Feeds

Worm poses as Saddam death pics

Latest zombie ruse

  • alert
  • submit to reddit

Security for virtualized datacentres

A worm that seeks to tempt Windows users into infection by promising "death pictures" of Saddam Hussein has begun doing the rounds on the net. The Bobax-H worm offers up infected email attachments posing as “photographic evidence” that the former Iraqi dictator has been killed during an attempted escape bid from custody. Bobax-H also tries to spread by using the same vulnerability (MS04-011) used by the infamous Sasser worm.

Emails generated by Bobax-H come with a variety of message texts including: "Saddam Hussein - Attempted Escape, Shot dead. Attached some pics that i found". Other variations in subject lines used by the worm claim to have pictures of a captured Osama Bin Laden.

Windows users induced into running infected attachments will load a backdoor email relay module onto their PCs which can be used by ne'er-do-wells to distribute spam. The virus is in the wild but it isn't spreading rapidly. Anti-virus vendors rate Bobax-H as a low risk. ®

Related stories

Email worm poses as Osama videogram
Sasser worm creates havoc
German customs grab Saddam's left leg

Beginner's guide to SSL certificates

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.