what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

y2k-virus.htm

y2k-virus.htm
Posted Dec 18, 1999

Year 2000 Computer Viruses and Hoaxes - List of the approximate number of reports the CERT/CC has received on viruses and hoaxes that reference Y2K. There are also links to anti-virus vendors having Y2K virus and hoax web pages.

tags | web, virus
SHA-256 | 76945e53c71e450c6468224359a90fd3e3fd4372c3e8b036ef211eccd2994420

y2k-virus.htm

Change Mirror Download
<!DOCTYPE HTML PUBLIC "html.dtd">
<HTML>
<HEAD>
<META CONTENT="text/html; charset=windows-1252" HTTP-EQUIV="Content-Type">
<TITLE>CERT&reg;/CC Year 2000 Computer Viruses and Hoaxes</TITLE>
</HEAD>

<BODY>

<BODY BGCOLOR="#FFFFFF" VLINK="#C7AA05" LINK="#004A6B" ALINK="#DDB30B">

<DIV ALIGN="left">
<TABLE WIDTH="100%" CELLSPACING="0" BORDER="0" CELLPADDING="0">
<TR>
<TD WIDTH="50%">
<IMG SRC="http://www.cert.org/images/cmu_sei.gif" WIDTH="239" HEIGHT="37" ALT="The CERT/CC is
part of the Software Engineering Institute at Carnegie Mellon University"></TD>

<TD WIDTH="50%" VALIGN="middle" ALIGN="right">
<IMG SRC="http://www.cert.org/images/improvingsecurity.gif" WIDTH="123" ALT="Improving Security" HEIGHT="19" ALIGN="bottom"> </TD>

</TR>
</TABLE>
</DIV>

<DIV ALIGN="left">
<TABLE WIDTH="100%" CELLSPACING="0" BORDER="0" CELLPADDING="0">
<TR>
<TD WIDTH="54">
<IMG SRC="http://www.cert.org/images/invisible.gif" WIDTH="54" ALT="" HEIGHT="1"></TD>

<TD WIDTH="18%">
<IMG SRC="http://www.cert.org/images/certcc_head.gif" WIDTH="189" ALT="CERT&reg Coordination Center" HEIGHT="18"></TD>

<TD WIDTH="85%" BGCOLOR="#DCDCDC">
<P ALIGN="left"><SMALL><SMALL><FONT FACE="Helvetica, Geneva, Arial">
&nbsp;<A HREF="http://www.cert.org/index.html">Home</A> |
<A HREF="http://www.cert.org/nav/whatsnew.html">What's New</A> |
<A HREF="http://www.cert.org/faq/cert_faq.html">FAQ</A> |
<A HREF="http://www.cert.org/contents/contents.html">Site Contents</A> |
<A HREF="http://www.cert.org/contact_cert/contactinfo.html">Contact Us</A> |
<A HREF="http://search.cert.org:8765/">Search</A>
</FONT></SMALL></SMALL></TD>

</TR>
</TABLE>
</DIV>

<DIV ALIGN="left">
<TABLE WIDTH="100%" CELLSPACING="1" BORDER="0" CELLPADDING="5">
<TR>
<TD WIDTH="47">
<IMG SRC="http://www.cert.org/images/invisible.gif" WIDTH="47" ALT="" HEIGHT="1"></TD>

<TD WIDTH="100%" ALIGN="left"><P ALIGN="left">
<FONT SIZE="1" COLOR="#004A6B" FACE="Helvetica, Geneva, Arial">
<A HREF="http://www.cert.org/nav/aboutcert.html">About Us</A> |
<A HREF="http://www.cert.org/nav/alerts.html">Alerts</A> |
<A HREF="http://www.cert.org/nav/training.html">Education and Training</A> |
<A HREF="http://www.cert.org/nav/events.html">Events</A> |
<A HREF="http://www.cert.org/ftp/">FTP Archives</A> |
<A HREF="http://www.cert.org/nav/securityimprovement.html">Improving Security</A> |
<A HREF="http://www.cert.org/nav/other_sources.html">Other Resources</A> |
<A HREF="http://www.cert.org/nav/reports.html">Reports</A> |
<A HREF="http://www.cert.org/research/">Survivability Research</A></FONT></TD>
</TR>

<TR>
<TD WIDTH="47">
<IMG SRC="http://www.cert.org/images/invisible.gif" WIDTH="47" ALT="" HEIGHT="1"></TD>
<TD WIDTH="100%" HEIGHT="12"></TD>
</TR>
</TABLE>
</DIV>

<!-- This section leaves a table definition open. -->
<!-- Each document must close it somewhere else. -->

<DIV ALIGN="left">
<TABLE WIDTH="100%" BORDER="0">
<TR>
<TD WIDTH="47" VALIGN="top" ROWSPAN="2">
<IMG SRC="http://www.cert.org/images/invisible.gif" WIDTH="47" ALT="" HEIGHT="1"></TD>
<TD WIDTH="100%" VALIGN="top"></TD>
</TR>

