Feeds

Humanity survives Kama Sutra apocalypse

PC thrashing worm has 'minimal impact'

The Essential Guide to IT Transformation

Security watchers say the Kama Sutra worm, which is programmed to overwrite files on infected Windows PCs today, will have a damaging but not catastrophic effect.

The Kama Sutra worm (AKA Nyxem-E or Blackworm) poses as an email message offering a variety of salacious content. Subject lines used in the malicious emails include: The Best Videoclip Ever, Fw: SeX.mpg, Miss Lebanon 2006 and Fuckin Kama Sutra pics. The worm, which can also spread across network shares, only affects Windows PCs.

Windows users who fall for this ruse wind up with an infected machine and disabled security software. Once infected, machines start to spew out additional copies of the worm. Worse still, Nyxem-E is also programmed to overwrite files on Friday February 3, and the third day of every month thereafter. The worm overwrites DOC, XLS, MDB, MDE, PPT, PPS, ZIP, RAR, PDF, PSD and DMP files on local drives.

Email security firm MessageLabs has stopped four million copies of the "PC thrashing" worm from 200,000 different IP addresses since its first appearance on January 16. An estimated 600,000 PCs worldwide were infected at some point, with the US, India and Peru reckoned to harbour the greatest number of compromised machines.

However, many users of infected machines have cleaned up their act, according to Messagelabs. It estimates the worm is currently live on 20,000 IP addresses, suggesting 20,000 individual home users or organisations worldwide are currently infected by Kama Sutra, a big fall from earlier this week. MessageLabs has seen worm 'clean-up' from approximately 11,000 IP addresses a day.

"This virus was created purely for malicious intent, unlike the majority of viruses we see today that are instead looking for backdoors into people's machines to send spam or steal data. We are hopeful that this does not indicate a return to destructive, nuisance viruses. However, this virus writer did do one good thing, intentionally or not, he or she provided a two week window before activation of the payload to destroy data. This has allowed many smart computer users and businesses an opportunity to disinfect their machines and hopefully take protective measures" MessageLabs senior virus technologist Alex Shipp said.

Anti-virus firm McAfee also says Kama Sutra will have a minimal impact on computer users. It estimates a maximum of 15,000 machines in the US are infected.

The Nyxem virus family that spawned Kama Sutra (AKA Nyxem-E) made its debut in March 2004. The first worm in the series launched a DDoS attack against the "New York Mercantile Exchange" website (www.nymex.com). The motive and perpetrator of the virus series remains unknown. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.