Another one to look out for!
-----Original Message-----
From: Mark Weaver <[log in to unmask]>
To: [log in to unmask] <[log in to unmask]>
Date: 28 March 1999 04:45
Subject: Fw: VIRUS ALERT: Melissa NOT HOAX
>
>-----Original Message-----
>From: Peter Kurilecz <[log in to unmask]>
>To: [log in to unmask] <[log in to unmask]>
>Date: 27 March 1999 04:05
>Subject: VIRUS ALERT: Melissa NOT HOAX
>
>
>>Virus Alert: First and only Detection and Cleaning for Newly Discovered
>>Melissa Virus
>>
>>PRNewswire
>>26-MAR-99
>>
>>SANTA CLARA, Calif., March 26 /PRNewswire/ -- As a service to computer
>users
>>and the entire industry, AVERT (the Anti-Virus Emergency Response Team), a
>>division of NAI Labs at Network Associates (Nasdaq: NETA), advises
computer
>>users to protect their PCs with the new signature file for Melissa, the
>Word
>>Macro virus discovered by AVERT March 25. Melissa is widely reported and
>>spreading quickly via mass e-mail, a function of the viral infection. Upon
>>discovery of the fast-spreading nature of Melissa, Network Associates
>>responded to the threat in real-time. Detection and cleaning for
>W97M/Melissa
>>has been available since March 26 on Network Associates' Web site at
>>http://www.avertlabs.com/public/datafiles/valerts/vinfo/melissa.asp.
>Symptoms:
>>
>>Melissa infiltrates a system attached to an e-mail with the subject
>"Important
>>Message From [Application.UserName]." The body text reads "Here is that
>>document you asked for ... don't show anyone else ;-)" and contains a list
>of
>>pornographic Web sites. Melissa creates the following entry in the
>registry:
>>HKEY_CURRENT_USER/Software/Microsoft/Office/"Melissa?" Pathology:
>>
>>Melissa tests the system to see if it's already infected. Then it disables
>the
>>MACRO/SECURITY approval screen and resets the document security to none.
It
>>reads the members of the infected computer user's personal address book,
>then
>>creates the infectious e-mail message and sends it to the first 50
>addresses.
>>
>>In addition, if the day equals the minute value, and the infected document
>is
>>opened this text is inserted at the current cursor position: "Twenty-two
>>points, plus triple-word-score, plus fifty points for using all my
letters.
>>Game's over. I'm outta here." Cure:
>>
>>To avoid the risk of contracting the Melissa virus, it is recommended that
>>network administrators and users upgrade their anti-virus software to
>include
>>detection and cleaning for W97M/Melissa. The most recent protection is
>posted
>>for download on Network Associates' Web site at
>>http://www.avertlabs.com/public/datafiles/valerts/vinfo/melissa.asp.
>>
>>Network Associates will hold a conference call to discuss the Melissa
virus
>on
>>Friday, March 26th at 5:45 pm Pacific time. Interested press and analysts
>>should call 800-857-2772 and reference the Network Associates conference
>call.
>>
>>With headquarters in Santa Clara, Calif., Network Associates, Inc. is
>>dedicated to providing leading enterprise network security and management
>>software. AVERT, the anti-virus research division of NAI Labs, currently
>>employs more than 85 virus researchers and maintains labs on five
>continents
>>worldwide. In addition to studying new and existing security threats,
AVERT
>>serves as a global resource for virus information and provides rapid,
>follow-
>>the-sun support for virus emergencies worldwide. Virus Alerts are issued
as
>a
>>service to customers from Network Associates, the leader in anti-virus
>>detection and cleaning technology. For more information, Network
Associates
>>can be reached at 408-988-3832 or on the Web at http://www.nai.com.
>>
>>NOTE: Network Associates and VirusScan are registered trademarks of
Network
>>Associates and/or its affiliates in the US and/or other countries. All
>other
>>registered and unregistered trademarks in this document are the sole
>property
>>of their respective owners.
>>
>>
>>
>>PETER A. KURILECZ CRM, CA
>>[log in to unmask]
>>
>> ++++++++++++++++++++++++++++++++++++++++++++++++++
>> This message brought to you by the RECMGMT List
>> Unsub and nomail requests must be sent to [log in to unmask]
>> Lost your instructions? Send the command HELP to the above address
>> Problems managing your account? Try [log in to unmask]
>> Delete a message accidentally? try our archives of message
>> traffic: http://listserv.syr.edu/archives/recmgmt.html >>
>>
>
>
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|