sos5.1.0
high
This signature detects e-mail attachments containing the
string 'begin' and the file extension 'vbs' sent via POP3. This
may indicate the e-mail virus LoveLetter is attempting to
enter the system. The executed file copies itself to the
Windows system directory and edits the Registry to run the
virus on reboot; when activated, it downloads a trojan from
a specified web site that deletes security keys and sends
stolen passwords to its owner. LoveLetter also obtains e-mail
addresses from the Microsoft Outlook database and sends
infected messages to all addresses found, overwrites mIRC
and Pirch setup files, and sends infected messages via IRC.
VIRUS:POP3:UUENCODED-DOT-VBS
sos5.1.0
medium
This signature detects e-mails containing 'kak.hta' sent via
POP3. This may indicate the e-mail virus Kak is attempting
to enter the system. The virus arrives embedded within
Microsoft Outlook message signature file as kak.htm, and
activates when viewed in the Microsoft Outlook preview
pane. Once triggered, the file copies itself as kak.hta to the
Windows startup and system directories; on reboot, the virus
overwrites the autoexec.bat file to delete the virus from the
startup directory. Kak then replaces the Microsoft Outlook
message signature with infected file kak.htm. The virus also
displays an alert box after 6pm on the first day of the month
and shows down Windows.
VIRUS:POP3:WSCRIPT-KAK
sos5.1.0
critical
This signature detects e-mail attachments named 'Y2k.exe'
sent via POP3. This may indicate the e-mail virus Zelu is
attempting to enter the system disguised as the utility
ChipTec Y2K Freeware Version. The executed file scans
available directories, corrupts writeable files, and inserts a
message at the beginning of infected files. Zelu may reset
the system, making the operating system unusable and
erasing all data.
VIRUS:POP3:Y2K-ZELU
sos5.1.0
critical
This signature detects e-mail attachments named
'ZippedFiles.exe' sent via POP3. This may indicate the e-mail
virus Zipped_Files is attempting to enter the system. The
executed.ZIP file installs the program explore.exe, which
edits the host and visible networked WIN.INI files to run
explore.exe on startup. The virus also searches all local and
visible networked drives for common file types (.ASN, .C,
.CPP, .DOC, .H, .XLS, .PPT) and reduces them to zero bytes.
VIRUS:POP3:ZIPPED
sos5.1.0
high
This signature detects the Q through T variants of the Bagle
SMTP virus. Bagle sends e-mails containing an attachment
with a malicious payload. Viewing the e-mail message loads
an external link using HTTP; this link is actually an executable
program that infects the target. The virus then sends a copy
of itself to e-mail addresses found on the target's hard drive
using the target's e-mail address as the return address.
VIRUS:SMTP:BAGLE.Q-SMTP
sos5.1.0
high
This signature detects e-mail attachments that contain two
file extensions. Attackers or viruses may send e-mail
attachments that use two file extensions to disguise the
actual file name and trick users into opening a malicious
attachment.
VIRUS:SMTP:DOUBLE-DOT-DOT
Copyright © 2010, Juniper Networks, Inc.
934
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...