16:36:51 GMT, Richard Clark
wrote:

snip
Should have been the point where you stopped writing.

The security holes are not inadvertent mistakes that anyone could have
suffered in the face of such a monumental work as Windows. These
holes (and I am not talking about the current round of affairs, as
neither was J. McLaughlin) are deliberate design "features" that
Chairman Bill and MS claim to be what the user population clamor for.

Richard, you reminded me of things I had long forgotten.
I've been around this stuff since before there was a Microsoft.
I purchased my own PC in 1979-1980. We called them PC even before IBM
was given the copyright...much like MS and DOS. sigh

In other words, insecure software is being deliberately constructed
and sold for the express purpose of satisfying Market issues. MS is
quite blunt in this admission, and aggressively so! Many years ago,
the computer community bewailed MS's determination to allow raw
sockets to be made available at the user level. As you are "not a
programmer" you probably never heard this debate, and yet it is part
and parcel to the features of insecure design. MS snubbed the
security experts (Not Invented Here syndrome) and went their own way -


Although I'm not an MS booster, I've had to use it to stay compatible
over the years. I do take exception to their ethics and lack there
of. OTOH, as much as I hate to admit it, I truly believe that had MS
not gone for the "Market" we wouldn't have the abilities we have
today. And...yes that can be taken two ways and both are correct.
sigh

the body count over those same years testify to it in the millions.
Unfortunately the income measures in the billions and security is
buried in the digits with the corpses of dead machines.

The feature called DCOM is so insecure, that it leads the way in
current hacker fields of delight. DCOM is a patchwork quilt of an
older Marketing concept called COM (which has been largely ignored by
software professionals such that MS tried to "sex" it up by adding a
"D" to make it "Distributed," yet another Market slide) which in turn
was spun off from OLE. All of these have technical basis in
implementation, but were designed in whole ignorance of security
requirements. You have absolutely no need for DCOM, and yet as a
service to you MS has deliberately left access to it on your machine
open to anyone on the internet.

None of these issues are trivial. None of them require poking and
prodding to discover or crack. None of them came without advanced
warning (and one site has had fixes months in advance of MS). None of
them were designed by accident, or through the misfortune of Windows
being too complex to debug 100% faithfully. What is worse, MS even
submitted a security patch in the last two weeks that did not work!
Making allowances for them is generous in the extreme.


I guess I'd have to be generous and say I doubt they released the
patch that didn't work on purpose...It's bad for their image.


I note that you post from a revolving IP, such that if you had not, I
could have connected to your machine to give you a demonstration of
how open you are to attack. It involves a command built into NT that
is designed EXPRESSLY to allow me to do this! I don't need hacker
tools, just a DOS session and the command line interpreter will do the


A few years back, I was receiving an inordinate number of viruses
which more correctly were mostly worms. I'd take the IP and head for
what looked like the culprit in the above manner. I verified that was
the source and then sent them an e-mail, or looked up the phone number
and called. True, I didn't track all that many down, but I still
found a bunch and those e-mails had given me the machines address.
Back them dynamic IPs were the norm, not the static IPs on the
broadband of today. BTW, many of those systems would have been very
easy to log in as I was basically in the same position as any user
when they are at the boot up screen. OTOH, I had no desire to root
around in someone else's system and particularly if it most likely
had a virus.

I can't imagine going on the net with an MS system without a firewall,
virus checker, "cookie cruncher" and "SpyBot". I don't use MSs
firewall either and I avoid "Passport" like the plague.

IF MS would just set the defaults to off, it would be a big
improvement, but their market base wants all that stuff that opens
them to the whole wide world.

It's not just individuals who want that fancy stuff either.
My wife has used one of our computers for several years to keep a
large database for a pretty big organization. That database comes
with a complete set of macros and VB programming to make it user
friendly. I have the security features now set to prevent that stuff
from running automatically. If they want her volunteer time they are
going to have to create a stand alone program to use the database as
our system now strips that stuff off on receipt. Maybe it's overkill,
but I don't like the idea of a program having the ability to run
macros and VB when it is opened. Either is quite capable of doing any
operation on my computer that I can and probably no few that I don't
even know about and my degree is in CS.

rest. If you ever consider moving up to townsqr's hi-speed
connectivity, you better get these on-ramps to your system controlled!


