News

NetSky.P Mass-Mailer Makes the Rounds

Anti-virus firms are warning users about a dangerous new variant of the NetSky mass-mailing worm that is flooding inboxes worldwide.

NetSky.P gathers e-mail addresses from infected machines and uses its own SMTP engine to spread. In an ongoing battle among virus writers, the NetSky.P variant attempts to delete registry entries made by the MyDoom and Bagle worms, according to MessageLabs, a provider of managed e-mail security services.

MessageLabs reported that it had intercepted 3.8 million copies of NetSky.P as of mid-day Thursday. Most of the messages arrived after a March 24 trigger date within the code to begin mass-mailing activity. MessageLabs reported an infection ratio for NetSky.P of one in 33 e-mails.

One particularly clever touch on the part of the NetSky.P authors is a spoofed disclaimer at the bottom of the e-mail message. It reads, "No virus found," followed by the name and e-mail address of one of at least eight anti-virus companies, including Symantec, Panda Software, McAfee, MessageLabs and others.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft Expands Azure AD Password Lengths, Adds Conditional Access Controls

    Microsoft announced a couple of Azure Active Directory enhancements this week regarding password lengths and new conditional access controls for IT pros.

  • Attack Surface Analyzer 2.0 Available for Checking Software Installs

    Microsoft this week described Attack Surface Analyzer 2.0, an updated tool for checking software installations that's now built using open source code.

  • What Causes Hyper-V Replication Failures?

    Hyper-V replication failures happen rarely, but their impact can be catastrophic when they do. Know the scenarios that are likely to trigger a replication failure.

  • Microsoft Touts Using HyperClear To Address Intel Processor Woes

    Microsoft is again promoting its HyperClear Hyper-V hypervisor technology as a potential balm for organizations trying to come to grips with Intel's latest speculative execution side-channel attack disclosures.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.