Feeds

Humanity survives Kama Sutra apocalypse

PC thrashing worm has 'minimal impact'

Choosing a cloud hosting partner with confidence

Security watchers say the Kama Sutra worm, which is programmed to overwrite files on infected Windows PCs today, will have a damaging but not catastrophic effect.

The Kama Sutra worm (AKA Nyxem-E or Blackworm) poses as an email message offering a variety of salacious content. Subject lines used in the malicious emails include: The Best Videoclip Ever, Fw: SeX.mpg, Miss Lebanon 2006 and Fuckin Kama Sutra pics. The worm, which can also spread across network shares, only affects Windows PCs.

Windows users who fall for this ruse wind up with an infected machine and disabled security software. Once infected, machines start to spew out additional copies of the worm. Worse still, Nyxem-E is also programmed to overwrite files on Friday February 3, and the third day of every month thereafter. The worm overwrites DOC, XLS, MDB, MDE, PPT, PPS, ZIP, RAR, PDF, PSD and DMP files on local drives.

Email security firm MessageLabs has stopped four million copies of the "PC thrashing" worm from 200,000 different IP addresses since its first appearance on January 16. An estimated 600,000 PCs worldwide were infected at some point, with the US, India and Peru reckoned to harbour the greatest number of compromised machines.

However, many users of infected machines have cleaned up their act, according to Messagelabs. It estimates the worm is currently live on 20,000 IP addresses, suggesting 20,000 individual home users or organisations worldwide are currently infected by Kama Sutra, a big fall from earlier this week. MessageLabs has seen worm 'clean-up' from approximately 11,000 IP addresses a day.

"This virus was created purely for malicious intent, unlike the majority of viruses we see today that are instead looking for backdoors into people's machines to send spam or steal data. We are hopeful that this does not indicate a return to destructive, nuisance viruses. However, this virus writer did do one good thing, intentionally or not, he or she provided a two week window before activation of the payload to destroy data. This has allowed many smart computer users and businesses an opportunity to disinfect their machines and hopefully take protective measures" MessageLabs senior virus technologist Alex Shipp said.

Anti-virus firm McAfee also says Kama Sutra will have a minimal impact on computer users. It estimates a maximum of 15,000 machines in the US are infected.

The Nyxem virus family that spawned Kama Sutra (AKA Nyxem-E) made its debut in March 2004. The first worm in the series launched a DDoS attack against the "New York Mercantile Exchange" website (www.nymex.com). The motive and perpetrator of the virus series remains unknown. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.