Impact of attack
Mass-mailing, Termination of Antivirus Programs and Firewalls,
and Compromise of Cached Passwords
Technical details
W32.Lirva.A@mm is a new mass-mailer worm that also propagates
through shares and peer-to-peer file-sharing applications. The W32.Lirva.A@mm
worm arrives in an e-mail message that has the following characteristics:
Note The contents vary. The following message is only one example.
Subject: Re: Reply on account for IFRAME-Security breach
Body:
Patch is also provided to subscribed list of
Microsoft Tech Support: to apply the patch immediately. Microsoft strongly
urges all customers using IIS 4.0 and 5.0 who have not already done so and do
not need to take additional action. Customers who have applied that patch are
already protected against the vulnerability that is eliminated by a
previously-released patch. Microsoft has identified security vulnerability in
Microsoft IIS 4.0 and 5.0. To prevent from the further buffer overflow attacks
apply the MSO-patch.
Attachment (including, but not limited to): Resume.exe, AvrilLavigne.exe,
AvrilSmiles.exe, CERT-Vuln-Info.exe, IAmWiThYoU.exe, MSO-Patch-0035.exe,
MSO-Patch-0071.exe, Readme.exe, Singles.exe, Sophos.exe
The worm
tries to exploit a previously patched vulnerability that exists in some
versions of Microsoft Outlook, Microsoft Outlook Express, and Microsoft
Internet Explorer. This vulnerability can be used to allow an executable
attachment to run automatically, even if you do not double-click the
attachment. For more information about this vulnerability, visit the following
Microsoft Web site:
Upon execution, the worm tries to disable some antivirus and
firewall applications that may be running on the computer. The worm also does
one or more of the following:
- Adds entries to the registry
- Copies itself to the system folder
- Sends itself to address book entries
- Collects cached passwords, and then sends them to the
attacker
For more detailed information about the W32.Lirva.A@mm worm,
contact your antivirus vendor.
Prevention
- Block potentially damaging attachment types at your
Internet mail gateways.
- Because this virus uses a previously announced
vulnerability as part of its infection method, make sure that your computers
are patched for the vulnerability that is identified in Microsoft Security
Bulletin MS01-020. For more information about this bulletin, visit the
following Microsoft Web site: To obtain the most recent cumulative security patch for Microsoft
Internet Explorer, which includes the fixes for the vulnerabilities that were
announced in Microsoft Security Bulletin MS01-020, visit the following
Microsoft Web site:
- If you are using Microsoft Outlook 2000 Service Release 1
(SR1) or earlier, install the Outlook E-mail Security Update patch to prevent
this virus (and the majority of other viruses that are borne by e-mail
messages) from running.
Microsoft Outlook 2000 Service Pack 2 (SP2) and
Outlook 2002 automatically contain the functionality in the Outlook E-mail
Security Update patch.
To install the Outlook E-mail Security Update
patch for Outlook 2000 SR1 or earlier, visit the following Microsoft Web site:
- Configure Microsoft Outlook Express 6 to block access to
potentially damaging attachments.
For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
291387
OLEXP: Using virus protection
features in Outlook Express 6
Earlier versions of Outlook Express do not contain
attachment-blocking functionality. Use caution when you open unsolicited e-mail
messages with attachments. - Use a program-level firewall to protect yourself from being
infected with this virus through Web-based e-mail programs.
Recovery
If your computer has been infected with this virus, contact
Microsoft Product Support Services or your preferred antivirus vendor for help
with removing the virus. For information about how to contact Microsoft Product
Support Services, visit the following Microsoft Web site
Related security information
For additional information about viruses, visit the following
third-party Web sites:
Microsoft
provides third-party contact information to help you find technical support.
This contact information may change without notice. Microsoft does not
guarantee the accuracy of this third-party contact information.
For additional security-related information about
Microsoft products, visit the following Microsoft Web site: