FYI.. Dear Friends, There is a warning message about the attack of virus today (mostly on 3rd of every month) in India. Do not to open any mails containing attachments like .exe, .zip, .rar..etc and with subject Kamasutra. For details pl refer http://www.newindpress.com/Newsitems.asp?ID=IE920060202102528&Title=Chennai&Topic=0 ** *Worm to delete files on February 3* Friday February 3 2006 00:00 IST CHENNAI: Watch out for Kama Sutra this Friday. February 3 and the third of every month henceforth, a new malicious worm called by various names like Nyxem, Mywife, Work-Grew A, Kama Sutra and Blackworm would begin infecting your computer system. The mass-mailing worm, which uses its own SMTP engine, sends copies of itself as e-mail attachments to addresses collected from the infected computers. The mails use social engineering techniques such as promise of pornographic pictures to entice users to open the attachment. It also propagates itself through network shares, including popular P2P file sharing services. Chennai-based Cat Computer Services, which has a malicious software removal tool on its website www.quickheal.com, says the virus gets under the radar of anti-virus software because of unique extensions: .b64, .bhx, .hqx, .uu, .uue, .mim. The worm has been in circulation since mid-January and many are unaware of its infection status, says Sunil Joshi. Trend Micro, a leading AV software vendor, in a release, said the virus targets popular file formats including .DOC, .XLS, .PPT, .PDF, and .ZIP. "In addition to losing data, this virus also renders the keyboard and mouse inoperable, thereby leaving the user's system dead," the release added. It again targets various versions of Microsoft Windows and Windows Server and Windows NT. However, Microsoft on Monday posted a security advisory on the worm, but has decided against updating its Windows Malicious Software Removal Tool before the next regularly-scheduled release of February 14. There is good news, though. Since this threat is relatively well-known to the security industry, major security vendors detect this worm and its variants. Trend Micro customers can visit http://www.trendmicro.com/download/dcs.asp for removing the service. The best defence is for users to run a scan of their systems, to ensure they have not been infected. Thanks and Regards *Bhojaraju G* FYI.. Dear Friends, There is a warning message about the attack of virus today (mostly on 3rd of every month) in India. Do not to open any mails containing attachments like .exe, .zip, .rar..etc and with subject Kamasutra. For details pl refer http://www.newindpress.com/Newsitems.asp?ID=IE920060202102528&Title=Chennai&Topic=0 http://www.newindpress.com/Newsitems.asp?ID=IE920060202102528&Title=Chennai&Topic=0 Worm to delete files on February 3 Friday February 3 2006 00:00 IST CHENNAI: Watch out for Kama Sutra this Friday. February 3 and the third of every month henceforth, a new malicious worm called by various names like Nyxem, Mywife, Work-Grew A, Kama Sutra and Blackworm would begin infecting your computer system. The mass-mailing worm, which uses its own SMTP engine, sends copies of itself as e-mail attachments to addresses collected from the infected computers. The mails use social engineering techniques such as promise of pornographic pictures to entice users to open the attachment. It also propagates itself through network shares, including popular P2P file sharing services. Chennai-based Cat Computer Services, which has a malicious software removal tool on its website http://www.quickheal.com www.quickheal.com , says the virus gets under the radar of anti-virus software because of unique extensions: .b64, .bhx, .hqx, .uu, .uue, .mim. The worm has been in circulation since mid-January and many are unaware of its infection status, says Sunil Joshi. Trend Micro, a leading AV software vendor, in a release, said the virus targets popular file formats including .DOC, .XLS, .PPT, .PDF, and .ZIP. "In addition to losing data, this virus also renders the keyboard and mouse inoperable, thereby leaving the user's system dead," the release added. It again targets various versions of Microsoft Windows and Windows Server and Windows NT. However, Microsoft on Monday posted a security advisory on the worm, but has decided against updating its Windows Malicious Software Removal Tool before the next regularly-scheduled release of February 14. There is good news, though. Since this threat is relatively well-known to the security industry, major security vendors detect this worm and its variants. Trend Micro customers can visit http://www.trendmicro.com/download/dcs.asp http://www.trendmicro.com/download/dcs.asp for removing the service. The best defence is for users to run a scan of their systems, to ensure they have not been infected. Thanks and Regards Bhojaraju G
participants (1)
-
Bhojaraju G