Message-ID: <000301be67e3$b78052b0$fe7ccfd0@dcss01.dcsol.com>
From: "Mike Davis" <mike.davis@dcsol.com>
To: <murphy-rebel@dcsol.com>
Subject: Information regarding HAPPY99.EXE
Date: Sat, 6 Mar 1999 10:12:14 -0500
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 4.72.3110.5
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
Here is some information about HAPPY99.EXE that was on MSNBC recently.
Mike
--------------------
HAPPY99.EXE STARTED MAKING its way around the Internet about Jan.
20, sending hundreds of copies of itself via e-mail attachments and
newsgroup postings. According to Helsinki, Finland, data security firm Data
Fellows Inc., the worm does not attempt to destroy files on infected
machines, but it sends e-mails and newsgroup postings without the victim's
knowledge and could cause network slowdowns or even crash corporate e-mail
servers.
The worm, so designated because it can replicate on its own, arrives
as an e-mail or newsgroup attachment and infects only users who run the
attachment.
Once they do, all victims see is a window with a fireworks display.
But behind the scenes, the worm alters the host computer's winsock32.dll
file, the computer's doorway to the Internet. Then, each time a user
intiates e-mail or newsgroup activity, by either receiving or sending e-mail
or posting to a newsgroup, Happy99 spams the newsgroup or e-mail recipient
with copies of itself. Any type of activity on port 25 or 119 will trigger
spam activity, according to Takata, senior software support engineer of Data
Fellows.
Do you want this big green box to go away? Well here's how...
Click here for full update
Wildcat! photo archives restored.
Click here for full update
Donors can now disable ads.
Click here for instructions
Add yourself to the user map.
Click here for instructions
Click here for full update
Wildcat! photo archives restored.
Click here for full update
Donors can now disable ads.
Click here for instructions
Add yourself to the user map.
Click here for instructions