Virus Warnings from August 2000
______________________________________________________________
[Jump to Amiga] [Jump to Windows] [Jump to Mac]
[Jump to Linux] [Jump to Misc]
______________________________________________________________
Amiga
Date: August 29, 2000
Platform: Amiga
Warning About: 8x8 - Motaba-3, link virus found * UPDATED
Report From: Virus Help Denmark
* Release Note: Today we recived information from about an
infected archive that was on Aminet and has been
released on Aminet CD-38. This archive is infected with
the linkvirus named by xvs.library v33.23, '8x8 virus'
and named by VT-Schutz v3.17 as 'Motaba-3 virus'.
* Webmaster Note: Please read the readme file accompaning
this *updated* warning.
* Click here for VHT-DK Virus Warning vht-dk91
Date: August 29, 2000
Platform: Amiga
Warning About: 8x8 - Motaba link virus found
Report From: Virus Help Denmark
* Release Note: Today we recived information from about an
infected archive that was on Aminet and has been
released on Aminet CD-38. This archive is infected with
the linkvirus named by xvs.library v33.23, '8x8 virus'
and named by VT-Schutz v3.17 as 'Motaba-3 virus'.
* Click here for VHT-DK Virus Warning vht-dk90
Top of Page
Windows
Date: August 30, 2000 (Announced Aug 28, 2000)
Platform: Microsoft Windows 2000
Patch Available: Local Security Policy Corruption Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that
eliminates a security vulnerability in MS Windows 2000.
The vulnerability could allow a malicious user to disrupt
normal operation of an affected machine, and potentially
of an entire network. Customers who have applied Windows
2000 Service Pack 1 are already protected against the
vulnerability and do not need to take any further action.
* Click here for MS Security Bulletin MS00-062
Date: August 30, 2000 (Reported Aug 28, 2000)
Platform: MS Windows 9x
Warning About: W32/NewsTick Win9x Internet Backdoor Trojan
Report From: NAI
* Release Note: This is a Windows 9x Internet Backdoor trojan.
When running it gives full access to the system over the
Internet to anyone running the appropriate client software.
The application hides itself from the Win9x task manager.
Visit the NAI link, for removal instructions.
* Click here for NAI Report on W32/NewsTick
Date: August 27, 2000 (Announced Aug 25, 2000)
Platform: Microsoft Money 2000 and 2001
Patch Available: Money Password Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that
eliminates a security vulnerability in Microsoft Money.
The vulnerability could allow a malicious user to obtain
the password of a Money data file.
* Click here for MS Security Bulletin MS00-061
Date: August 27, 2000 (Announced Aug 25, 2000)
Platform: Microsoft Internet Information Server 4.0 and 5.0
Patch Available: IIS Cross-Site Scripting Vulnerabilities
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates
security vulnerabilities in Microsoft Internet Information
Server. The vulnerabilities could allow a malicious web site
operator to misuse another web site as a means of attacking
* Click here for MS Security Bulletin MS00-060
Date: August 25, 2000
Platform: PC
Warning About: VBS/Elva Internet Worm
Report From: NAI
* Release Note: This is an Internet worm written in VB
Script with an .HTA extension. This virus may arrive via
MAPI email as the file name "card.hta". This virus requires
Windows Scripting Host and the interpreter file MSHTA.EXE
in order to execute.
* Click here for NAI Report on VBS/Elva Worm
Date: August 25, 2000
Platform: Windows 9x/NT systems
Warning About: W32/MTX@mm Internet Worm
Report From: NAI
* Release Note: This is a 32bit PE file infector. This virus
modifies WSOCK32.DLL in an effort to hook SMTP traffic as
an attachment. This virus searches for available shares
through Network Neighborhood in an effort to transfer to
host systems. McAfee AVERT is still analyzing this virus.
Visit NAI for removal instructions, and the AVERT
recommended updates.
* Click here for NAI Report on W32/MTX@mm Worm
Date: August 23, 2000 (Reported on Aug 18, 2000)
Platform: MS Internet Explorer and Access 97 or 2000
Warning About: Hole in MS Access, allows access
Report From: MSNBC Bug of The Day (BugNet)
* Release Note: Bruce Kratofil of Bugnet, says in part:
"Aug. 18 It's been two steps forward, one step back for
Microsoft, as they have worked to patch a security problem
that has been dubbed "probably the most dangerous
programming error in Windows" that Microsoft has made.
