HTML.Bother.3180 is script that uses ActiveX controls to perform malicious
actions on your computer. The script modifies the default home page in Internet
Explorer. It also appends itself to all .htm and .html files that it finds in
the \My Documents and \Windows\Web folders. Finally, if the day of the month
matches a random number, the default icon for .html files is changed.
If a blended
threat exploits one or more network services, disable, or block access
to, those services until a patch is applied.
Always keep your patch levels up-to-date, especially on computers that
host public services and are accessible through the firewall, such as HTTP,
FTP, mail, and DNS services.
Enforce a password policy. Complex passwords make it difficult to crack
password files on compromised computers. This helps to prevent or limit
damage when a computer is compromised.
Configure your email server to block or remove email that contains file
attachments that are commonly used to spread viruses, such as .vbs, .bat,
.exe, .pif and .scr files.
Isolate infected computers quickly to prevent further compromising your
organization. Perform a forensic analysis and restore the computers using
trusted media.
Train employees not to open attachments unless they are expecting them.
Also, do not execute software that is downloaded from the Internet unless it
has been scanned for viruses. Simply visiting a compromised Web site can
cause infection if certain browser vulnerabilities are not patched.