Solved

Is there a way to know what Netsky virus did on my PC?

Posted on 2004-03-28
5
249 Views
Last Modified: 2010-04-11
My partner's PC has just being infected by Netsky. I've got it disconnected, but I would like to know if I can manage to see which emails had been sent while it was connected to the net.

Thanks,
-Piu1977
0
Comment
Question by:piu1977
  • 3
  • 2
5 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 10698234
Hi piu1977,

If you are talking about this http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.k@mm.html

check what it does here

Thanks
0
 

Author Comment

by:piu1977
ID: 10698248
I saw that, but what I want to know is if there is a log of all the activity of what's been done, like :
email sent to a, from b     email sent to b from c

Just to warn some people not to open those emails.


Thanks a lot

Piu1977
0
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 500 total points
ID: 10698293
Well it may not be obvious to find out that but as you can see Netsky when it mails someone say from your email address or using your name it puts these in the subject

Re: Important
Re: Your document
Re: Your details
Re: Approved

and many more like this and they would also get an attachment in this email. You can just ask them to delete that email cos surely it would be that Netsky.

I have been getting emails with those subjects lately and I just delete it ..

0
 

Author Comment

by:piu1977
ID: 10698311
Ok. Thanks for your reply.

Have a nice day

-Piu1977
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 10698316
Also not sure if you had seen this removal tool

http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky@mm.removal.tool.html

Since you never know to how many people the virus might have spread from your address book in your computer. just email them with a good recognising subject in the email and inform that about the virus

Thanks for the pts
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now