Author Topic: Virus Osama Email Pics  (Read 553 times)

0 Members and 1 Guest are viewing this topic.

Offline jh45gun

  • Trade Count: (0)
  • Senior Member
  • *****
  • Posts: 4992
Virus Osama Email Pics
« on: July 27, 2005, 11:48:11 AM »
Virus -- Osama Bin-Laden Email pictures
>
>
>Don"t know if you've seen this before but it's worth sending,  so be aware  -------  HalViurus
>
>Be advised, this one is  real, not the typical internet hoax.
>It is confirmed at:
>
>       http://www.snopes.com/computer/virus/osama.asp
>
>
>Warning  ------
>
>Emails with pictures of Osama Bin-Laden hanged are being sent and the moment
>that you open these emails your computer will crash and you will not be able
>to fix it!!!
>
>This e-mail is being distributed through countries around the globe, but
>mainly in the US and Israel.
>
>Don't be inconsiderate; send this warning to whomever you know.
>
>Confirmed at: http://www.snopes.com/computer/virus/osama.asp
>
>Origins: There are few headlines that would grab the attention of more
>computer users around the world than "Osama bin Laden Captured," and that's
>exactly what whoever created this lure was counting on to snare unsuspecting
>victims who use Microsoft platforms.
>
>"Osama bin Laden Captured" isn't a virus in itself; it's the text of a
>message that includes a link to a file called EXPLOIT.EXE. When a message
>recipient clicks on this link to view what he thinks are pictures of Osama
>bin Laden's capture, he can end up downloading an executable Trojan known as
>Backdoor-AZU, BKDR_LARSLP.A, Download.Trojan, Trojan Proxy.Win32.Small.b,or
>Win32.Slarp.< BR> Clicking the embedded link in the "Osama bin Laden
>Captured" message auto-executes a file called "EXPLOIT.EXE," which exploits
>a known security hole to download the Trojan. According to McAfee Security:
>
>The Trojan opens a random port on the victim's machine. It sends the Port
>information to a webpage at IP address 66.139.77.145. The Trojan listens on
>the open port for instructions and redirects traffic to other IP addresses.
>Spammers and hackers can take advantage of compromised systems by using the
>infected computer as a middleman, allowing them to pass information through
>it and remain anonymous.
>
>Microsoft has made available updates that close the hole exploited by this
>Trojan.
Said I never had much use for one, never said I didn't know how to use it.