It's interesting to sit here was watch port probes repeatedly move
through the list trying to find a way in. If I did not have a fire
wall they'd be in on the first try.

One day I saw a familiar address as the source of the probes. I
called my ISP and asked them to check out an IP that was probing my
machine. There was a long pause and then the exclamation..."That's
one of OUR IPs"! "Yah, I know...I think you guys have picked up a
termite." To top it off I use multiple layers of isolation and they
were still probing the one machine. Just the one, none of the others.

So, from the marketing standpoint the MS approach has been extremely
successful, but a disaster from the security standpoint.

OTOH, had some other system such as LINUX, or UNIX been adapted to a
user friendly GUI (I mean man-on-the-street friendly)

No system is completely invulnerable, but I wonder what the state of
the art for users and security would be had a more secure route been
followed? Would the industry have progressed as fast? would
redirected energy from crackers eventually have created as much of a
problem? Would we have near as many people capable of interacting
world wide?

All hypothetical questions as there is really no way of answering
"what ifs".

What we do know beyond the history is that the "ordinary" users are
not truly computer literate and no amount of education and training is
going to make them give up those fancy features that open their
computers to the whole wide world and I don't mean internet.

Roger Halstead (K8RI EN73 & ARRL Life Member)
www.rogerhalstead.com
N833R World's oldest Debonair? (S# CD-2)


73's
Richard Clark, KB7QHC



Richard Clark September 23rd 03 02:38 AM

On Mon, 22 Sep 2003 16:10:22 -0700, Jim Kelley
wrote:


I run a firewall on my desktop system so I can see what's happening on
both sides of the ethernet card. My system is not infected. FYI
there's a free utility called stinger that can be used to scan for these
worms. Nevertheless, the inbox on the unix system that handles my email
has accumulated about 100 of these kind of messages a day since last
Tuesday or so. I have my desktop system set to filter them.

http://grc.com/default.htm
has offered a port scanner for years. Also a Trojan Horse detector.

But if you are trying to say that the author(s) of the viruses are
specifically targeting users with a MS notation in their news header,
then you may be right. But you didn't say that.

73, Jim AC6XG


Hi Jim,

I find it somewhat beyond the bounds of belief that some one
individual, or consortium of individuals are sitting at home and
directing attacks at selected accounts. The only vector of success is
found in an OS that supports this for them.

Look at who's complaining of massive attacks, and with the exception
of Mike, whose posting activity is highly correlatable, and the rest,
who are not; then those who are not are highly correlatable to what
they commonly use. The evidence is overwhelmingly MS oriented, and
not through force of numbers simply because MS dominates the market.

For a simple example of that contradiction is my own situation. I run
Win2000 and I do not use MS internet software. For this entire day
I've gotten 5 emails from folks reading my comments and two that went
to the trash can for transgressing my filters. It is quite obvious to
me that suggestions that the newsgroups are being harvested is not
applicable to this one (rraa), nor the dozen odd others I participate
in. I can easily imagine it may be confined to a few newsgroups, and
through those few, the stream cascades by virtue of poor security
management by those naive enough to use MS software and just let
things ride.

This conflagration would die of lack of combustibles otherwise. This
is classic symptomatology.

73's
Richard Clark, KB7QHC

Ryan, KC8PMX September 23rd 03 06:49 AM

I can prove it.... gimme an email address to forward all the ones I am
getting!


--
Ryan, KC8PMX
FF1-FF2-MFR-(pending NREMT-B!)
--. --- -.. ... .- -. --. . .-.. ... .- .-. . ..-. .. .-. . ..-.
... --. .... - . .-. ...
"Richard Clark" wrote in message
...
On Mon, 22 Sep 2003 17:52:22 +0000 (UTC), (Mike
Andrews) wrote:

My guess is, they're getting addresses from newgroups.


That has been confirmed.


Hi Mike

How?

I've been a participant here for years with my address freely
available. Not one hit from this virus, not even 30 emails during the
entire period and only one (1) at the peak. Other correspondents here
complain of 1000's in a single day, and 10MB mail storage being
saturated.

