Symantec fails to stop SirCam

Baltimore's MIMEsweeper also blows it


The SirCam worm has revealed weaknesses in anti-virus protection relied on by many firms as a first line of defence against viral infection.

It's been discovered that both Baltimore Technologies MIMEsweeper content filtering software and Symantec's perimeter protection product, Norton Antivirus for Gateways v2.x, fail to block the prolific virus.

Norton Antivirus for Gateways fails to see email with attachments contaminated by the virus, even if the correct settings have been applied and the latest versions of virus-identfying signature files have been downloaded.

Eric Chien, chief researcher at Symantec's antivirus research centre, admitted the problem, which has generated a considerable number of frustrated messages to Symantec's support site, arises because of a know flaw with its products.

When SirCam spreads itself by email the messages generated have an invalid or mangled MIME-header, because of which Symantec's products don't recognise that an email has an attachment.

The same bug in Symantec's desktop software means Norton Antivirus also fails to detect SirCam with its POP email filter.

Chien admitted the issue meant Symantec's email auto protection is ineffective at blocking the prolific worm but stressed that Norton Antivirus would detect SirCam if a users tried to either open or save an infected attachment to disk.

Symantec is developing a patch for its products, which is currently in testing, and will be made available to users as a component of LiveUpdate, a feature of Symantec's products which allows users to update virus definition files.

The way SirCam is constructed, which if you've received copies of the worm would seem easy to recognise, is also tripping up Baltimore Technologies content filtering program, MAILsweeeper.

MAILsweeeper fails to recognise that an email infected with SirCam has an attachment (again because of the malformed MIME header). This which means that users who configure the software to deliver emails of an undetermined nature, rather than putting such messages into quarantine, will see copies of SirCam arriving at their desktop email clients.

As previously reported, SirCam spreads itself as an attachment to email messages (or possibly network shares), and may in certain cases delete files from a victim's hard disk.

SirCam snaffles up files from a user's hard disk and wraps them in viral code before propagating itself to email addresses filched from a victim's address book or temporary Internet cache files.

The subject of an infected email will be the name of the attached file, and users can spot infected attachments because they feature a double extension, such as .doc.pif. The text of emails may start "Hi! How are you?" and end "See you later. Thanks", or the Spanish equivalents, but variations on this are possible.

MessageLabs, a managed services firm which scans its users email for viruses, has 45,850 copies of SirCam, which suggests the virus is up there with the Love Bug and slower burning Hybris worm as the worst virus in history.

At the risk of stating the bleeding obvious it's worth repeating, yet again, that users are advised to delete any suspicious emails without opening them and to update their antiviral protection. ®

External Links

Write up on SirCam by Symantec
MessageLabs stats on SirCam
Baltimore Technolgies' advice on MAILsweeper and SirCam
Symantec's support forum on Norton Antivirus for Gateways Lots of confused users, why can't Symantec let them know what's going on properly?

Related Stories

SirCam virus hogs connections with spam
Privacy threatening worm on the loose
Magistr continues three month reign as top virus
Hardware-trashing virus spreads by email
Users haven't learned any lessons from the Love Bug
Reports of death of email viruses greatly exaggerated?
Rise in viruses within emails outpacing growth of email
Hotmail fails to block SirCam worm
DoS risk from Zip of death attacks on AV software?


Other stories you might like

  • North Korea pulled in $400m in cryptocurrency heists last year – report

    Plus: FIFA 22 players lose their identity and Texas gets phony QR codes

    In brief Thieves operating for the North Korean government made off with almost $400m in digicash last year in a concerted attack to steal and launder as much currency as they could.

    A report from blockchain biz Chainalysis found that attackers were going after investment houses and currency exchanges in a bid to purloin funds and send them back to the Glorious Leader's coffers. They then use mixing software to make masses of micropayments to new wallets, before consolidating them all again into a new account and moving the funds.

    Bitcoin used to be a top target but Ether is now the most stolen currency, say the researchers, accounting for 58 per cent of the funds filched. Bitcoin accounted for just 20 per cent, a fall of more than 50 per cent since 2019 - although part of the reason might be that they are now so valuable people are taking more care with them.

    Continue reading
  • Tesla Full Self-Driving videos prompt California's DMV to rethink policy on accidents

    Plus: AI systems can identify different chess players by their moves and more

    In brief California’s Department of Motor Vehicles said it’s “revisiting” its opinion of whether Tesla’s so-called Full Self-Driving feature needs more oversight after a series of videos demonstrate how the technology can be dangerous.

    “Recent software updates, videos showing dangerous use of that technology, open investigations by the National Highway Traffic Safety Administration, and the opinions of other experts in this space,” have made the DMV think twice about Tesla, according to a letter sent to California’s Senator Lena Gonzalez (D-Long Beach), chair of the Senate’s transportation committee, and first reported by the LA Times.

    Tesla isn’t required to report the number of crashes to California’s DMV unlike other self-driving car companies like Waymo or Cruise because it operates at lower levels of autonomy and requires human supervision. But that may change after videos like drivers having to take over to avoid accidentally swerving into pedestrians crossing the road or failing to detect a truck in the middle of the road continue circulating.

    Continue reading
  • Alien life on Super-Earth can survive longer than us due to long-lasting protection from cosmic rays

    Laser experiments show their magnetic fields shielding their surfaces from radiation last longer

    Life on Super-Earths may have more time to develop and evolve, thanks to their long-lasting magnetic fields protecting them against harmful cosmic rays, according to new research published in Science.

    Space is a hazardous environment. Streams of charged particles traveling at very close to the speed of light, ejected from stars and distant galaxies, bombard planets. The intense radiation can strip atmospheres and cause oceans on planetary surfaces to dry up over time, leaving them arid and incapable of supporting habitable life. Cosmic rays, however, are deflected away from Earth, however, since it’s shielded by its magnetic field.

    Now, a team of researchers led by the Lawrence Livermore National Laboratory (LLNL) believe that Super-Earths - planets that are more massive than Earth but less than Neptune - may have magnetic fields too. Their defensive bubbles, in fact, are estimated to stay intact for longer than the one around Earth, meaning life on their surfaces will have more time to develop and survive.

    Continue reading

Biting the hand that feeds IT © 1998–2022