News Stay informed about the latest enterprise technology news and product updates.

New Mimail variant seeks credit card information

Mimail-I appeared late Thursday and purports to be an account deactivation notice from eBay's payment service, PayPal. It tries to trick users into entering credit card information, which is then mailed to the worm writer.

The Mimail worm has taken on dangerous new characteristics. The latest variant, Mimail-I, contains an executable...

attachment that attempts to induce the user into entering credit card information.

The first copies were found late Thursday in Australia and New Zealand, and the worm spread to South Africa and Europe as business and home users began their day. Additional traction was expected as the United States opened for business.

Mimail-I does no system damage, antivirus experts said early this morning, but it harvests potentially sensitive information if the infected attachment is executed and acted upon, and it spreads itself, via a self-contained SMTP engine, to e-mail addresses found on a victim's hard drive.

Mimail-I arrives via e-mail on Windows systems with a subject line that reads: "Your account expires." PayPal is an offshoot of online auctioneer eBay. The service enables users to securely send and receive payments online.

Symantec customers should note that the vendor is referring to this variant as as the Paylap worm.

A lengthy, urgent text message is included that explains that the user's PayPal account is about to expire and failure to act upon the notice will result in the user's account being deactivated.

The worm's attachment file name is "paypal.asp.scr" and, if executed, it displays a fake PayPal application window that asks users to enter their credit card information. The worm then collects the data and saves it in a file called C:ppinfo.sys, pings to determine whether there is an active Internet connection, then attempts to mail the stolen data to four hard-coded e-mail addresses:,, and

The previous Mimail variant appeared Nov. 3 and attempted to launch a distributed denial-of-service attack against antispam Web sites, leading some experts to deduce a connection between spammers and the worm writer.

"This is a clear attempt to pinch money," said Graham Cluley, senior technology consultant with U.K.-based Sophos PLC.

Cluley said e-mail administrators should be blocking the file-extension types used by Mimail because, for the most part, they have no legitimate business function and are the favorite vehicles of malicious code.

"More and more companies are blocking these dangerous file types. This one has a double-extension, and that alone should set off alarm bells," Cluley said. "However, there are some companies that are not blocking, or have users who break the rules."

Mimail-I's social engineering may trigger some to execute the worm. The worm's writer is capitalizing on the popularity of eBay and the PayPal service. The attached file, in some instances, appears to be a Web address, which could also induce a user to click on it, thinking it's a hyperlink.

"It looks legitimate, and some may not realize it's an attachment," said Mikko Hypponen, manager of antivirus research for Helsinki, Finland-based F-Secure Corp. "If companies are not blocking these files, they should be. What reason would any [enterprise] have to accept a .scr file or a .pif file?"

FEEDBACK: Are e-mail worms like Mimail a threat or a nuisance to your enterprise?
Send your feedback to the news team.

Dig Deeper on Malware, virus, Trojan and spyware protection and removal

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.