Do you have a link to an authoritative site that offers evidence of
your statement?

73's
Richard Clark, KB7QHC




Ryan, KC8PMX September 23rd 03 06:53 AM

Hey Mike,

In my case, the virus email bombing that I am getting has not affected my in
regards to being infected, but it definitely has slowed everything down. It
is taking forever to use my ISP's webmail email browser (in order to not
download the infected emails) to load up, when there is 200-1,000 messages
in the email box.

I am quite sure I am not the only one getting this happening to them as
well, that are on the same ISP. Must definitely be overloading the mail
server my guess would have to be.



--
Ryan, KC8PMX
FF1-FF2-MFR-(pending NREMT-B!)
--. --- -.. ... .- -. --. . .-.. ... .- .-. . ..-. .. .-. . ..-.
... --. .... - . .-. ...
"Mike Andrews" wrote in message
...
Walter Maxwell wrote:
On Sat, 20 Sep 2003 19:01:51 +0000 (UTC), "Reg Edwards"
wrote:


Is anyone else being deluged with Virus/Worm email messages?
--
================================

Me too - 2000 per day.

Terrorist attack or just another up-and-coming Bill Gates?

G4FGQ, UK


Me too, 49 yesterday and 80 today.


So far today:

$ grep -i logging ljoe.txt | wc -l
1286
$ grep -i "\/dev\/null" ljoe.txt | wc -l
976

That's 976 worms out of 1286 mails accepted, total. That doesn't count
the 54 that I bounced because I don't accept mail from the sender's
domain, so it's 976 out of 1340 attempts. At about 150K per try. Rough
on the other people on my cablemodem segment.

--
Mike Andrews, working on his ticket again.

Tired old sysadmin since 1964
WN5EGO back in 1963




H. Adam Stevens, NQ5H September 23rd 03 12:03 PM

Cecil
At least with a Mac the viruses wouldn't be able to do anything were you
foolish enough to open one of the attachments!
It got to about 1000/day and I had to change my email addresses but they've
already found one of my new addresses.
Random number spam bots I tell ya.
Intentional QRM!!
73
H.
NQ5H

"Cecil Moore" wrote in message
...
Richard Clark wrote:
Look at who's complaining of massive attacks, and with the exception
of Mike, whose posting activity is highly correlatable, and the rest,
who are not; then those who are not are highly correlatable to what
they commonly use. The evidence is overwhelmingly MS oriented, and
not through force of numbers simply because MS dominates the market.


I suspect that if I were running an Apple, my inbox would be just as full.
--
73, Cecil http://www.qsl.net/w5dxp



-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----




Cecil Moore September 23rd 03 12:25 PM

H. Adam Stevens, NQ5H wrote:

Cecil
At least with a Mac the viruses wouldn't be able to do anything were you
foolish enough to open one of the attachments!


I'm running Netscape 7.1 with virus-scan/firewall. Most of my
email is routed through the IEEE forwarding server which removes
virtually all viruses and worms. Unfortunately, they send me what's
left of the message along with another message telling me what
they did. I would be happier if they didn't waste bandwidth
telling me about it.
--
73, Cecil http://www.qsl.net/w5dxp



-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----

H. Adam Stevens, NQ5H September 23rd 03 01:37 PM

My old email address was getting to be useless so I killed it and made up
two new ones.
Presumably this post shows the ARRL remailer which goes to one of the new
email addresses.
One of the addresses has not been used.
They found it.
Linux anyone?
73
H.
"Ryan, KC8PMX" wrote in message
...
Hey Mike,

In my case, the virus email bombing that I am getting has not affected my

in
regards to being infected, but it definitely has slowed everything down.

It
is taking forever to use my ISP's webmail email browser (in order to not
download the infected emails) to load up, when there is 200-1,000 messages
in the email box.

I am quite sure I am not the only one getting this happening to them as
well, that are on the same ISP. Must definitely be overloading the mail
server my guess would have to be.



--
Ryan, KC8PMX
FF1-FF2-MFR-(pending NREMT-B!)
--. --- -.. ... .- -. --. . .-.. ... .- .-. . ..-. .. .-. . ..-.
.. --. .... - . .-. ...
"Mike Andrews" wrote in message
...
Walter Maxwell wrote:
On Sat, 20 Sep 2003 19:01:51 +0000 (UTC), "Reg Edwards"
wrote:


Is anyone else being deluged with Virus/Worm email messages?
--
================================

Me too - 2000 per day.

