Out-Law News 1 min. read
29 Apr 2002, 12:00 am
Klez.H spreads by sending itself as an attachment to e-mail addresses found in the Windows address book, the ICQ database, and local files. It is also capable of changing the sender's address to that of any other found in the system so that the apparent sender of the infected message may not even have been infected by the worm. The e-mail arrives with a random subject line. The worm randomly chooses a file from the infected machine to send along with the worm to recipients. It spreads through network share drives and is capable of infecting files.
The latest variant, Klez.I, also randomly overwrites executable files in the system and releases a polymorphic virus called W32/Elkern.C, which is capable of infecting a large number of files. All of this may not cause visible damage during the initial phases of the attack, so the user might not realise that they have been hit. In the longer term, however, an infection from this virus could cause problems that prevent the computer from functioning properly. Klez.I can even block some applications that are in memory when the attack takes place.
Panda warns that it is important to remember that the attached file containing the Klez.I virus executes simply when the message is viewed in the preview pane. This is due to a known vulnerability in Microsoft Internet Explorer. Panda Software advises all users to immediately update their anti-virus software before opening their e-mail programs and reading or previewing any e-mail.