From; Sophos Alert System: Name: W32/Sdbot-YW Aliases: W32.Randex, Backdoor.Win32.SdBot.bh, W32/Sdbot.worm.gen.j, BKDR_NICSHIZ.A Type: Win32 worm Date: 18 June 2005 Sophos has issued protection for W32/Sdbot-YW. At the time of writing, Sophos has received a small number of reports of this worm from the wild. Customers using EM Library, Enterprise Console, PureMessage or any of our Sophos small business solutions will be automatically protected at their next scheduled update. Note: The IDE issued for W32/Sdbot-YW at 20:59 (GMT) on 31 May 2005 also contained detection for W32/Kelvir-AB, W32/Rbot-ADV, Troj/Clecker-A, Troj/Agent-DS, Troj/Duller-B, Troj/Dloader-OB, W32/Agobot-SU, W32/Oscabot-I and Troj/Agent-DT. This IDE has now been updated to enhance detection of W32/Sdbot-YW. Information about W32/Sdbot-YW can be found at: http://www.sophos.com/virusinfo/analyses/w32sdbotyw.html W32/Sdbot-YW is a worm and IRC backdoor Trojan for the Windows platform. W32/Sdbot-YW allows unauthorized remote access to the infected computer via the IRC network. The worm joins a preconfigured IRC channel and waits for instructions from a remote intruder. The worm can be instructed to download updates and run arbitrary files, participate in DDoS attacks and spread to remote network shares. When first run the worm copies itself to <SYSTEM>\hmusvc32.exe or <SYSTEM>\hmvsvc32.exe. The following registry entries are created to run W32/Sdbot-YW on startup: HKCU\Software\Microsoft\Windows\CurrentVersion\Run HMV PowerSource <worm filename> HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HMV PowerSource <worm filename> where <worm filename> is either hmusvc32.exe or hmvsvc32.exe The W32/Sdbot-YW virus identity file (IDE) includes detection for: W32/Kelvir-AB http://www.sophos.com/virusinfo/analyses/w32kelvirab.html W32/Rbot-ADV http://www.sophos.com/virusinfo/analyses/w32rbotadv.html Troj/Clecker-A http://www.sophos.com/virusinfo/analyses/trojcleckera.html Troj/Agent-DS http://www.sophos.com/virusinfo/analyses/trojagentds.html Troj/Duller-B http://www.sophos.com/virusinfo/analyses/trojdullerb.html Troj/Dloader-OB http://www.sophos.com/virusinfo/analyses/trojdloaderob.html W32/Agobot-SU http://www.sophos.com/virusinfo/analyses/w32agobotsu.html W32/Oscabot-I http://www.sophos.com/virusinfo/analyses/w32oscaboti.html Troj/Agent-DT http://www.sophos.com/virusinfo/analyses/trojagentdt.html Customers with 3.xx or lower versions of Sophos Anti-Virus, who are not running EM Library, can manually download the IDE for W32/Sdbot-YW from: http://www.sophos.com/downloads/ide/sdbot-yw.ide Read about how to use IDE files at http://www.sophos.com/support/knowledgebase/article/363.html *********** MIKE"S REPLY SEPARATOR *********** Mike ~ It is a good day if I learned something new. Editor MikesWhatsNews see a sample on my web page http://www3.telus.net/mikebike <mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe> http://www3.telus.net/mikebike/worm_removal.htm See my Anti-Virus pages http://virusinfo.hackfix.org/index <virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe> A Technical Support Alliance and OWTA Charter Member