Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Possible virus?

Status
Not open for further replies.

Gufs99

MIS
Jun 19, 2003
14
0
0
US
Here's one for you. Maybe you can help me stop from banging my head against the wall on this one...

First my network stats: NT4 domain with Windows 2000 and a few remaining NT workstations using Outlook 2000 for e-mail. No XP or 9x clients. We are a geographically separated military unit with our own subnet. I have one Exchange 5.5 server that replicates all inbound/outbound mail traffic to our main base which serves as the SMTP gateway. One NT4 BDC. We use McAfee VSE 7.0 on the workstations, McAfee GroupShield 4.5 (I believe) for Exchange on the mail server and EPO to manage it all. We're all patched up to DOD specs as well.

Now, I had one user send an e-mail out to a distribution list one time. The e-mail did not have an attachment, but did have a bit of PGP "code" at the bottom of the message. I don't know enough about PGP to determine of this is my problem. But anyway, now the message seems to be bouncing back and forth between two users in that distribution list and sending out to the group. But the users claim not to be sending the e-mail. As a matter of fact it doesn't even show in their mailboxes. They aren't using a forwarder of any kind either. But my Exchange server and GroupShield is picking it up as being infected with a virus with an attachment (infected.msg). But it doesn't say what virus it is infected with, deletes the message and sticks the attachment in the quarantine. I've scanned and overly scanned everyone on that distribution list's workstations with the latest defs, Stinger worm removal/scanner tool, and checked for the files and registry entries the latest worms have been creating. Nothing at all unusual found. I did a sniff with our Fluke appliance on the originator of the message and a few others in the list for any SMTP (port 25 or 110) traffic and there is none. I'm still getting these hits though from GroupShield, about 5-10 an hour. I don't think that Outlook/Exchange is sending these messages.

Anyone have any other ideas that I might have missed?

Thanks in advance

Jake
 
The problem with virii like SoBig is they spoof the return address. This means that someone outside of your network has one (or more) of your user e-mail address(es). This unknown person is infected. The virus on the infected machine is sending itself to everyone in the infected machine address book using your address(es) as the return address. The result is the infected mail is getting caught by another machine and returned to you saying it is infected.

If you are fully patched and have your AV up to date, it is unlikely you are infected. Unfortunately, you have to bear the results of someone else's failure. Sometimes you can get lucky and the returned email will have the original header. If so, you can sometimes track where the original sender is via whois. Most likely though, it is probably an ISP's dial-up account making it difficult to find the one responsible (or irresponsible as the case may be :-( ).

James P. Cottingham

When a man sits with a pretty girl for an hour, it seems like a minute. But let him sit on a hot stove for a minute and it's longer than any hour. That's relativity.
[tab][tab]Albert Einstein explaining his Theory of Relativity to a group of journalists.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top