Be a friend and don't send e-mail that may harbor a hoax
virus
By BILL HUSTED Cox News Service
ATLANTA -- He was just trying to help. My fishing lure was stuck on a
snag. I was leaning over the side of a bass boat in the driving rain,
wearing a plastic rainsuit, and my friend reached over to steady me.
Instead, the push -- along with my rain-slick suit -- was enough to push
me over the boat, head first, into the lake.
Applause came from a nearby boat as I sputtered to the surface.
Sometimes the worst thing your friends can do is help. And when it
comes to computers and bass boats, the wrong kind of help can get you in
over your head.
For instance, the other day a friend from the newspaper forwarded an
e-mail and asked me whether the attachment contained a virus. I didn't
open the attachment, and my anti-virus software detected the virus anyway.
But it is just the sort of help I can do without.
Then there are the floods of hoax e-mails about viruses that don't
exist. Maybe you've received one. They almost always come with text
something like this:
"I don't usually forward these things, but the computer expert
where I work says this is real and very dangerous."
Almost always the virus isn't real. But passing along the message still
can be dangerous. Recently a hoax virus e-mail made the rounds, complete
with directions for removing the virus. The recipient was told what to
look for and instructed how to delete it.
Trouble is, the file was a legitimate one -- not a crucial one, thank
goodness -- that is part of Windows.
I have become so used to these "helpful" e-mails that I might
have ignored the whole thing. But Dave Puetz, the network administrator at
Adtech Solutions in Alpharetta, Ga., wrote to suggest that I could make
his e-mailbox a happier place. He's in the same boat as I, a person who
gets a steady stream of these e-mails from friends.
"I, the same as you, am considered a 'computer expert' by friends,
relatives, neighbors, pets, etc. Therefore, when these people get these
e-mails, they either (intelligently) forward it to me and ask, 'Is this
real?' or, more often, they (unintelligently) do the damage, THEN ask if
it is real, or forward it to me as well as everyone else in their address
books, so that I can 'tell all my computer buddies about this horrendous
virus.'??t;p> What Puetz is saying is that forwarding such e-mail is,
at best, an inconvenience to the person who receives it. Or, if the
recipient doesn't know much about computers and sends the note on, that
creates an ever-multiplying flood of stupid e-mail, passed on witlessly by
well-meaning people. At worst, a well-constructed hoax e-mail can cause
people to -- by following the directions -- do damage to their PCs.
"What is to stop an e-mail from circulating that tells them to
boot into a safe mode DOS prompt and delete (critical files that your
computer needs)? It is simplicity in itself, but man alive, do these
things reel in the suckers. I thought your article would be the ideal
forum to raise awareness to e-mail virus hoaxes and the damage they can do
to e-mail servers, networks, etc."
Consider it done. It's a good idea, Dave.
Here are some things to do when you get your next e-mail warning of a
virus.
First, don't automatically send along the e-mail.
Next, check Web sites such as http://securityresponse.symantec.com/avcenter/hoax.html
or http://www.hoaxbusters.ciac.org
or http://www.vmyths.com . All
these sites do their best to identify virus hoaxes. Odds are that one of
these sites will help identify the e-mail hoax, if it is one.
Obviously you also want to have and use a good anti-virus program. I
favor Norton Anti-Virus.
Once you have the program installed, make sure you update it regularly.
Norton uses a system called "Live Update" that automatically
checks for updates.
Because an anti-virus program finds viruses based on what the trade
calls the "signature" -- the unique attributes of the tiny
program that creates the virus -- your anti-virus program is useless
unless it has the latest signatures.
If your anti-virus program is up to date, it almost certainly will find
the virus and let you know. In the rare cases that a virus in an e-mail is
real, you can feel easy about telling your friends if you like. However,
even in those cases, keep in mind that many of us have been burned so many
times that we may ignore the warning.
For those many times when you discover that the e-mail is a hoax, you
can warn your friend that he's passing along bad information.
Stop him before he e-mails again.
The following web site has a regularly updated list of Hoaxes. Before
you send anyone e-mail please check yours against this list.
When you go to this site click on one of the files listed for more
information.
See the Example below the list of names.
When you receive an e-mail, your not sure of or sounds odd, even if it
comes from someone you know.
Check it out before you react.
http://securityresponse.symantec.com/avcenter/hoax.html
Symantec Security Response uncovers hoaxes on a regular basis. These
hoaxes usually arrive in the form of an email. Please disregard the hoax
e-mails - they contain bogus warnings usually intent only on frightening
or misleading users. The best course of action is to merely delete these
hoax e-mails. Please refer to this page whenever you receive what appears
to be a bogus message regarding a new virus, or promotion that sounds too
good to be true.
