InfoGram

This page may contain links to non-U.S. government websites. What this means to you »

December 14, 2000

NOTE: This InfoGram will be distributed weekly to provide members of the emergency services sector with news and information concerning the protection of their critical information systems. For further information please contact the U.S. Fire Administration's Critical Infrastructure Protection Information Center at (301) 447-1325 or email at usfacipc@fema.gov.

Important Reminder

Recent Alert

The latest NIPC Alert is included. This alert describes a virus/worm that is still "in the wild".

"W32/ProLin@MM" Internet Worm (Shockwave), NIPC 00-61 Assessment

The W32/ProLin@MM Internet worm (Shockwave) currently represents a medium threat in the United States. This virus has the potential to clog email networks due to it mass mailing capabilities. The Shockwave worm arrives as an attachment to an email message with the subject "A great Shockwave flash movie". The body of the message contains the text "Check out this new flash movie that I downloaded just now...It's Great, Bye". If the file is activated the worm copies itself on the C drive, startup directory and sends itself as an attachment to all contacts from the victim's Outlook address book. It also sends an email with the subject "Job complete" and the text "Got yet another idiot." to a Yahoo email address. The worm then searches for any files with the extension MP3, JPG and ZIP and moves them into the C:\directory. The moved files remain unchanged but the worm renames them so that the extension is concatenated with the string "change at least now to Linux", e.g. from "Flowers.jpg" to "Flowers.jpgchange at least now to Linux". The files can be restored by moving them to their default location and renaming them so that the concatenated string is removed from the filename. The worm also creates a text file C:\Messageforu.txt that lists all the files that were altered. The anti-virus software industry has created and released a Dat file that will detect and remove the malicious code from the infected system. Full descriptions and removal instructions can be found at various anti-virus software firms websites, including the following:

Additional information on the NIPC and NIPC Advisories is available at www.nipc.gov.

Recipients are asked to report, actual or suspected, criminal activity to their local FBI office or to NIPC, and to your military or civilian computer response group and other law enforcement agencies as appropriate. Incidents may be reported online at www.nipc.gov/incident/cirr.htm. This FBI Awareness of National Security Issues and Response (ANSIR) communication is intended for corporate security professionals and others who have requested to receive unclassified national security advisories.

Individuals who wish to become direct recipients of FBI ANSIR communications should provide business card information, i.e. company name, address, phone, fax, etc., to ansir@leo.gov for processing, with a brief description of the product and/or service provided by your organization.

Factual Event and Lessens Learned

The above incident is an example of how an emergency services communication system can be attacked from the outside. The system was temporarily disabled and the ability to respond to emergency incidents was impeded. The teenage hacker could be replaced by a terrorist or a criminal who would benefit by a delayed or impeded emergency services response.

Does your organization have a plan in place to deal with a shut down of telephone service to your community? How well do you interface with the local provider of 911 telephone service in your area? Does your computer controlled radio and dispatch equipment have remote access by telephone modems?

These are questions that need to asked by the managers and supervisors who are in charge of emergency services communications equipment. Plans and procedures similar to those documents developed and used for Y2K can be utilized to deal with these possible incidents.

Disclaimer of Endorsement

The U.S. Fire Administration/EMR-ISAC does not endorse the organizations sponsoring linked websites, and does not endorse the views they express or the products/services they offer.

Fair Use Notice

This INFOGRAM may contain copyrighted material that was not specifically authorized by the copyright owner. EMR-ISAC personnel believe this constitutes "fair use" of copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use copyrighted material contained within this document for your own purposes that go beyond "fair use," you must obtain permission from the copyright owner.

Reporting Notice

DHS and the FBI encourage recipients of this document to report information concerning suspicious or criminal activity to DHS and/or the FBI. The DHS National Operation Center (NOC) can be reached by telephone at 202-282-9685 or by email at NOC.Fusion@dhs.gov.

The FBI regional phone numbers can be found online at www.fbi.gov/contact/fo/fo.htm

For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at 202-282-9201 or by email at NICC@dhs.gov.

When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

RSS FeedWeekly INFOGRAM's are now available as an RSS Feed. More Information »