Hey all, I opened my email today and found I had two emails from someone called [log in to unmask] and they both had attachments to them. Being the curious sort that I am, I opened one email and saw that it was in spanish...the attachment was in spanish as well. The attachment file name was enano porno.exe. Being the paranoid sort, I didn't open the attachment but checked at symatec's web page and found that the attachment was a VERY nasty worm called HYBRIS... The reason that I'm posting about this is that there could be somebody on the list that is infected with HYBRIS and doesn't know it. Like most worms, the virus will send emails out to everybody in your address book, and the virus has the uncanny ability to change the return email address to something that doesn't exist, and also change the way it behaves by updating itself with downloads from the internet. I looked at the email headers on the email that was sent to me, and it originated from someone that has jmolina in their email address, I don't know if there is a J Molina on this list or not. There is a web page at http://www.sexyfun.net, and it was created on December 11, 2000 in response to this virus. There's some good information there... I've also pasted a write-up about this virus from Kaspersky Labs...this be one nasty virus. -Steve Gregory- Hybris: The Story Continues...New dangerous versions of the virus have been detected "in the wild" November 13, 2000 – Kaspersky Lab, an international data-security software-development company, warns users of the discovery of Hybris, a new Internet-worm. Kaspersky Lab has been receiving reports of the discovery of this virus "in the wild" worldwide, being particularly active in Latin America although infections by this virus have also been found in Europe. The first version of this Internet worm was discovered by Kaspersky Lab and several other anti-virus software developers at the end of September and was classified as a low risk malicious program. However, within the last few days, the company has been inundated by reports from users whose computers have been infected by this virus. At this moment, Kaspersky Lab has discovered five versions of Hybris, and it is expected that new variations will be found in the near future. The Internet worm Hybris spreads by attaching itself to infected e-mails and works only under MS Windows. When the recipient executes the attached file, Hybris infects the host PC. The procedure for infection is typical for this type of malicious program and is performed in a similar way to the Happy or MTX viruses. To proliferate, the worm infects the WSOCK32.DLL library and also intercepts the Windows function that establishes the network connection; it then scans sent and received data for any e-mail addresses, and sends copies of itself to these e-mail addresses. Subject, text and name of the attached file are chosen randomly, for example: From: Hahaha [log in to unmask] Subject: Snowhite and the seven Dwarfs - The REAL Story! Attachment: dwarf4you.exe In addition, this worm has some specific features. Hybris contains several (up to 32) components (plugins) in its code and executes them depending on its needs. The worm’s functionality is mostly defined by the plugins. They are stored in the body of the worm and are encrypted by a very strong crypto algorithm. However, the main peculiarity is that Hybris maintains the functionality of the plugins: it sends its own components to the anti-virus conference "alt.comp.virus" and downloads from there any upgraded or missing plugins. The virus components can also be updated by the worm from the author’s Web page, via the Internet. So far, plugins found in the known versions of this virus and those at the Web site are fairly harmless and do not cause any direct damage. But, the fact that they can be updated means that they may be given completely different functions, for example, installing a Trojan horse backdoor. Although there have previously been some cases when a malicious program has been updated from the Internet, this is the first time it has occurred on this scale "in the wild." "What we have here is perhaps the most complex and refined malicious code in the history of virus writing," comments Eugene Kaspersky, Head of Company Anti-Virus Research Center. "Firstly, it is defined by an extremely complex style of programming. Secondly, all the plugins are encrypted with very strong RSA 128-bit crypto-algorithm key. Thirdly, the components themselves give the virus writer the possibility to modify his creation "in real time," and in fact allow him to control infected computers worldwide." --------------------------------------------------------------------------------- Technet Mail List provided as a free service by IPC using LISTSERV 1.8d To unsubscribe, send a message to [log in to unmask] with following text in the BODY (NOT the subject field): SIGNOFF Technet To temporarily halt delivery of Technet send the following message: SET Technet NOMAIL Search previous postings at: www.ipc.org > On-Line Resources & Databases > E-mail Archives Please visit IPC web site (http://www.ipc.org/html/forum.htm) for additional information, or contact Keach Sasamori at [log in to unmask] or 847-509-9700 ext.5315 ---------------------------------------------------------------------------------