Terrorist attack or just another up-and-coming Bill Gates?

G4FGQ, UK


Me too, 49 yesterday and 80 today.


So far today:

$ grep -i logging ljoe.txt | wc -l
1286
$ grep -i "\/dev\/null" ljoe.txt | wc -l
976

That's 976 worms out of 1286 mails accepted, total. That doesn't count
the 54 that I bounced because I don't accept mail from the sender's
domain, so it's 976 out of 1340 attempts. At about 150K per try. Rough
on the other people on my cablemodem segment.

--
Mike Andrews, working on his ticket again.

Tired old sysadmin since 1964
WN5EGO back in 1963






Cecil Moore September 23rd 03 04:56 PM

H. Adam Stevens, NQ5H wrote:
Presumably this post shows the ARRL remailer which goes to one of the new
email addresses.


Does the ARRL remailer check for viruses/worms?
--
73, Cecil http://www.qsl.net/w5dxp



-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----

Roger September 23rd 03 09:10 PM

On Mon, 22 Sep 2003 16:36:51 GMT, Richard Clark
wrote:

I note that you post from a revolving IP, such that if you had not, I
could have connected to your machine to give you a demonstration of
how open you are to attack. It involves a command built into NT that
is designed EXPRESSLY to allow me to do this! I don't need hacker
tools, just a DOS session and the command line interpreter will do the
rest. If you ever consider moving up to townsqr's hi-speed
connectivity, you better get these on-ramps to your system controlled!

73's
Richard Clark, KB7QHC


I have a static IP address, would you care to prove how open to attack
my system is?

H. Adam Stevens, NQ5H September 23rd 03 09:37 PM

I don't know, it may pass 'em right through, like bad food,
but at least the email address at my ISP isn't being openly broadcast on
usenet.
73
H.
"Cecil Moore" wrote in message
...
H. Adam Stevens, NQ5H wrote:
Presumably this post shows the ARRL remailer which goes to one of the

new
email addresses.


Does the ARRL remailer check for viruses/worms?
--
73, Cecil http://www.qsl.net/w5dxp



-----= Posted via Newsfeeds.Com, Uncensored Usenet News =-----
http://www.newsfeeds.com - The #1 Newsgroup Service in the World!
-----== Over 100,000 Newsgroups - 19 Different Servers! =-----




Richard Clark September 23rd 03 09:58 PM

On Tue, 23 Sep 2003 20:10:55 GMT, Roger wrote:
I have a static IP address, would you care to prove how open to attack
my system is?


Hi Roger,

It is not apparent in your headers.

73's
Richard Clark, KB7QHC

pez September 23rd 03 10:16 PM


| "Richard Clark" wrote:
| ...
| http://grc.com/default.htm
| ...

Useful, indeed!

pez
SV7BAX

Mike Coslo September 24th 03 02:02 AM

Dee D. Flint wrote:

"David or Jo Anne Ryeburn" wrote in message
...

In article , "Dee D.
Flint" wrote:


I've tried to trap them but the headers and senders, etc are all


different.

The "From:" lines are likely forged. Many such worms and viruses pick
recipients and purported senders randomly from the infected computer's
Outlook or Outlook Express address list. If you want to see where the
message really is coming from, examine full headers carefully --
specifically, the "Received: from" lines.


If you have a suggestion on how to stop them, please let us all in on


it.

Persuade the universe to cease using unsafe operating system software,
browsers, and e-mail programs coming from Redmond, WA ;-). UNIX, including
the version now marketed by Apple, is pretty safe.

David, ex-W8EZE, whose computers are happily MS-free except for safe 11
year old versions of Word and Excel



If everyone switched to UNIX, the solution would be short-lived as the virus
writers would then switch to attacking it. Right now, they simply get more
"bang for the buck" by attacking Windows and it doesn't give them much of a
thrill to also go after UNIX system users or Apple computer users.


You have touched on the answer, Dee.