(just some of the list)
$800 from Microsoft
3b Trojan
AIDS
Antichrist
AOL4Free Virus
AOL and Intel
AOL.EXE
AOL Flashing IM
AOL RIOT 2 Virus
AOL Year 2000 Update
Baby New Year Virus
Bad Times
Be My Valentine
Be Spooked
Bicho7
Big Brother
Blue Mountain Virus
Blueballs Are Underrated Virus
BUDDYLST.ZIP
BUDSAVER.EXE
Budweiser
BUGGLST
California IBM
California Virus
CELLSAVER Virus
CLEANMGR.EXE Warning
D@Fit
Dana
Dear Friends
Death69
Deeyenda
Desi1love
Despite Virus
Discount Virus
DR.SIMON.WAJNTRAUBWS
E-Flu
eBook
Economic Slow Down
Elecciones 2000
EVIL THE CAT Virus
Family Pictures
FatCat Virus
Flashmaster G
Flower for You
Foot N Mouth Virus Warning
Forward
FREE M & M's
Free Money
Free Pizza Virus
FROGAPULT, ELFBOWL, Y2KGAME Virus
Gamma2.exe
GAP Email Tracking
Get More Money
Ghost
Gift from Microsoft
Girl Thing
Go Hip
Good Times
Guts to Say Jesus
Hacky Birthday Virus
Halloween Virus
Happy New Year Virus
Hello Dear
Hairy Palms Virus
Help Poor Dog
Hitler
How to Give a Cat a Colonic
INFILTER
Information on SARC 'Virus Test'
Irina
Irish Virus
Jan1st20.exe Virus
John Kennedy Jr Trojan
Join the Crew
Let's Watch TV
Londhouse Virus
Lotus Notes Worm
Lump of Coal Virus
Macdonald's Screensaver
Matrix Virus
Microsoft Virus
Millennium Time Bomb
MobilVirus
MOBILE PHONE
MusicPanel
NASTYFRIEND99
The New Ice Age
NEWYORK BIG DIRT
Norman Virus
Norton anti - virus v5
Osama vs Bush
Outback Steakhouse
Pandemic
Penpal Greetings
Perrin.exe Virus
Phantom Menace Virus
Pikachus Ball
Playboy Girls
Pluperfect
Red Alert
Returned or Unable to Deliver
Sandman
Sarc Virus Test
Scoutshacker
Simon Pugh
Slavemaster
South Park News Letter
SULFNBK.EXE Warning
Symantec ASDL Virus
Teletubbies
Time Bomb
Tuxissa
Upgrade Internet 2
Very Cool
Virtual Card for You Virus
Virtual Card Virus
Virus Business
Wait 48 Hours
Watching
WAZ UP
Win a Holiday
Windows will Fail on Jan 1
Wobbler Virus
Wooden Horse
WordScribe Virus
Work Virus
World Domination
WTC Survivor
Y2K7 Virus
Yellow Teletubbies
Zlatko
ZZ331 Virus
Example if you click on SULFNBK.EXE Warning. You will see the
following:
SULFNBK.EXE Warning
Reported on: April 17, 2001
Last Updated on: December 26, 2001 at 10:45:22 AM PST
Symantec Security Response encourages you to ignore any messages
regarding this hoax. It is harmless and is intended only to cause
unwarranted concern.
Type: Hoax
Description:
The following hoax email was first reported in Brazil, and the original
email was in Portuguese. Other language versions are in circulation.
Currently, the English language versions are most common.
CAUTIONS:
This particular email message is a hoax. The file that is mentioned in
the hoax, however, Sulfnbk.exe, is a Microsoft Windows 95/98/Me utility
that is used to restore long file names, and like any .exe file, it can be
infected by a virus that targets .exe files.
NOTE: The Sulfnbk.exe file is not required to run Windows. It may be
necessary if you need to restore long file names if the file names become
corrupted. For additional information, read the Microsoft Knowledge Base
article Description of Sulfnbk.exe and How to Replace the Program File
(Q301316)
The virus/worm W32.Magistr.24876@mm can arrive as an attachment named
Sulfnbk.exe. The Sulfnbk.exe file used by Windows is located by default in
the C:\Windows\Command folder.
NOTE: The C:\Windows\Command folder is the usual default location for
this file. It is possible that if you have a custom installation, or a
special configuration that was installed by the computer manufacturer, the
file could be in a different location.
If the file is located in any other folder (except as noted), or
arrives as an attachment to a email message, then it is possible that the
file is infected. In this case, if a scan with the latest virus
definitions and with NAV set to scan all files does not detect the file as
being infected, quarantine and submit the file to SARC for analysis by
following the instructions in the document How to submit a file to SARC
using Scan and Deliver.