Unfortunately for users, the patch does not appear to be
complete."
* Click here for Complete Article Hole in Access allows access
Date: August 23, 2000 (Announced Aug 21, 2000)
Platform: Microsoft virtual machine (Microsoft VM)
Patch Available: Java VM Applet Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates
a security vulnerability in the Microsoft. virtual machine
(Microsoft VM). If a malicious web site operator were able
to coax a user into visiting his site, the vulnerability
could allow him to masquerade as the user, visit other sites
using his identity, and relay the information back to his
site.
* Click here for MS Security Bulletin MS00-059
Date: August 23, 2000
Platform: Win32 systems
Warning About: Qaz Network Worm
Report From: F-Secure
* Release Note: This is network worm spreading under Win32
systems with {backdoor:Backdoor} abilities. That worm was
reported in-the-wild in July-August 2000. The worm itself
in Win32 executable file about 120K of length, written in
MS Visual C++.
* Click for F-Secure Report on Qaz Network Worm
Date: August 23, 2000 * Updated from 18-Aug-2000
Platform: PC
Warning About: W97M/Doeii.A Word Macro Virus
Report From: F-Secure
* Release Note: Doeii is a Word macro virus that encrypts
the infected documents. W97M/Doeii.A infects on opening
an existing document or creating a new one.
* Click for F-Secure Report on Doeii Word Macro Virus
Updated Date: August 19, 2000 * Updated
Platform: Windows System
Warning About: VBS/Loveletter VBScript Internet worm
Report From: F-Secure
* Release Note: VBS/LoveLetter is a VBScript worm. It
spreads through e-mail as a chain letter. F-Secure says
you can protect yourself against VBScript worms by
uninstalling the Windows Script Host.
* Click for F-Secure Update on LoveLetter worm
* Click for F-Secure Info on Uninstalling Windows Script Host
Date: August 18, 2000
Platform: All platforms running IIS versions 1.0, 2.0,
3.0, and 4.0
Warning About: Automated Web Interface Scans IIS for
Multiple Vulnerabilities
Report From: CIAC
* Release Note: Several vulnerabilites may be exploited
in Microsoft's Internet Information Server (IIS). An
outsider can gain access to the source code of scripts,
possibly containing usernames and passwords, locations
of MS Access MDB files or other sensitive information.
CIAC says the risk is high.
* Click for CIAC Report and Solutions in K-068
Date: August 18, 2000
Platform: MS Windows
Warning About: VBS/Loveletter.bd Internet worm
Report From: NIPC (in additon to NAI and F-Secures Reports)
* Release Note: On August 17, 2000, the NIPC began tracking
the propagation of this worm, which contains password-
stealing agent. When the infected system is re-booted the
Trojan proceeds to capture network password information
and sensitive PIN information stored in the registry
related to UBS online banking software. There have been
2 reports of this worm on United States sites.
* Click here for NIPC Alert 00-053 (Loveletter.bd)
Date: August 17, 2000
Platform: MS Windows 2000
Warning About: Potential Gap in Windows, IE 5.x
Report From: SANS Institute Online
* Release Note: SANS has a link to the New York Times
article by Evan Hansen, of CNET News.com. Evan starts
off with "Noted bug hunter Georgi Guninski issued a
security alert today warning that Microsoft Windows 2000
and later versions of Internet Explorer may be vulnerable
to security problems planted in local and remote network
folders."
* Click here for SANS News Link to Potential Gap
Updated Date: August 17, 2000
Platform: Windows System
Warning About: VBS/Loveletter.bd VBScript Internet worm
Report From: NAI and F-Secure
* Release Note: This is a VBScript Internet worm which was
based loosely on the original VBS/Loveletter worm. This
worm does not damage files however does contain another
mechanism of downloading a password stealing agent and
launching this silently in the background. In addition,
this worm steals PIN information stored in the registry
related to UBS online banking software. This Internet
worm is detected as "New VBS" using VirusScan 4.5 with
heuristics enabled. You can protect yourself against
VBScript worms by uninstalling the Windows Script Host.
Please visit either NAI or F-Secure, to find out how.
* Click for NAI New Report on LoveLetter worm
* Click for F-Secure New Report on LoveLetter worm
Date: August 15, 2000
Platform: MS Windows 2000
Warning About: W2K can leave systems unprotected
Report From: MSNBC Bug of The Day
* Release Note: Last week, BugNet reported an incompatibil-
ity between Windows 2000 Service Pack 1 and ZoneAlarm.
