Solved

Is there a way to know what Netsky virus did on my PC?

Posted on 2004-03-28
5
252 Views
Last Modified: 2010-04-11
My partner's PC has just being infected by Netsky. I've got it disconnected, but I would like to know if I can manage to see which emails had been sent while it was connected to the net.

Thanks,
-Piu1977
0
Comment
Question by:piu1977
  • 3
  • 2
5 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 10698234
Hi piu1977,

If you are talking about this http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.k@mm.html

check what it does here

Thanks
0
 

Author Comment

by:piu1977
ID: 10698248
I saw that, but what I want to know is if there is a log of all the activity of what's been done, like :
email sent to a, from b     email sent to b from c

Just to warn some people not to open those emails.


Thanks a lot

Piu1977
0
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 500 total points
ID: 10698293
Well it may not be obvious to find out that but as you can see Netsky when it mails someone say from your email address or using your name it puts these in the subject

Re: Important
Re: Your document
Re: Your details
Re: Approved

and many more like this and they would also get an attachment in this email. You can just ask them to delete that email cos surely it would be that Netsky.

I have been getting emails with those subjects lately and I just delete it ..

0
 

Author Comment

by:piu1977
ID: 10698311
Ok. Thanks for your reply.

Have a nice day

-Piu1977
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 10698316
Also not sure if you had seen this removal tool

http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky@mm.removal.tool.html

Since you never know to how many people the virus might have spread from your address book in your computer. just email them with a good recognising subject in the email and inform that about the virus

Thanks for the pts
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Using Outlook for iOS securely 2 54
Lightweight Networking 9 61
google exe file 5 67
How can two sites exist with the exact content and not be blacklisted by google 5 22
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
It’s the first day of March, the weather is starting to warm up and the excitement of the upcoming St. Patrick’s Day holiday can be felt throughout the world.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question