What computer and software manufacturers have done that is a fatal flaw
in their systems is insist that "EVERYTHING HAS TO BE THE SAME" I
remember the abuse that I took from PC users because I was running an
Amiga for so many years. Installed User Base, PC Compatibility and other
mantras were tossed at me and others who dared to use "non-standard"
computers like the Amiga and the Mac.

But here we are undergoing attack after attack because of what. 95
percent of us are using the same platform, the same OS and the same
software. We are going through an computer analog (heh heh) of the Irish
potato famine.

I do like to draw a parallel between the agricultural monoculture and
computer monoculture. Only grow one crop, and you're vulnerable.

Whether MS likes it or not, one big step toward a cure (besides them
writing incredibly poor software) is for there to be several different
types of email software. This software is not to be crippled by all the
features that they try to add, with every feature seems to come a new
vulnerability. Especially things like IE and Outlook coupling up mailing
addys.

I personally use only the MS products that I absolutely have to, and
will not use their mailing system. I use Netscape for mail, and it works
okay. If Netscape were to somehow become the big mail program - which
will never happen - I'll switch to something else.

But the majority of PC users are unwilling to believe this sort of
rationale, as they scramble daily to update their Virus definitions, an
other stunts that don't really work too well.

After all, there has to be a virus that infect a computer before there
can be a definition for it.

- Mike KB3EIA -


Floyd Davidson September 24th 03 03:00 AM

Mike Coslo wrote:
Dee D. Flint wrote:
"David or Jo Anne Ryeburn" wrote:
"Dee D. Flint" wrote:

If you have a suggestion on how to stop them, please let us all in on
it.


Persuade the universe to cease using unsafe operating system software,
browsers, and e-mail programs coming from Redmond, WA ;-). UNIX, including
the version now marketed by Apple, is pretty safe.

David, ex-W8EZE, whose computers are happily MS-free except for safe 11
year old versions of Word and Excel



If everyone switched to UNIX, the solution would be short-lived as the virus
writers would then switch to attacking it. Right now, they simply get more
"bang for the buck" by attacking Windows and it doesn't give them much of a
thrill to also go after UNIX system users or Apple computer users.


You have touched on the answer, Dee.


David is the one who touched on it. The answer *is* to use an
OS designed to be secure. Microsoft products are not, while
virtually all of the current unix systems are. Some unixes (the
ones with open source code, which does not include Apple) do
have higher potential for good security than others.

The "bang for the buck" argument is proof of it too. If you
want a *bang*, then shutdown the *entire* Internet, not just
some percentage of the hosts connected to it. The fact is
that from the start the Internet itself ran on unix. That is
less true today, but it is still true enough that if one could
write a virus to knock out unix, one could just shut the
Internet off for days.

But, of course, it can't be done (or that is exactly what they
would be doing).

--
Floyd L. Davidson http://web.newsguy.com/floyd_davidson
Ukpeagvik (Barrow, Alaska)

Mark Keith September 24th 03 11:42 AM

Roger Halstead wrote in message \

They are mail and newsgroup reader problems and *nearly*
all can be prevented by properly configuring said programs. Turn off
the ability to read mail in HTML, don't let macros run, disable Java,
and above all don't open attachments until after verifying whoever
really sent it. This is particularly true if the thing came from some
one you know. How many times have you heard some one say, Oh, I don't
worry. I only open attachments from people I know. Now there is a
prime candidate for a virus.

MS operating systems are written for the masses. It depends on your
definition of computer literate, but unless you make the definition
very lenient there are few computer users who are computer literate.


Thats the exact problem as I see it. The *average* e-mail user, who
has little on the ball as far as puters is left to the wolves because
MS installs all that stuff with all the options wide open. And unless
you go and read all the docs to learn how to turn it off, the average
user will not even be aware that they are at risk. And you know how
many probably read the docs....Yep, about 4.27%...If MS gave a real
hoot about protecting peoples security, they would install with it all
turned off, and instruct the user to turn on features as or if needed.
But nooooooo......The average users first instruction on the problem,
or feature that led to the problem, is after they are cleaning out a
macro virus. And with a virus like sobigf, you could go for months
without knowing you had it , unless someone finally tells you. The
sent emails are forged with someone in the address book, or whatever.
Then, hummmmm, they finally learn about attachement problems, etc..
It's kind of the same way with the "ports" that MS likes to leave wide
open with a default install. The average user won't have a clue his
box is wide open. Well, Maybe if he stumbles across Gibson research or
whatever...
A good majority of the outlook virus problem victims are e-mail
readers that could give a hoot about puter OS's, outlook or whatever.
They plug it in, and dial up. MS doesn't do them any favors by leaving
them wide open to attack, and not even telling them about it in a
noticable manner. There are worms out now that need no e-mail
connection. They are planting them through open ports I think. I don't
keep up with all the "new" OS problems much. I only worry about the
one I'm running at the time. MK