<TR>
<TD WIDTH="100%" VALIGN="top">


<DIV ALIGN="left">
<TABLE WIDTH="100" HEIGHT="225" ALIGN="left" CELLSPACING="0" BORDER="0" CELLPADDING="7">
<TR>
<TD BGCOLOR="#DCDCDC" VALIGN="top" HEIGHT="175">
<FONT FACE="Helvetica, Geneva, Arial" COLOR="#004A6B"><SMALL><SMALL>

<P><A HREF="http://www.cert.org/incident_notes/">Incident Notes</A>

<P><A HREF="http://www.cert.org/vul_notes/">Vulnerability Notes</A>

<P><A HREF="http://www.cert.org/security-improvement/">Security Improvement Modules</A>

<P><A HREF="http://www.cert.org/tech_tips/">Tech Tips</A>

<P><A HREF="http://www.cert.org/ftp/tools/">Tools</A>

<P><A HREF="http://www.cert.org/other_sources/tool_sources.html">Other sources of tools</A>

<P><A HREF="http://www.cert.org/nav/training.html">Training</A>

<P><A HREF="http://www.cert.org/nav/alerts.html">Alerts</A>

<P><A HREF="http://www.cert.org/y2k-info">Y2K</A>

</SMALL></SMALL></FONT>
</TD>

<TD WIDTH="3" VALIGN="top" ROWSPAN="2"></TD>
</TR>

<TR>
<TD VALIGN="top" HEIGHT="5"></TD>
</TR>
</TABLE>
</DIV>



<H1>Year 2000 Computer Viruses and Hoaxes</H1>
<P>
<BR>Initial Release: December 16, 1999</P>

<A NAME="intro">

<P>
<OL TYPE="I">
<LI><A HREF="http://www.cert.org/y2k-info/y2k-virus.html#I">CERT/CC Virus and Hoax Reports</A></LI>
<LI><A HREF="http://www.cert.org/y2k-info/y2k-virus.html#II">Information about Y2K Viruses by Anti-Virus Vendors</A></LI>
</OL>

<HR NOSHADE SIZE="2" ALIGN="LEFT"><A NAME="I"></A>
<H3>CERT/CC Virus and Hoax Reports</H3>

<P> The following items are the approximate number of reports we have
received of computer viruses and hoaxes that have some reference to Y2K.
If you would like detailed information for the following viruses and hoaxes,
check the virus databases maintained by the anti-virus vendors. A list of
the databases can be found in the following document:

<P>
<DT><DD><B>CERT/CC Computer Virus Resources </B>
<DT><DD><A HREF="http://www.cert.org/other_sources/viruses.html">
http://www.cert.org/other_sources/viruses.html</A>

<P><CENTER>
<TABLE CELLSPACING="0" BORDER CELLPADDING="5">
<CAPTION ALIGN="top"><B>Y2K Viruses</B></CAPTION>
<TR>
<TH>Virus Name*</TH>
<TH>Reports to CERT/CC**</TH>
</TR>
<TR ALIGN="center">
<TD>Babylonia</TD>
<TD>none</TD>
</TR>
<TR ALIGN="center">
<TD>Fix2001, Fix2001, Win32.Admin.12288</TD>
<TD>1</TD>
</TR>
<TR ALIGN="center">
<TD>Mypics, Pics4You.exe</TD>
<TD>none</TD>
</TR>
<TR ALIGN="center">
<TD>Polyglot, Y2K Count, Count2k</TD>
<TD>7</TD>
</TR>
<TR ALIGN="center">
<TD>W97M.Chantal, W97M.Epileptic, W97M/Epi</TD>
<TD>none</TD>
</TR>
<TR ALIGN="center">
<TD>W97M.MMKV, W97M/MMK.a</TD>
<TD>none</TD>
</TR>
<TR ALIGN="center">
<TD>W32.HLLW, Win32/Randir</TD>
<TD>none</TD>
</TR>
</TABLE>
</CENTER>

<P><CENTER>
<TABLE CELLSPACING="0" BORDER CELLPADDING="5">
<CAPTION ALIGN="top"><B>Y2K Hoaxes</B></CAPTION>
<TR>
<TH>HOAX Name*</TH>
<TH>Reports to CERT/CC**</TH>
</TR>
<TR ALIGN="center">
<TD>AOL Year 2000 Update, Y2KFIX.EXE</TD>
<TD>none</TD>
</TR>
<TR ALIGN="center">
<TD>FROGAPULT, ELFBOWL, Y2KGAME Virus</TD>
<TD>2</TD>
</TR>
<TR ALIGN="center">
<TD>Happy New Year Virus</TD>
<TD>none</TD>
</TR>
<TR ALIGN="center">
<TD>Jan1st20.exe Virus</TD>
<TD>none</TD>
</TR>
<TR ALIGN="center">
<TD>South Park News Letter</TD>
<TD>none</TD>
</TR>
<TR ALIGN="center">
<TD>Windows will Fail on Jan 1</TD>
<TD>none</TD>
</TR>
<TR ALIGN="center">
<TD>Y2K7</TD>
<TD>none</TD>
</TR>
</TABLE>
</CENTER>
<P>
* A single virus or hoax may have a number of different names.
<BR>

** These numbers only include direct reports to CERT/CC. These
numbers do not include reports to anti-virus vendors or other
anti-virus organizations.

