Loading ...
Sorry, an error occurred while loading the content.

~Spiritually Speaking~* Virus Alert and Info

Expand Messages
  • ROXANNE YOUNG
    Microsoft Security Advisory (904420) Win32/Mywife.E@mm Published: January 30, 2006 Microsoft wants to make customers aware of the
    Message 1 of 1 , Jan 31, 2006
    • 0 Attachment
       
       

      Microsoft Security Advisory (904420)

      Win32/Mywife.E@mm

      Published: January 30, 2006

      Microsoft wants to make customers aware of the Mywife mass mailing malware variant named Win32/Mywife.E@mm. The mass mailing malware tries to entice users through social engineering efforts into opening an attached file in an e-mail message. If the recipient opens the file, the malware sends itself to all the contacts that are contained in the system's address book. The malware may also spread over writeable network shares on systems that have blank administrator passwords.

      Customers who are using the most recent and updated antivirus software could be at a reduced risk of infection from the Win32/Mywife.E@mm malware. Customers should verify this with their antivirus vendor. Antivirus vendors have assigned different names to this malware but the Common Malware Enumeration (CME) group has assigned it ID CME-24.

      On systems that are infected by Win32/Mywife@..., the malware is intended to permanently corrupt a number of common document format files on the third day of every month. February 3, 2006 is the first time this malware is expected to permanently corrupt the content of specific document format files. The malware also modifies or deletes files and registry keys associated with certain computer security-related applications. This prevents these applications from running when Windows starts. For more information, see the Microsoft Virus Encyclopedia.

      As with all currently known variants of the Mywife malware, this variant does not make use of a security vulnerability, but is dependant on the user opening an infected file attachment. The malware also attempts to scan the network looking for systems it can connect to and infect It does this in the context of the user. If it fails to connect to one of these systems, it tries again by logging on with "Administrator" as the user name together with a blank password.

      Customers who believe that they are infected with the Mywife malware, or who are not sure whether they are infected, should contact their antivirus vendor. Alternatively, Windows Live Safety Center Beta Web site provides the ability to choose "Protection Scan" to ensure that systems are free of infection. Additionally, the Windows OneCare Live Beta, which is available for English language systems, provides detection for and protection against the Mywife malware and its known variants.

      For more information about the Mywife malware, to help determine whether you have been infected by the malware, and for instructions on how to repair your system if you have been infected, see the Microsoft Virus Encyclopedia. For Microsoft Virus Encyclopedia references, see the "Overview" section. We continue to encourage customers to use caution with unknown file attachments and to follow our Protect Your PC guidance of enabling a firewall, getting software updates, and installing antivirus software. Customers can learn more about these steps by visiting the Protect Your PC Web site.

      General Information

      Overview

      Frequently Asked Questions

      Suggested Actions

      Resources:

      .

      You can provide feedback by completing the form by visiting the following Web site.

      .

      Customers in the U.S. and Canada can receive technical support from Microsoft Product Support Services. For more information about available support options, see the Microsoft Help and Support Web site.

      .

      International customers can receive support from their local Microsoft subsidiaries. For more information about how to contact Microsoft for international support issues, visit the International Support Web site.

      .

      The Microsoft TechNet Security Web site provides additional information about security in Microsoft products.

      Disclaimer:

      The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

      Revisions: 

      .

      January 30, 2006: Advisory published

       
       
                       ¸,.·´¯`·.»§«  Practice a Random Act of Kindness   »§«.·´¯`·.,¸  
       
                           (C)  http://groupsyahoo.com/group/Spiritually_Speaking    
                                   spiritually_speaking-subscribe@yahoogroups.com    : )
    Your message has been successfully submitted and would be delivered to recipients shortly.