If you have deleted the Sulfnbk.exe file from the C:\Windows\Command
folder and want to know how to restore the file, see the How to restore
the Sulfnbk.exe file section at the end of this document.
English versions
NOTE: Several versions are shown, with the most recent ones shown
first. Many more have been reported. All have the same basic theme.
Version 1
Hello! I just got this letter from my friend and yes I had the virus as
well please follow the directions to see if you have the virus and then
follow the directions to get rid of it. Like my friend I am sorry that I
passed it along as well.
Dear All: We received a virus on a message. I followed the instructions
below and found that it had been spread to our computer. I followed the
instructions and located the virus and was able to delete it. The bad news
is that you probably have it, as you are in My Address book! More bad news
is that my anti virus program did not detect this virus. The virus lies
dormant for 14 days and then "kills" your hard drive.
Here is what to do. If you follow the instructions and then see that
you have the virus, you need to send a similar e-mail to everyone in your
address book.
Remove the virus by following these steps:
1. Go to "Start." Then to "Find" or
"Search".
2. In the "Search for files or folders" type sulfnbk.exe --
this is the name of the virus.
3. In the "Look in" section, make sure you are searching
Drive C.
4. Hit "Search" or "Find".
5. If your search finds this file, it will be an ugly blackish icon
that will have the name sulfnbk.exe. DO NOT OPEN IT! If it does not show
up on your first "Search", try a "New Search."
6. Right click on the file -- go down to "Delete" and left
click.
7. You will be asked if you want to send the file to the Recycling Bin
-- say "Yes".
8. Go to your Desktop (where all your icons are) and right click on the
Recycle Bin and either manually delete the sulfnbk.exe program or empty
the entire bin.
9. If you found the virus on your system, send this or a similar e-mail
to all in your address book because this is how it is transferred.
Sorry for the trouble and my apologies for having unwittingly
"infected" you. You'll want to check for this virus again for
the next couple days
until everyone in your address book has seen it and deleted it,
otherwise, being in their address book, your PC will get infected all
over again so don't forget to check!
Version 2
This is very real, and I may have passed it on to you. Check it out as
below right now. Your drive may crash!!
"I had a virus which apparently attaches itself to everyone in my
address book. I deleted it successfully. you may have it as well. Follow
these instructions to see if you have it. It transfers to whomever is in
your address book. It lies dormant for 14 days, then kills your hard
drive. If you've got it send these instructions to everyone in you address
book. Otherwise, it may be sent back to you by somebody else.
1. go to start-then to "find or search" 2. in the
"search for files or folders" type in sulfnbk.exe - this is the
name of the virus. 3. in the "look in" make sure you're
searching drive C
4. hit "search" button ))or find_
5. if this file shows up (it's an ugly blackish icon that will have the
name sulfnbk.exe) DON'T OPEN IT
6. right click on the file - go down to delete and left click
7. It will ask if you want to send it to the recycle bin - yes
8. go to your desktop (where all your icons are) and double-click on
the recycle bin
9. right click on sulfnbk.exe and delete again or just empty the
recycle bin
IF YOU FIND THIS.....SEND IT TO EVERYONE IN YOUR ADDRESS BOOK, BECAUSE
THAT'S HOW IT IS TRANSFERRED.
Version 3
Do you believe that a friend of mine sent me an alert and the procedure
that we have to follow for the possible infection of SULFNBK.EXE. And I
had checked, just to make sure. An then... the file was there, hidden even
of McAfee and Norton, maybe waiting something to start work.
Well, see bellow the procedure that I followed step by step, and I
found the file:
1. Start/Find Folders. Type the file name: SULFNBK.EXE
2. If it find, open Windows Explorer, browse into the folder where the
file is and delete it. Do not click with left button on the file and do
not open it.
3. Just delete it
4. Mine was on Windows/Command
5. The virus from the person who gave the alert was on Windows/Config
Yes, Norton and McAfee do not detect it.
We do not know if it makes some damage on the machine, but I think that
anybody will not want to test it to know, will it?
Folks, this is not fun, I deleted it from my computer.
And my definitions are updated.
Do the same, ok?
Version 4
This one has additional text stating that the virus will activate on
June 1st.
It was brought to my attention yesterday that a virus is in circulation
via email. I looked for it and to my surprise I found it on mine. ..
Please follow the directions and remove it from yours TODAY!!!!!!!
No Virus software can detect it. It will become active on June 1, 2001.
It might be too late by then. It wipes out all files and folders on
the hard drive. This virus travels thru E-mail and migrates to the
'C:\windows\command' folder.