After more testing with KeyLabs, BugNet was able to
identify another personal firewall product that fell
victim to Microsoft's update for Windows 2000.
* Click here for Win2000 and BlackICE at odds Report
Date: August 15, 2000
Platform: MS Windows 2000
Patch Available: Specialized Header Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that
eliminates a security vulnerability in Internet
Information Server that ships with Microsoft Windows
2000. Under certain conditions, the vulnerability could
cause a web server to send the source code of certain
types of web files to a visiting user.
* Click here for MS Security Bulletin (MS00-058)
Date: August 12, 2000
Platform: A number of MS Products
Warning About: Scriptlet Rendering
Microsoft Office HTML Object Tag
File Permission Canonicalization
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a number of
Security Bulletins, dealing with the list of the
above vunerabilities. Check out the bulletins below,
in their respective order.
* Click here for MS Security Bulletin (MS00-055)
* Click here for MS Security Bulletin (MS00-056)
* Click here for MS Security Bulletin (MS00-057)
Date: August 11, 2000
Platform: PC
Warning About: NAI Varioius Viruses and Trojans
Report From: NAI
* Release Note: There are a few trojans and worms
listed on the NAI New Viruses Page.
* Click here for Report on W32/Sysid.worm
* Click here for Report on W97M/Tpro.a
* Click here for Report on X97M/Jal.a
* Click here for Report on Girl Thing
Date: August 11, 2000
Platform: PC
Warning About: Microsoft "IE Script"/Access/OBJECT Tag
Vulnerability
Report From: CERT
* Release Note: Under certain conditions, Internet Explorer
can open Microsoft Access database or project files
containing malicious code and execute the code without
giving a user prior warning. Access files that are
referenced by OBJECT tags in HTML documents can allow
attackers to execute arbitrary commands using Visual
Basic for Applications or macros.
* Click here for CERT Advisory CA-2000-16
Date: August 10, 2000
Platform: PC
Warning About: X97M/Barisada Excel macro virus
Report From: F-Secure
* Release Note: When an infected workbook is deactivated,
the virus drops its code to the "hjb.xls" into the Excel
startup directory. After Excel has been restarted, every
workbook be will infected.
* Click for F-Secure Report about Barisada macro virus
Date: August 10, 2000
Platform: PC
Warning About: Netscape Allows Java Applets to Read
Protected Resources
Report From: CERT
* Release Note: Netscape Communicator and Navigator ship
with Java classes that allow an unsigned Java applet
to access local and remote resources in violation of
the security policies for applets.
* Click here for CERT Advisory CA-2000-15
Date: August 10, 2000
Platform: PC running Microsoft Outlook versions
Warning About: MS Outlook Express and others
Report From: National Capital Freenet (NCF) Help-Desk
* Release Note: Anyone using Microsoft Outlook or Outlook
Express should keep abreast of ongoing security attacks
by hackers that have the potential to cause very serious
harm to the integrity of your files and introduce viruses!
The latest critical security patch affects the following
systems: Microsoft Outlook Express 4.0, 4.01, 5.0, 5.01,
and MS Outlook 97/98/2000 users who use IMAP4 or POP3
servers.
* Click here for MS Patches and alerts for security bugs
Date: August 9, 2000
Platform: PC
Warning About: Stages Visual Basic Script worm
Report From: F-Secure
* Release Note: This Visual Basic Script worm mass
mails itself as an e-mail attachment which has an
SHS-extension.
* Click for F-Secure Report about VBS/Stages Script worm
Top of Page
Updated Date: August 9, 2000
Platform: Windows System
Warning About: LoveLetter VBScript worm
Report From: F-Secure
* Release Note: VBS/LoveLetter is a VBScript worm. It spreads
through e-mail as a chain letter. it spreads using a mIRC
client as well. You can protect yourself against VBScript
worms by uninstalling the Windows Script Host. For further
information, please look at:
http://www.F-Secure.com/virus-info/u-vbs/
* Click for F-Secure New Report on LoveLetter worm
Date: August 9, 2000
Platform: Internet connected system running Netscape
Warning About: Brown Orifice Trojan
Report From: SANS
* Release Note: There is a follow-up on the article from
security expert Dan Brumleve, warning abut Brown Orifice.