Roger September 24th 03 01:37 PM

On Tue, 23 Sep 2003 20:58:45 GMT, Richard Clark
wrote:

On Tue, 23 Sep 2003 20:10:55 GMT, Roger wrote:
I have a static IP address, would you care to prove how open to attack
my system is?


Hi Roger,

It is not apparent in your headers.

73's
Richard Clark, KB7QHC


I know, I would have to give it to you. I don't think its quite as
easy as you say to "hack" into an NT system, unless the person that
set up has no idea what their doing.

Richard Clark September 24th 03 05:30 PM

On Wed, 24 Sep 2003 12:37:37 GMT, Roger wrote:

On Tue, 23 Sep 2003 20:58:45 GMT, Richard Clark
wrote:

On Tue, 23 Sep 2003 20:10:55 GMT, Roger wrote:
I have a static IP address, would you care to prove how open to attack
my system is?


Hi Roger,

It is not apparent in your headers.

73's
Richard Clark, KB7QHC


I know, I would have to give it to you. I don't think its quite as
easy as you say to "hack" into an NT system, unless the person that
set up has no idea what their doing.


Hi Roger,

So why ask in the first place?

73's
Richard Clark, KB7QHC

Richard Clark September 24th 03 05:55 PM

On Wed, 24 Sep 2003 15:53:56 GMT, Ken wrote:


Richard;
Your statement is in reference to systems that have been infected by a
virus or worm. The O/S has nothing to do with who the virus's are sent to.
I set up several e-mail accounts on yahoo and posted to several groups.
I did pick a subject that would generate responses, after 7 or 8 hours the
e-mail accounts were filled with messages with the virus attachments. I
don't use Microsoft products, So I don't know how Outlook handles replies
to usenet posts. That is, if it treats it as an E-mail address and adds it
to an address book. Although its possible that the subject I picked could
have upset a few enough to intentionally send me an E-mail with a attached
virus, I would tend to think that its based on address books.
I have set several more accounts up on Yahoo, trying to narrow down
which groups seem most prone to generating virus e-mails.

Ken


Hi Ken,

Yours is simply the same chorus before you: "It ain't about MS."

You then snap the rug from under yourself (how do you do that?) by
saying virus (what does a virus infect except an OS?).

It is the height of denial to portray these attacks as coming from an
individual sitting in the bedroom sending emails, or a group of
closeted individuals pushing send buttons. That traffic would be
snuffed so fast where MS would have sheriffs at their door in a
millisecond.

A virus by definition infects the OS. There are many out there built
into the backbone of the internet. Some are router only OS's, others
are Linux machines, Unix machines, Sun Machines, and certainly MS
machines. Does it take Rocket Surgery to diagnose that of those, one
OS source (fill in the blank) in particular has been announcing
security failures in their designs (and I am not talking about the
ubiquitous OE/IE problems so many snuggle up to as it nibbles into
their tender flesh) 2 a week? This is up from an average of once a
week for at least two years. If the backbone escaped attack (and it
is certainly more geared for following events than users are); it
follows someone ELSE's machine has become infected and is acting in
part of a conspiracy to accomplish this work through proxy.

Guess what they have as an OS? Care to wager it is an unprotected
system that has been requiring patches on a weekly basis for years?

All of this is classic symptomatology of recent attacks and hardly a
novel concept drug up from the deep recesses of my paranoia.

There are two classes of MS users. Those who are infected but live
through its effects without obvious harm (except for lost bandwidth
capacity they blame on "general conditions"). A century ago they
would go by the name Typhoid Mary. Then there are those who are
infected but are being hammered by the virus AND spreading infection.
There is a third and fourth class that barely wiggle the digits: the
lucky and the smart.

