• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 2180
  • Last Modified:

Stration/Warezov worm

I've been listed in the http://cbl.abuseat.org web site because of this Virus (Stration/Warezov worm).  I'm using trend micro office scan and Trend Micro Server Protect.

I'm unable to identifiy the computer infected...  Any idea how to resolve this issue?

Thanks!
0
polycorjsp
Asked:
polycorjsp
  • 2
  • 2
  • 2
1 Solution
 
silganitCommented:
There is a good chance these are not coming from you Viruse like Stration likes to hide where it is comeing from by going through the address book of the infect computer and listing that person as the sender as an example let say that bob computer is infected the viruse will go in to the address book find an e-mail addres and then start send out infected e-mail except the e-mail are from Steve no ever expects bob computer as the sender.

the fact that you are running Trend Micros tell me that you are probly not infected I too run Trend Micro and we are stopping this bug befor it get in to the system with Mail scan so I know that as long as your patten file is up to date it will detect and remove the bug. if your manitence is current I would suggest that you upgrade to officescan 7.3 this will provide you with spyware and viruse protection for both your workstation and servers.
0
 
legalsrlCommented:
Sorry to be a downer on silganit's point......Trend Micro, like most AV solutions are very vulnerable to the Stration worm as most of the standard suites allow any process to send traffic over Port 25 (SMTP) hence the blacklisting.

I would suggest deploying a firewall and only allowing known processes like outlook.exe and msimn.exe to send traffic through Port 25

This would then stop the worm from sending itself out and spamming everyone.

I see 7 or 8 new detections of this virus every day, so I'm not surprised you've become infected if you are using Trend Micro.

McAfee VirusScan Enterprise 8.0 features port blocking so only known processes can send mail over that port.

Deploy the firewall and see which clients flash up their alert screens and then you know which clients are infected.

Does the Trend Micro package you have offer you a firewall ?  If so, I'll tell you how to deploy and configure it.

If not, I'll tell you how to deploy another firewall.

How many clients do you have on the network ?

When you've found an infected client you can run the vcleaner tool from avg

http://www.grisoft.com/doc/112/lng/us/tpl/tpl01

and that will remove the Stration virus.

As to how you became infected, it's probably a user clicking on a new variants attachment and installing the virus.

Let me know how you get on

Cheers
Si
0
 
silganitCommented:
if you are using officescan 7.3 it has a firewall feature and I beg the differ about trend we have been using this product for years and have not gotten an infection for that fact I can produce logs that show the stration bug being deleted before it gets in to our network. so i know it works.
0
Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

 
legalsrlCommented:
silganit,

I'm disagreeing with you about the use of Trend in the other post, so I'm not going to waste the question asker's time here.

Point to question if anyone's interested

http://www.experts-exchange.com/Applications/Viruses/Q_22047299.html

Polycorp.....any news on your problem ?

Thanks
Si
0
 
polycorjspAuthor Commented:
Hi legalsrl,

I have 160 computers in 4 different location (4 domain controller - 1 DC and 3 child domain)...  we are all connected together with a VPN connection.  I really don't know were to start...  Do I have to go on each computer or can I build a script that will install the software and run it???

Please help! :)
0
 
polycorjspAuthor Commented:
Thanks for the hyperlink.  I've build a script and execute the program and no more listed.

Thanks!
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

  • 2
  • 2
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now