SANS has a link to a Wired News article, that has some
interesting findings of Dan Brumleve, including how this
hole "allows Java to open a server that can be accessed by
arbitrary clients," and the second hole is more dangerous,
and is only found in Netscape: It "allows Java to access
arbitrary URLs, including local files."
* Click for SANS: Follow-Up: Brumleve Warns
Date: August 8, 2000
Platform: PC
Warning About: Adobe Security Update Patch
Report From: Adobe
* Release Note: Adobe has released an update which
includes patches that eliminate security vulnerabilities
in Adobe. By downloading and installing the Acrobat 4.05
Update 2, you will eliminate this vulnerability.
* Click for Acrobat 4.05 Update Update Page
Date: August 7, 2000
Platform: Internet connected system running Netscape
Warning About: Brown Orifice Trojan
Report From: NAI and SANS
* Release Note: Network Associates Inc. says: Brown
Orifice (BrO) is proof of concept code designed to
convert an Internet connected system running Netscape
into a shared file server via a Java session. SANS
has a couple of links to the story.
* Click for NAI Report about Brown Orifice Trojan
* Click for SANS: Brown Orifice Security Hole Discovered
Date: August 4, 2000
Platform: Windows System
Warning About: W97M_PIECE.A Macro Virus
Report From: SANS Institute Online
* Release Note: Aliases: PIECE.A, Macro.Office97.Melissa-
based, W97M/Melissa.gen@MM, W97M.OutlookWorm.gen/
SANS Institute has a link to Trend Micro, Incorporated,
warning about W97M_PIECE.A Macro Virus.
* Click for SANS Report about W97M_PIECE.A Macro
Date: August 1, 2000
Platform: Windows System
Warning About: LoveLetter VBScript worm
Report From: F-Secure
* Release Note: VBS/LoveLetter is a VBScript worm. It spreads
through e-mail as a chain letter. it spreads using a mIRC
client as well. You can protect yourself against VBScript
worms by uninstalling the Windows Script Host. For further
information, please look at:
http://www.F-Secure.com/virus-info/u-vbs/
* Click for F-Secure New Report on LoveLetter worm
Date: August 1, 2000
Platform: Windows System
Warning About: X97M/Barisada Excel macro virus
Report From: F-Secure
* Release Note: When an infected workbook is deactivated,
the virus drops its code to thejb.xls" into the Excel
startup directory. After Excel has been restarted, every
workbook be will infected. The virus activates its
payload 2 pm at April, 24th. At this time the virus shows
two dialogs. Use the link supplied here, to read more.
* Click for F-Secure Report about Barisada virus
Date: August 1, 2000
Platform: PC
Warning About: W97M/Model Word 97 macro virus
Report From: F-Secure
* Release Note: When an infected document is opened, the
virus infects the global template and disables the built-in
macro virus protection. After that all documents opened
or created will be infected. Click the link here, to read
more about the different variants and their effect.
* Click for F-Secure Report about Model Word 97 macro virus
Date: August 1, 2000
Platform: PC
Warning About: W97M/Rendra Word 97 macro virus
Report From: F-Secure
* Release Note: When an infected document is opened, W97M/
Rendra.A disables the macro virus protection and infects
the global template. After that every document that is
closed will be infected. When a new document is created,
the virus inserts large green text to it.
* Click for F-Secure Report about Rendra Word 97 macro virus
Top of Page
Macintosh
Date: August 9, 2000
Platform: Mac System Doftware prior to Mac OS 9.0.4
Warning About: Hardware - Sleep Memory Extension
Report From: Apple Computer, Inc.
* Release Note: Apple has identified a bug in system
software prior to Mac OS 9.0.4 which in very rare
circumstances can prevent your computer from properly
waking up from sleep. Though you will most likely never
encounter this bug, we still recommend that all iBook
and new PowerBook (FireWire) owners download and install
the Sleep Memory Extension software patch which eliminates
this bug. (The patch is not necessary if your computer is
running Mac OS 9.0.4 or later.)
* Click for Apple's Sleep Memory Extension Info
Top of Page
Linux
Date: August 30, 2000
Platform: Caldera Linux
Warning About: /tmp file race in faxrunq
Report From: Caldera Systems, Inc.
