Agencies inoculated against Anna


Painful past experience seems to have helped federal agencies react faster and better to the latest e-mail virus to make the rounds, but there are still gaps in agencies' awareness, officials said.

As a whole, federal agencies seemed much better prepared to react to the "Anna Kournikova" virus that started spreading through the United States Monday morning than they had been with the "ILOVEYOU" virus last May. At that time, the "love bug" hit almost every federal agency, overloaded many e-mail servers and caused some to shut down for days.

With the new virus, the Federal Computer Incident Response Capability saw only a few agencies reporting infections. And those that were infected reacted quickly and killed the virus before it caused any disruptions, said David Jarrell, director of FedCIRC, the government's central organization for cyberattack response.

"I think we had a much better response. We didn't have any reports of anyone getting overwhelmed by this," Jarrell said. "The government saw considerably less impact and was better prepared to handle it."

The new virus employs the same method as the love bug, attacking the Microsoft Corp. Outlook and Outlook Express e-mail applications. It is a VBScript attachment that, when executed, infects the system and then e-mails itself to every person in that user's address book.

The e-mail's subject reads "Here you have, ;0)" and the message reads "Hi: Check This!" The attachment is "AnnaKournikova.jpg.vbs."

However, the virus does not mutate as quickly or as often as the love bug did, and organizations now know what to look for, making it relatively easy to block, said Liam Yu, product manager in Network Associates Inc.'s Anti-Virus Emergency Response Team research lab.

"People are prepared not only to react, but they also know what to do," Yu said.

Antivirus companies now have updated signature files available on their Web sites for users to download so their software can recognize the virus. After the love bug, Microsoft also made available a security patch on its Web site that will enable administrators to block executable attachments.


  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.