Eventually, through Darwinian thinning, the smart population will
become dominant, but only if they can crawl over the mountains of
corpses that litter the -ahem- netscape.

73's
Richard Clark, KB7QHC

Richard Clark September 24th 03 09:29 PM

On Wed, 24 Sep 2003 18:30:16 GMT, Ken wrote:

Richard Clark wrote:

Richard;
Hope you don't mind if I respond to each part of your post?


Not if you don't object to my clipping extraneous material here.

Yours is simply the same chorus before you: "It ain't about MS."


Really? Where did I say that? I don't even use Microcrap, why would I
defend them?


I cannot speak to your motivation. I can respond to its appearance
however.

"The O/S has nothing to do with who the virus's are sent to:"
Which it TRUE!


Perhaps so, but hardly a subject that merits discussion unless this is
a recovery group where we all talk about feelings.

I don't use windows and have a bunch of e-mails with virus's in them.


Well, do they present an issue vis-a-vis the virus, or simply the
quantity of mail clogging things in general? You don't offer much to
separate what issue you are responding to.

I think you miss read what I was saying, or maybe I didn't make myself
clear. Your system doesn't have to be infected to receive a bunch of
E-mails with the virus. Everyone was complaining about the number of virus
e-mails they were receiving. That doesn't mean that their system is
infected. It does mean that an infected Microsoft system sent them. Is
that better?


Perhaps. I see nothing to consider except to observe that those who
have suffered are likely candidates for spreading the same contagion.
You implicitly offer you are not one to be part of that vector, but
again you've offered nothing in that regard to distinguish what it is
that brings you forward.

I am reacting to those who think that all danger is external (the
fuzzy warm feeling that if there are miscreants mining newsgroups for
names and addresses, then our sufferers are not part of the problem);
nothing could be further from the truth.

Didn't mean to upset you Richard, it sounded like you wanted to discuss
where the list of e-mail address's were coming from that had virus's sent
to them. Do you repond to all posts in such a manner? My first post to
you and respond like I have been arguing with you for the past 2 weeks. I
doubt that you even bothered to read the rest of my post after you saw the
O/S part of it.


And yet you have nothing to offer about where they came from. Every
post made is an act of personal choice. If you choose my
observations as an issue, I respond to that. If you choose
where the list of e-mail address's were coming from that had virus's sent
to them.

then you would have offered that in your post. You did not. I cannot
respond (or actually I hesitate) to my projections of what I think you
want. Others here do that quite well - generally that is very
unsatisfactory dialog (being one-sided and all).

I have offered both points of view throughout this thread, you have
not responded to where I presented the discussion of news group
mining. Again that is a personal choice of yours for which I am not
in a position to dictate.

You presume I want to discuss where the address's are coming from.
Actually no, I have no interest in that at all. It would seem even
fewer of the complainants here do either. I observed earlier that
rraa does not appear to have been mined for any list. I also observed
that if newsgroups were being mined, then those sufferers apparently
became part of the contagion somewhere else, or through some other
activity. Absolutely no one has stepped forward to enumerate their
other activities (public health goes down the crapper in such times if
other activities reveal the vector).

To this point, today, I have received only 7 emails, all of which
triggered the usual porn filtering mechanism. That is fairly typical
for my public exposure here, and I participate in a dozen odd other
groups to notice that discussion of this virus is a wholly alien
subject. This, to me, suggests that the premise of newsgroup mining
is so much looking under the bed for monsters. I have corresponded
with one here who posts to one technical group that is heavily
trafficked by potential miscreants (or so is my presumption by his
description) and I would speculate, yes, any open address in that
group (especially if you respond to those with an attitude) is a
target of opportunity.

But just what does a target offer? A new vector of infection, and if
that target is practicing anti-viral lifestyles, that presents a
fairly limited contagion that barely rises above sniffle.

Just one not practicing an anti-viral lifestyle has, through MS
products, the capacity to spread infection like a firestorm. Hence,
it doesn't really matter where the address's are found, there are
30000 different groups that need only offer a thousandth of a percent
hit rate to cascade into millions.