* Release Note: Vulnerable versions include OpenLinux
Desktop 2.3, eDesktop 2.4, OpenLinux eServer 2.3 and
OpenLinux eBuilder. The mgetty package contains a number
of tools for sending an receiving facsimiles. One of the
tools, faxrunq, uses a marker file in a world-writable
directory in an unsecure fashion. This bug allows malicious
users to clobber files on the system owned by the user
invoking faxrunq.
* Click here for Caldera Advisory CSSA-2000-029.0
Date: August 25, 2000
Platform: Linux-Mandrake 7.1 and 7.0
Warning About: An easy ux-Mandrake exploit
Report From: MSNBC Bug of the Day
* Release Note: In MandrakeSoft, Inc.'s Linux-Mandrake 7.1
and 7.0 bind is launched as uid/gid root, which allows
potential vulnerabilities in bind to be more easily
exploited. Use the update utility on your desktop to
upgrade to a fixed version.
* Click here for MSNBC Report on ux-Mandrake exploit
Date: August 24, 2000
Platform: Caldera Linux
Warning About: Ld.so unsetenv problem
Report From: Caldera Systems, Inc.
* Release Note: A bug has been discovered in ld.so that
could allow local users to obtain super user privilege.
* Click here for Caldera Advisory CSSA-2000-028.0
Date: August 23, 2000
Platform: Red Hat Linux
Warning About: Red Hat Linux Root Exploit
Report From: MSNBC Bug of the Day
* Release Note: On Aug 22nd, BugNet reports there is a
potential remote root exploit in rpc.statd in Red Hat
Linux 6.0 through 6.2. This daemon is part of the
nfs-utils package. They advise to upgrade to the
newest nfs-utils package. There are links available
from MSNBC Bug of the Day.
* Click here for Aug 22: Red Hat Linux root exploit
* Click here for Aug. 21: Better update Red Hat Linux
Date: August 21, 2000
Platform: Caldera Linux
Warning About: Netscape java security bug
Report From: Caldera Systems, Inc.
* Release Note: Recently, a problem in netscape's java
libraries was discovered that allows an applet to act
as a web server on your machine, exposing all files on
your system to the world. An exploit for this vulner-
ability has been publed widely under the name "Brown
Orifice".
* Click here for Caldera Advisory CSSA-2000-027.1
Date: August 19, 2000
Platform: Systems running the rpc.statd service
Warning About: Input Validation Problem in rpc.statd
Report From: CERT Advisories
* Release Note: The CERT/CC has begun receiving reports
of an input validation vulnerability in the rpc.statd
program being exploited. This program is included, and
often installed by default, in several popular Linux
distributions. The CERT says to upgrade your version
of rpc.statd, disable the rpc.statd service, and to
block unneeded ports at your firewall. More info in
the advisory.
* Click here for CERT Advisory CA-2000-17
Date: August 17, 2000
Platform: Linux systems
Warning About: Compromises via rpc.statd Vulnerability
Report From: CERT/CC Current Activity
* Release Note: The CERT/CC is receiving reports of Linux
systems being root compromised via a recently discovered
vulnerability in rpc.statd. Red Hat and Debian have both
released advisories and patches for their respective NFS
packages. Please visit CERT/CC Current Activity, for the
links to Red Hat and Debian reports and patches.
* Click here for CERT/CC Current Activity
* CERT/CC Steps for Recovering From a Root Compromise
Top of Page
Miscellaneous
Date: August 30, 2000
Platform: 3COM Palm platform
Warning About: Liberty (Palm), Warez.prc, Crack 1.1 Trojan
Report From: F-Secure and Network Associates
* Release Note: The LIBERTY.A is a simple trojan written
for the 3COM Palm platform, when activated the trojan
deletes all application files on the device. For directions
on removing the trojan from palm devices and how files can
be restored, visit the F-Secure site.
* F-Secure Anti-Virus v5.0 detects and disinfects this Trojan
during synchronization operations, using the latest update
available from http://www.F-Secure.com.
* Click for F-Secure Report on Liberty (Palm) Trojan
* Click for NAI Report on Liberty (Palm) Trojan
Date: August 24, 2000
Platform: PGP versions 5.5.x through 6.5.3, domestic
and international
Warning About: PGP May Encrypt Data With Unauthorized ADKs
Report From: CERT Advisories
* Release Note: Additional Decryption Keys (ADKs) is a
feature introduced into PGP (Pretty Good Privacy) versions
5.5.x through 6.5.3 that allows authorized extra decryption
keys to be added to a user's public key certificate. However,
an implementation flaw in PGP allows unsigned ADKs which have
been maliciously added to a certificate to be used for
encryption. Philip Zimmermann, author of PGP, says in part
"The MIT web site should have a new PGP 6.5.x freeware
release early Friday, and the NAI/PGP web site should have
patches out for the commercial releases at about the same
time."