The bad part is: You need to contact everyone you have sent ANY
E-mail to in the past few months. Many major companies have found this
virus on
their computers. Please help your friends !!!!!!!!
DO NOT RELY ON YOUR ANTI-VIRUS SOFTWARE. McAFEE and NORTON CANNOT
DETECT IT BECAUSE IT DOES NOT BECOME A VIRUS UNTIL JUNE 1ST.
WHATEVER YOU DO, DO NOT OPEN THE FILE!!!
How to restore the Sulfnbk.exe file
If you have deleted this file, restoration is optional. Sulfnbk.exe is
a Microsoft Windows utility that is used to restore long file names. It is
not needed for normal system operation. If you want to restore it, there
is more than one way to do this. See the information that follows.
NOTES:
The C:\Windows\Command folder is the usual default location for this
file. It is possible that if you have a custom installation, or a special
configuration that was installed by the computer manufacturer, the file
could be in a different location.
The Sulfnbk.exe file is not required to run Windows. It may be
necessary if you need to restore long file names if the file names become
corrupted. For additional information, read the Microsoft Knowledge Base
article Description of Sulfnbk.exe and How to Replace the Program File
(Q301316)
The instructions in this document are provided for your convenience.
The extraction of Windows files uses Microsoft programs and commands.
Symantec does not provide warranty support for or assistance with
Microsoft products. If you have any questions, please see your Windows
documentation or contact Microsoft.
Windows Me
If you are using Windows Me, you can restore the file using the System
Configuration Utility.
1. Click Start and then click Run.
2. Type msconfig and then press Enter.
3. Click Extract Files. The "Extract one file from installation
disk" dialog box appears.
4. In the "Specify the system file you would like to restore"
box, type the following, and then click Start:
c:\windows\command\sulfnbk.exe
NOTE: If you installed Windows to a different location, make the
appropriate substitution.
The Extract File dialog box appears.
5. Next to the "Restore from" box, click Browse, and browse
to the location of the Windows installation files. If they were copied to
the hard drive, this is, by default, C:\Windows\Options\Install. You can
also insert the Windows installation CD in the CD-ROM drive and browse to
that location.
6. Click OK and follow the prompts.
Windows 98
If you are using Windows 98, you can restore the file using the System
File Checker.
1. Click Start and then click Run.
2. Type sfc and then press Enter.
3. Click "Extract one file from installation disk."
4. In the "Specify the system file you would like to restore"
box, type the following, and then click Start:
c:\windows\command\sulfnbk.exe
NOTE: If you installed Windows to a different location, make the
appropriate substitution.
The Extract File dialog box appears.
5. Next to the "Restore from" box click Browse, and browse to
the location of the Windows installation files. If they were copied to the
hard drive, this is, by default, C:\Windows\Options\Cabs. You can also
insert the Windows installation CD in the CD-ROM drive and browse to that
location.
6. Click OK and follow the prompts.
Windows 95 (or alternative method for Windows 98/Me)
If you are using Windows 95, you need to use the extract command. This
can also be used on Windows 98/Me.
1. Click Start, point to Find or Search, and then click Files or
Folders.
2. Make sure that "Look in" is set to (C:) and that Include
subfolders is checked.
3. In the "Named" or "Search for..." box, type:
precopy1
4. Click Find Now or Search Now. If it does not exist on the hard
drive, then insert the Windows installation CD and repeat the search on
that drive.
5. When you find the file, write down the location of Precopy1, for
example, C:\Windows\Options\Cabs. This is your Source Path.
6. The general form of the Extract command is:
extract /a <Source Path>\precopy1.cab sulfnbk.exe /L
c:\windows\command
NOTE: Make sure that you include the /a switch, as shown. Depending on
your version of Windows, the Sulfnbk,exe file can be in a .cab file other
than Precopy1.cab. By using the /a switch, the Extract program will look
first in the Precopy1.cab, and if the file is not found there, it will
look in all subsequent .cab files until it is found, and can be extracted.
So if the source path is C:\Windows\Options\Cabs, then the Extract
command becomes:
extract /a c:\windows\options\cabs\precopy1.cab sulfnbk.exe /L
c:\windows\command
NOTE: If you installed Windows to a different location, make the
appropriate substitution.
7. Click Start and then click Run.
8. Type the following, making the appropriate substitutions as
previously noted
extract /a <Source Path>\precopy1.cab sulfnbk.exe /L
c:\windows\command
9. Click OK.
For more information on how to use the Microsoft Extract command, see
the Microsoft Knowledge Base document, How to Extract Original Compressed
Windows Files, Article ID: Q129605
Write-up by: Patrick Martin
© 1995-2001 Symantec Corporation.
All rights reserved.
|