How did you detect the bagle? Maybe because avast! never had the bagle yet in the virus database. If you ever encounter a virus that avast! never detected yet you can send the virus in a zip compress folder to virus@avast.com
There have been a new versions/variants of bagle doing the rounds, but I believe it is still a mass mailing worm.
A very large proportion of all the viruses/worms are still received and activated by email (attachment).
Don’t go opening email attachments from unknown recipients and even then if they are not expected or differ from the usual pattern of email from that sender. This will stop the possibility of being hit by new variants not detected by AV programs.
Yes, it would appear so. There is no standardisation or convention on virus naming so it is a little confusing at times, but in this case I believe avast uses beagle as there are 148 detected variants of Beagle on the avast virus database. There have been two new variants of Beagle (bagel) added to today’s VPS update, Win32:Beagle-CC [Wrm], Win32:Beagle-CC2 [Wrm]. http://www.avast.com/eng/vps_history.html
I notice that three are VBS (script) variant/versions so it could be possible to get infected via the web also and not just by email attachment.
Simple, with a fast mutating/variant/changing virus AV companies will always be fighting a defensive action and it is possible that something undetected today could well be detected tomorrow.
The general answer is No you shouldn’t have two resident scanners (on-access) as these are likely to cause conflict.
There are some AVs that are on-demand only (you activate a scan), I think BitDefender is just one, this could be used as a backup AV. You can also use some of the on-line scanners again as a backup/confirmation.
RejZoR’s Website - Security Ops
On-line Virus Scanners and other useful Links Security-Ops.eu.tt
New fresh bagles spammed. There was a virus research alarm over a new variety (some 15) of Bagle worm that tries to hijack machines for use in botnets. The weekend spam run attempts to trick (social engineering still works) to download an executable file identified as Bagle.BQ or Mitglieder.CN. Mitglieder.CN has a main dropper and a .dll that injects into Explorer.exe processes. Upon execution (or spawning as FreewheelinFrank calls this ominous process) two start up keys are created as well as a tart-up key for a file in Windows. It disables AV and security software and opens a backdoor for remote access, and other malware. The spreading was not done by a group, what helped creators was that last year the Bagle source code was on the net.
The avast_cleaner only cleans a limited number of true viruses/worms, it is not a general virus removal tool, etc.
AEC is not made by avast! but by one of the forum Members and avast! user RejZoR, his program gives a GUI style interface to change many things in avast! that either require manual editing of the avast4.ini file or change settings that are deep in the avast interface. A very useful tool.