<P>

<HR NOSHADE SIZE="2" ALIGN="LEFT"><A NAME="II"></A>
<H3>Information about Y2K Viruses by Anti-virus Vendors</H3>

This following sites have a variety of information about computer
viruses and hoaxes that have some relation to Y2K. AVERT and SARC
also have listings of trigger dates for various viruses.

<UL>
<LI><B>AVERT Y2K Resource Center</B>
(<A HREF="http://www.nai.com/">Network Associates, Inc.</A>)</LI>
<DT><A HREF="http://www.nai.com/asp_set/anti_virus/avert/y2k_intro.asp">
http://www.nai.com/asp_set/anti_virus/avert/y2k_intro.asp</A>
<DT>
<P>

<LI><B>Symantec AntiVirus Research Center (SARC) Year 2000 Awareness Center</B>
(<A HREF="http://www.symantec.com/">Symantec</A>)</LI>
<DT><A HREF="http://www.symantec.com/avcenter/y2k/">
http://www.symantec.com/avcenter/y2k/</A>
<P>

<LI><B>Y2K Virus Watch</B>
(<A HREF="http://www.trendmicro.com/">Trend Micro, Inc.</A>)</LI>
<DT><A HREF="http://www.antivirus.com/cybercontent/y2k/">
http://www.antivirus.com/cybercontent/y2k/</A>
<P>
</UL>

The following are papers from vendors discussing virus problems relating to Y2K.

<UL>
<LI><B>The Y2K Situation and Computer Viruses Special Bulletin</B>
(<A HREF="http://www.esafe.com/">Aladdin Knowledge Systems</A>)</LI>
<DT><A HREF="http://www.esafe.com/csrt/y2kvirus.html">
http://www.esafe.com/csrt/y2kvirus.html</A>
<P>

<LI><B>Whitepaper -- "Is there a Y2K virus problem?"</B>
(<A HREF="http://www.sophos.com/">Sophos</A>)</LI>
<DT><A HREF="http://www.sophos.com/virusinfo/whitepapers/Y2K.html">
http://www.sophos.com/virusinfo/whitepapers/Y2K.html</A>
</UL>



<HR WIDTH="100%" NOSHADE>

This document is available from:
<A HREF="http://www.cert.org/y2k-info/y2k-virus.html">
http://www.cert.org/y2k-info/y2k-virus.html</A>

<HR WIDTH="100%" NOSHADE>

<H2>CERT/CC Contact Information</H2>

<DL>
<B>Email:</B> <A HREF="mailto:cert@cert.org">cert@cert.org</A><BR>
<B>Phone:</B> +1 412-268-7090 (24-hour hotline)<BR>
<B>Fax:</B> +1 412-268-6989<BR>
<B>Postal address:</B><BR>
<DD>
CERT<SUP>&reg</SUP> Coordination Center<BR>
Software Engineering Institute<BR>
Carnegie Mellon University<BR>
Pittsburgh PA 15213-3890<BR>
U.S.A.<BR>
</DL>

CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) / EDT(GMT-4)
Monday through Friday; they are on call for emergencies during other
hours, on U.S. holidays, and on weekends.
<P>

<H4>Using encryption</H4>

<P>We strongly urge you to encrypt sensitive information sent by
email. Our public PGP key is available from<P>

<UL>
<A HREF="http://www.cert.org/CERT_PGP.key">http://www.cert.org/CERT_PGP.key</A>
</UL>

If you prefer to use DES, please call the CERT hotline for more
information.<P>

<H4>Getting security information</H4>

CERT publications and other security information are available from
our web site<P>

<UL>
<A HREF="http://www.cert.org/">http://www.cert.org/</A>
</UL>

To be added to our mailing list for advisories and bulletins, send email to
<A HREF="mailto:cert-advisory-request@cert.org">
cert-advisory-request@cert.org</A> and include <TT>SUBSCRIBE
your-email-address</TT> in the subject of your message.
<P>

Copyright 1999 Carnegie Mellon University.<BR>

Conditions for use, disclaimers, and sponsorship information can be found in<P>

<UL>
<A HREF="http://www.cert.org/legal_stuff.html">http://www.cert.org/legal_stuff.html</A>
</UL>

* "CERT" and "CERT Coordination Center" are registered in the U.S. Patent and Trademark Office.

<HR WIDTH="100%" NOSHADE>

<B><U>NO WARRANTY</U></B><BR>
<B>Any material furnished by Carnegie Mellon University and the
Software Engineering Institute is furnished on an "as is"
basis. Carnegie Mellon University makes no warranties of any kind,
either expressed or implied as to any matter including, but not
limited to, warranty of fitness for a particular purpose or
merchantability, exclusivity or results obtained from use of the
material. Carnegie Mellon University does not make any warranty of any
kind with respect to freedom from patent, trademark, or copyright
infringement.</B>

<!-- This completes the table started in *_titlebar.html -->
</TD>
</TR>
</TABLE>
</DIV>


</BODY>
</HTML>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close