BearShare Forums  

Go Back   Gnutella Forums > Current Gnutella Client Forums > BearShare (Windows) > BearShare Open Discussion
Register FAQ The Twelve Commandments Members List Calendar Arcade Find the Best VPN Today's Posts

BearShare Open Discussion Open topic discussion for BearShare users

Preview this popular software (BearShare Beta v5 "Download")


Reply
 
LinkBack Thread Tools Display Modes
  #1 (permalink)  
Old February 25th, 2001
Novicius
 
Join Date: February 24th, 2001
Location: Pick, One USA
Posts: 3
ChronKyrios is flying high
Exclamation *Trojan Horse!!

I have been using bearShare for a shortperiod of time. I have found that MANY of my searches come up with an EXACT MATCH (with an EXE tacked on the end), though I am using only keywords. This follows even with searches like "dhvsbgjjk sdagbb".
Generally, the file size of the match is 8192 bytes, but has varied.
There is some consistency in the ip addresses that return it.
I downloaded one of them (incidentally), and ran it. It seemed to do nothing. Then my firewall started warning me of outbound connection requests. I denied it, removed it rebooted.
When I came back, I found a similar program with a different name in my startup menu. I removed that as well.

Could not determine the nature of the program except that it wanted to connect to seemingly random ip addresses.
The programs passed a virus check, and no reference was found on the internet.
Oh the only other consistency seemed to be they were all listed on port 99 in the search results column

This is a warning as well as a question. The question is, has anyone seen this, or know anything about it. Any information would be helpful.
Reply With Quote
  #2 (permalink)  
Old February 25th, 2001
TomG
Guest
 
Posts: n/a
Post

I have seen it.

It appears to be a tiny worm designed to simply propagate itself.

It seems to add itself to Gnutella's search results somehow.

It seems to contain and HTTP server in itself.

It seems to upload itself on any request to that HTTP server.

I couldn't tell you if it had any destructive payload.
Reply With Quote
  #3 (permalink)  
Old February 25th, 2001
Novicius
 
Join Date: February 24th, 2001
Location: Pick, One USA
Posts: 3
ChronKyrios is flying high
Post

still unsure of its limitations, but I am positive it is program independent. Just tried it with Gnotella, same reults.
Reply With Quote
  #4 (permalink)  
Old February 25th, 2001
Novicius
 
Join Date: February 24th, 2001
Location: Pick, One USA
Posts: 3
ChronKyrios is flying high
Exclamation

This is an update to this WORM/TROJAN thing:

I have found two alterations from the above description. Occasionally it will leave off the .exe from the file returned. And occasionally, it will return a file size of 4,294,967,295.


So far, I have been unable to block these return results with a firewall. I am using Tiny Personal, and am new at it. I have most of it set up fine, but this escapes me. Any help on that would be appreciated as well, though I know this is not a firewall support base
Reply With Quote
  #5 (permalink)  
Old March 1st, 2001
Craig
Guest
 
Posts: n/a
Lightbulb

Let's hope the impact of this new development does not become a thorn in the flesh. This worm is probably a pilot virus to test for its viability. There is little if any value in an 8K download, so the worm gives itself away, how many of us are searching for a file 8K in size, right? However, future revision could make the file any size, disguising its true colors.

I don't d/l any exe files as it is, I'm sure not going to start now. Embedding the file into a zip package could be a problem unless detection can remove it first. The big boys, i.e. Symantec and McAfee, will hopefully address the issue and resolve at some point. You might think that they have no concern for Gnutella plagues, but exe viruses can impact anyone with an internet connection, so they will have a vested interest in case variants/mutants come about, which I believe is inevitable.
Reply With Quote
  #6 (permalink)  
Old March 2nd, 2001
Shoeb
Guest
 
Posts: n/a
Post

So we can all learn to avoid downloading .exe files as well as files with no file type associated with them. But with respect to files with a false .mp3 extension, I don't see how that poses a threat. Because if you double click on a file like that, you're computer will try to open it with your music playing software and the software won't recognize the file and come back with an error message. So even if it's an executable file with a *.mp3 mask, it really can't be executed unless you explictly tell your computer to do so. Is there still a threat here?
Reply With Quote
  #7 (permalink)  
Old March 2nd, 2001
MANDAGORE WORM
Guest
 
Posts: n/a
Post

hi there, get real ppl dont trust all this mcaffe and symantec antiviruses, go get avp at www.avp.ru.
This is a worm documented at :

http://www.kaspersky.com/news.asp?tn...&id=162&page=0

fornutely it is harmless


cu
Reply With Quote
  #8 (permalink)  
Old March 6th, 2001
Apprentice
 
Join Date: March 5th, 2001
Location: New York City
Posts: 6
hesterloli is flying high
Post

I wouldn't do that. They will hassle you for the rest of your life.
hesterloli


Quote:
<font face="Verdana, Arial" size="2">Originally posted by MANDAGORE WORM:
hi there, get real ppl dont trust all this mcaffe and symantec antiviruses, go get avp at www.avp.ru.
This is a worm documented at :

http://www.kaspersky.com/news.asp?tn...&id=162&page=0

fornutely it is harmless


cu
</font>
Reply With Quote
  #9 (permalink)  
Old March 6th, 2001
Apprentice
 
Join Date: March 5th, 2001
Location: New York City
Posts: 6
hesterloli is flying high
Post

You are correct. So what if a virus as been renamed to an mp3? So what? Since when does your media player know how to execute anything? mp3 files are not executed they are played. Viruses are not played they are executed. There is a big damn difference.
hesterloli

Quote:
<font face="Verdana, Arial" size="2">Originally posted by Shoeb:
So we can all learn to avoid downloading .exe files as well as files with no file type associated with them. But with respect to files with a false .mp3 extension, I don't see how that poses a threat. Because if you double click on a file like that, you're computer will try to open it with your music playing software and the software won't recognize the file and come back with an error message. So even if it's an executable file with a *.mp3 mask, it really can't be executed unless you explictly tell your computer to do so. Is there still a threat here? </font>
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
New Trojan Horse! turquoisesky Download/Upload Problems 0 June 23rd, 2005 05:48 PM
Trojan Horse... landshark99 General Mac OSX Support 5 June 16th, 2004 09:01 AM
*Shareaza a possible trojan horse? Unregistered Shareaza (Windows) 14 July 8th, 2002 06:16 PM
trojan horse 123yebo General Gnutella / Gnutella Network Discussion 7 June 17th, 2002 06:16 PM
Trojan horse Becker BearShare Open Discussion 12 February 11th, 2002 05:58 PM


All times are GMT -7. The time now is 11:36 AM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
SEO by vBSEO 3.6.0 ©2011, Crawlability, Inc.

Copyright © 2020 Gnutella Forums.
All Rights Reserved.