MUSEUM-L Archives

Museum discussion list

MUSEUM-L@HOME.EASE.LSOFT.COM

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Adrian K. Wagner" <[log in to unmask]>
Reply To:
Museum discussion list <[log in to unmask]>
Date:
Thu, 14 Dec 2000 11:26:48 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (63 lines)
That's correct Maggie, it only affects PC's but it's pretty fierce.

Here's the current information on both forms of Kakworm from Norton's
site.  If you're worried, update your virus package and back up your
data.  For the source of the data below and more information, click on
this hyperlink
http://www.sarc.com/avcenter/venc/data/wscript.kakworm.html

Wscript.KakWorm
VBS.KakWorm spreads using Microsoft Outlook Express. It attaches itself
to all outgoing messages via the Signature feature of Outlook Express
and Internet Explorer newsgroup reader.
The worm utilizes a known Microsoft Outlook Express security hole so
that a viral file is created on the system without having to run any
attachment. Simply reading the received email message will cause the
virus to be placed on the system.
Microsoft has patched this security hole. The patch is available from
Microsoft's website
<http://www.microsoft.com/TechNet/security/bulletin/ms99-032.asp>. If
you have a patched version of Outlook Express, this worm will not work
automatically
Also known as </avcenter/refa.html>: VBS.Kak.Worm, Kagou-Anti-Krosoft
Category </avcenter/refa.html>: WORM
Infection length </avcenter/refa.html>: 4116 Bytes
Virus definitions </avcenter/refa.html>: December 30, 1999
The worm appends itself to the end of legitimate outgoing messages as a
signature. When receiving the message, the worm will automatically
insert a copy of itself into the appropriate StartUp directory of the
Windows operating system for both English and French language versions.
The file created is named KAK.HTA.
The worm utilizes a known Microsoft Outlook Express security hole,
Scriptlet.Typelib, so that a viral file is created on the system without
having to run any attachment. Simply reading the received email message
will cause the virus to be placed on the system.
Microsoft has patched this security hole. The patch is available from
Microsoft's website
<http://www.microsoft.com/technet/security/bulletin/ms99-032.asp>. If
you have a patched version of Outlook Express, this worm will not work
automatically.
HTA files are executed by current versions of Microsoft Internet
Explorer or Netscape Navigator. The system must be rebooted for this
file to be executed. Once executed, the worm modifies the registry key:
HKCU/Identities/<Identity>/Software/
Microsoft/Outlook/Express/5.0/signatures
in order to add its own signature file, which is the infected KAK.HTA
file. This causes all outgoing mail to be appended by the worm. In
addition, the registry key:
HKLM/Software/Microsoft/Windows/
CurrentVersion/Run/cAgOu
is added which causes the worm to be executed each time the computer is
restarted.
Finally, if it is the first of the month and the hour is 17 (5:00pm),
the following message is displayed:
 Kagou-Anti-Kro$oft says not today!
and Windows is sent the message to shutdown

=========================================================
Important Subscriber Information:

The Museum-L FAQ file is located at http://www.finalchapter.com/museum-l-faq/ . You may obtain detailed information about the listserv commands by sending a one line e-mail message to [log in to unmask] . The body of the message should read "help" (without the quotes).

If you decide to leave Museum-L, please send a one line e-mail message to [log in to unmask] . The body of the message should read "Signoff Museum-L" (without the quotes).

ATOM RSS1 RSS2