Feeds

Hotmail fails to block SirCam worm

MSN techies haven't bothered to update McAfee virus protection

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

The anti-virus protection offered by Microsoft's Hotmail service hasn't been updated to protect users against the prolific SirCam worm.

Register readers have written in to inform us that the McAfee virus scanning engine used by Hotmail does not stop users either sending or receiving the bug which has become a major nuisance for Internet users this week.

Alex Shipp, a senior anti-virus technologist at MessageLabs, a managed services firm which scans its users email for malicious code, has confirmed the problem and said the lack of protection will give users a false sense of security.

The McAfee virus scanner (Security Services for MSN) used by the revamped Hotmail blocks earlier bugs, such as the Anna Kournikova worm, but not SirCam. We understand it is MSN who is most at fault here, for not updating virus definition files to detect a bug, which lest we forget, is now nine days old.

Informed sources tell us Hotmail's protection is updated on Thursday night, so hopefully things will be put right soon. In fairness Hotmail is one of the few Web-based email services to have any virus protection, but it is so widely used that if the service blocks the spread of SirCam it would make a great contribution to curtailing its outbreak.

MessageLabs has intercepted 25,622 copies of the virus so far, 3,557 of which were caught today, and it predicts that today marks the peak of the outbreak, after which the virus will slowly fade away. MessageLabs' Shipp said that because the virus (like Magistr) arrives with different filenames it will hang around longer than the Love Bug.

As previously reported, SirCam spreads itself as an attachment to email messages (or possibly network shares), and may in certain cases delete files from a victim's hard disk.

SirCam snaffles up files from a user's hard disk and wraps them in viral code before propagating itself to email addresses filched from a victim's address book or temporary Internet cache files. This is a particular feature of the bug that means it poses a grave threat to privacy. It also means a large number of whopper files are being generated, which could affect Internet performance even for people not infected by the bug.

The subject of an infected email will be the name of the attached file, and users can spot infected attachments because they feature a double extension, such as (.doc.pif). The text of emails may start "Hi! How are you?" and end "See you later. Thanks", or the Spanish equivalents, but variations on this are possible.

At the risk of stating the obvious its worth repeating, yet again, that users are advised to delete any suspicious emails without opening them and to update their antiviral protection. ®

External Links

Write up on SirCam by Symantec
MessageLabs stats on SirCam

Related Stories

SirCam virus hogs connections with spam
Privacy threatening worm on the loose
Hotmail upgrade will make your life better
New-look Hotmail: the verdict
Magistr continues three month reign as top virus
Hardware-trashing virus spreads by email
Users haven't learned any lessons from the Love Bug
Reports of death of email viruses greatly exaggerated?
Rise in viruses within emails outpacing growth of email

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.