Firkin itself represents a small class of virus/worms. There are at
least four known distinct varieties. Firkin variants appear under a
variety of other names including 911 Share Virus, Bat/911,
Bat/Chode.worm, Chode, 911, Worm_Firkin, Worm.Firkin and Foreskin.
Firkin
http://www.europe.f-secure.com/v-descs/firkin.shtml
"911 Emergency" by Costin Raiu
Virus Bulletin, May 2000
http://www.virusbtn.com/magazine/archives/pdf/2000/200005.PDF
Another common virus that pings random addresses within a subnet is
known as Sorry. Sorry is a VBScript virus. Sorry, like Firkin, appears
under many different names and has several variants of its own. Sorry
and its variants are also known as Mcon, Pica.worm.gen, VBS_MCON,
VBS_MCON.V04, VBS_TTFLOADER, and Ttfloader. Sorry spreads through open
network shares and mIRC.
Mcon.A
http://www.europe.f-secure.com/v-descs/mcon.shtml
VBS/Sorry.a
http://vil.nai.com/vil/content/v_98937.htm
VBS/Sorry.a
http://securityresponse.symantec.com/avcenter/venc/data/vbs.sorry.a.html
There are, of course, other viruses that ping, but the majority of
these ping specific destinations in an attempt to launch a distributed
denial of service attack. One of the better known of these type
viruses is called Papa. Papa is a macro virus modeled after the famous
Melissa virus, but seemingly not by the same author. Papa repeatedly
attempts to ping several systems in an attempt to harass Dr. Fred
Cohen, owner of the software security firm Fred Cohen & Associates.
There are also several similar viruses that ping Microsoft.
X97M.Papa.B
http://securityresponse.symantec.com/avcenter/venc/data/x97m.papa.b.html
Papa
http://www.europe.f-secure.com/v-descs/papa.shtml
Both Firkin and Sorry (and their variants) can be detected by most of
the current anti-virus software. Here is a brief list of vendors that
supply anti-virus software for a variety of platforms:
Symantec
http://www.symantec.com/
McAfee
http://www.mcafee.com/
Trend Micro
http://www.trendmicro.com/
F-Secure
http://www.F-Secure.com/
Sophos Anti-Virus
http://www.sophos.com/
Normon
http://www.norman.com/
Kaspersky
http://www.avp.ch/
If you run a virus scan and don't find anything, but you still feel
that there is something suspicious going on that might be a new,
unknown virus, contact the manufacturer of your anti-virus software.
Most anti-virus companies have means for collecting viruses "in the
wild" from customers. Your software manufacturer will be able to
provide you with the necessary tools and instructions to "quarantine"
the virus.
By running a firewall, you are already doing a very smart thing to
protect your computer. Running anti-virus scans regularly and not
opening e-mail attachments that you are not expecting are other good
ways to help keep your computer safe. As always, you should also
back-up your computer regularly.
While I am by no means suggesting that you should ignore any possible
security violation, there is a certain amount of "noise" on the
Internet. For example, I run a small OS/2 server, which, obviously, it
isn't vulnerable to Windows/IIS exploits. Just on a lark while writing
this, I checked my logs to see how many illegal access attempts there
were recently. This week alone, there were 11 failed attempts by Code
Red infected servers to break into my box. I run a firewall on my DSL
line at home and I can see that I get port scanned by hack tools on
all the lower ports at least several times a week. This is on top of
all of the "normal" stray ip traffic I get. Anyway, the point is, keep
an eye out and do what you need to do to protect yourself, but don't
lose too much sleep over stray traffic. You've done 100% the right
thing by setting up a firewall, and you sound like you are a very
diligent network user.
The other thing you can do to protect yourself, which I do myself, is
make a disk image of your drive and store it to a CD-ROM (or, most
likely, several CD-ROMS). If you are ever concerned that your system
may have been hacked or infected by a virus, run a file comparison
utility (such as diff or WinDiff) on the files on the drive against
the files on the CD. If something has changed that shouldn't have,
then you know you have problem.
Seriously, you should contact your system administrator as well. Your
sys admin may already know the cause, and if not, should be able to
perform some network diagnostics... after all, its in your
administrator's best interests as much as yours to make sure there is
nothing fishy on the network.
Good luck!
Search Strategy:
computer virus database
://www.google.com/search?q=computer+virus+database&hl=en&lr=&ie=ISO-8859-1
Individually searched/reviewed virus databases returned by Google
results. |