Feeds

Sobig-F is fastest growing virus ever – official

Outlook grim

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Sobig-F has taken the record as the world's most rapidly spreading virus to date, according to managed services firm MessageLabs, which stopped more than one million copies of the email-borne nuisance since its first appearance earlier this week.

Sobig.F has surpassed the infamous LoveBug, Klez and Kournikova viruses.

Sobig-F, first detected on 18 August, is the sixth variant issued in the Sobig series and appears to be the most sophisticated to date, according to MessageLabs. All initial copies originated from the US, where the virus is currently most prevalent.

Since the first Sobig virus first appeared on 9 January, MessageLabs has intercepted almost three million copies of the virus' variants. MessageLabs detected all strains of this virus proactively, using its heuristics technology.

The current Sobig virus to email ratio is approximately 1 in 17 and the virus is spreading at such a rate it is expected to continue to stay at high-level status for the next few weeks. However, like past Sobig viruses, the Sobig-F virus has an expiry date and is set to deactivate on 10 September.

Said Mark Sunner, MessageLabs' CTO: "The Sobig virus writer's use of an in-built expiry date indicates that he is committed to inventing new and improved versions. Each variant released so far has exceeded the previous one in growth and impact during the critical initial window of vulnerability."

Sobig is a mass-emailing virus that can spoof the sender's address, fooling the user into believing the email is from a legitimate source and then opening the email. The email often contains the following header: "Subject: Re:details" and the text "Please see the attached file for details." The attachment names may include: your_document.pif, details.pif, your_details.pif, thank_you.pif, movie0045.pifm, document_Fall.pif, application.pif, docment_9446.pif.

Once the virus has infected your machine it attempts to connect to a website to download a backdoor Trojan, leaving your computer vulnerable to security breaches by crackers or other viruses. ®

Beginner's guide to SSL certificates

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.