* Click here for CERT Advisory CA-2000-18 on PGP
Date: August 22, 2000
Platform: Sun Microsystems Java Web Server
Warning About: Sun's Java Web Server Remote Command
Report From: Foundstone, Inc.
* Release Note: Using Sun's Java Web Server's administration
module configuration and the Bulletin Board example
application supplied with Java Web Server, it is possible
to remotely execute arbitrary commands on the target system.
* Click here for Advisory FS-082200-11-JWS
Date: August 17, 2000
Platform: Mobile phone Web surfers
Warning About: Wireless Web privacy hole still wide open
Report From: Digital Desk WireTrap Alert
* Release Note: The Security Story of the Day has a link
to the CNET News.com article, written by staff writer,
John Borland. In Mr. Borlands article, he states in part
"Mobile phone Web surfers from several service providers
discovered last March that their wireless Web services were
distributing their phone numbers to Web sites without
telling them. The disclosure enraged privacy advocates
and prompted at least one company--Sprint PCS--to promise
quick changes."
* Click here for WireTraps Security Story of the Day
Date: August 17, 2000
Platform: Irix 6.2 - 6.5.8 and patched versions of the
telnet daemon in Irix 5.2 - 6.1
Warning About: IRIX telnetd vulnerability
Report From: CIAC
* Release Note: A vulnerability exists in the telnet daemon
which can give an attacker remote root access.
* Click for CIAC Report and Solutions in K-066
Date: August 17, 2000
Platform: All releases of FreeBSD after FreeBSD 3.2-RELEASE
and prior to the correction date (including FreeBSD
4.0 and 3.5, but not 4.1) Ports collection prior to
the correction date.
Warning About: FreeBSD - dhclient vulnerable to malicious
dhcp server
Report From: CIAC
* Release Note: The DHCP client does not correctly validate
input from the server, allowing a malicious DHCP server to
execute arbitrary commands as root on the client.
* Click for CIAC Report and Solutions in K-067
Date: August 15, 2000
Platform: E-Mail / PC
Warning About: HOAX: Reformat hoax
Report From: NAI
* Release Note: This is a hoax which is often sent with
varying subject lines however the context remains the
same. Ignore or delete email messages which match the
pattern or description, as outlined in NAI's report.
* Click here for NAI's Report on this Reformat HOAX
Date: August 10, 2000
Platform: EPOC OS for hand held devices such as SIBO
Siena and EPOC32 systems such as Psion
Warning About: EPOC Trojans Updates
Report From: F-Secure
* Release Note: There are a few new and updated EPOC
warnings, on F-Secures Virus Information Page.
* F-Secure, EPOC Trojan Links:
EPOC/Lights
EPOC/Alone
Date: August 9, 2000
Platform: EPOC OS for hand held devices such as SIBO
Siena and EPOC32 systems such as Psion
Warning About: EPOC Trojans Updates
Report From: F-Secure
* Release Note: There are a few new and updated EPOC
warnings, on F-Secures Virus Information Page.
* F-Secure, EPOC Trojan Links:
EPOC/Fake
EPOC/Alarm
EPOC/BadInfo
EPOC/Ghost
Date: August 5, 2000
Discovery Date: August 3, 2000
Platform: EPOC OS for hand held devices such as SIBO
Siena and EPOC32 systems such as Psion
Warning About: EPOC Trojans
Report From: NAI
* Release Note: These are trojan programs written for EPOC
OS hand held devices such as SIBO, Siena and Psion. These
trojans run processes in the background and do various
things. Follow the seperate links for each trojan, or use
the link to go to the main NAI New Viruses and Trojans
page.
* Network Associates Inc., EPOC Trojan Links:
EPOC/Ghost.a
EPOC/Alarm.a
EPOC/Fake
EPOC/Alone
EPOC/BadInfo
EPOC/Lights
* Click for NAI New Viruses and Trojans Page
Date: August 2, 2000
Platform: PC
Warning About: Vulnerability Found in Lotus Notes
Report From: SANS Institute Online
* Release Note: none
* Click for SANS Information on Lotus Notes
Back to the Virus Archives page
