> On 23 May 2003 at 19:34, Brian Zaleski wrote:
> > With an attachment called errors.zlb
> 'zlb' is one of the quarantine-extensions that ZoneAlarm's MailSafe uses
It is associated with ZoneAlarmPro, however I didn't see that file type in
types to quarantine. My gut is that it may actually be TARGETING people
> My windows scripting host script-reading skills are pretty minimal..
> could you provide a short synopsis of what this script was trying to do?
The first three quarters were compiled, so even though I'm good, I can't
read that. :)
It looks like basically what it's doing is to copy whatever the compiled
object in the script onto the hard drive. After that, it's anyone's guess.
The main reason that I partition all of my discs and put the OS on the on a
drive other than the C: drive is to prevent this kind of attack, even if it
> As a side note, I've heard about this particular virus-trap several times
> [although I don't think I, personally, have received one]: an apparently
> 100% legit-looking (but fake) NDR with the "message" being bounced
> included as an attachment..
Yes, it was an amazing bit of social engineering. It would have been better
if they used an actual Yahoo! bounce message, but it was definitely good.
The headers even indicated that it came from Yahoo!.
> What's unfortunate is that that's what I use for rejects of submissions
> to the newsgroup I moderate -- because of the limitations of the tool I
> happen to use to do the moderation, having the reject message carry the
> original submission as an attachment is really the only good choice. It
> hadn't occurred to me until I started hearing about the NDR-borne-viruses
> that I was encouraging my submittors into potentially dangerous email
Exactly. It continues to amaze me at the number of people who don't use
anti-virus software in the first place. However, if this one was actually
targeting ZoneAlarm users, that would be a really nasty...
From: "Bernie Cosell" <email@example.com>