73's
Richard Clark, KB7QHC

Richard Clark September 25th 03 01:35 AM

On Thu, 25 Sep 2003 00:21:53 GMT, Ken wrote:

Richard Clark wrote:

Richard;
Sorry, I didn't mean to come across like I did. Can I blame it on a
bad day at work? I had scanned through the messages and thought I had seen
were you had an idea where the E-mail addresses came from. Thats why I
wrote to you with what I had found out, looking for your input and ideas.
If I knew more about how outlooks address book work, I think I have a
pretty good idea where the address's are coming from.

I apologize for the way I acted toward you

Ken


Hi Ken,

I took no slight. Further, I did, as you described, hit you like this
was going on between us for two weeks - just my nature. Some forgive
me, others don't, the rest don't care as long as it makes for good
theater.

There's every chance they (the names and addresses) are mined off the
newsgroup participants. These things have to start somewhere.
However, what feeds them is what I am interested in (being potential
fodder), and when simple maintenance can snuff a bug, and many would
rather suffer through it without dignity - then I don't offer much
sympathy and tea.

To this point in time today, only 10 trash canned items. I don't
expect it is anything more than luck that there are these few as it
has nothing to do with being hit, but rather by who threw the blow
(actually the why).

73's
Richard Clark, KB7QHC

H. Adam Stevens, NQ5H September 25th 03 11:33 AM

I have created email addresses that have never been exposed to the net or
the web.
The ones using regular words get hit sooner and more frequently that the
ones using random alphanumeric characters.

Can you say ViralSpamBot?
But.....
What I want to know is......
......why?

Is life THAT boring?

73
H.



Richard Clark September 25th 03 05:10 PM

On Thu, 25 Sep 2003 05:33:31 -0500, "H. Adam Stevens, NQ5H"
wrote:
Is life THAT boring?

73
H.


Hi OM,

Put the word "pound" in one posting and see what happens. ;-)

73's
Richard Clark, KB7QHC

Roger Halstead September 26th 03 12:33 AM

On 23 Sep 2003 18:00:04 -0800, Floyd Davidson
wrote:

Mike Coslo wrote:
Dee D. Flint wrote:
"David or Jo Anne Ryeburn" wrote:
"Dee D. Flint" wrote:

If you have a suggestion on how to stop them, please let us all in on
it.

Persuade the universe to cease using unsafe operating system software,
browsers, and e-mail programs coming from Redmond, WA ;-). UNIX, including
the version now marketed by Apple, is pretty safe.

David, ex-W8EZE, whose computers are happily MS-free except for safe 11
year old versions of Word and Excel


If everyone switched to UNIX, the solution would be short-lived as the virus
writers would then switch to attacking it. Right now, they simply get more
"bang for the buck" by attacking Windows and it doesn't give them much of a
thrill to also go after UNIX system users or Apple computer users.


You have touched on the answer, Dee.


David is the one who touched on it. The answer *is* to use an
OS designed to be secure. Microsoft products are not, while
virtually all of the current unix systems are. Some unixes (the
ones with open source code, which does not include Apple) do
have higher potential for good security than others.

The "bang for the buck" argument is proof of it too. If you
want a *bang*, then shutdown the *entire* Internet, not just
some percentage of the hosts connected to it. The fact is
that from the start the Internet itself ran on unix. That is
less true today, but it is still true enough that if one could
write a virus to knock out unix, one could just shut the
Internet off for days.

But, of course, it can't be done (or that is exactly what they
would be doing).


Unfortunately this is an academic argument as the "rest-of-the-world",
is not going to change and wouldn't change if you provided it
free...which much already is.

The vast majority wouldn't change even if you installed UNIX, or LINUX
and set up the applications.

Then, most of those who would be willing to use one of those "if you
set it up", they would want mail and news readers that do the same as
Outlook and Outlook Express. If the OS didn't open them to the world
their applications would albeit they would be less likely to trash the
OS ...

Roger Halstead (K8RI EN73 & ARRL Life Member)
www.rogerhalstead.com
N833R World's oldest Debonair? (S# CD-2)



All times are GMT +1. The time now is 01:54 AM.

Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
RadioBanter.com