Hello all,
This nasty email which all Patriotic Americans would open, & probably a large percentage of Internet users from other countries, will really damage your system.
This warning was emailed to us by a father of soldier who is 'overseas' I will say no more or add any other information for obvious reasons.
Please take this warning seriously like Microsoft is.
---------------------------------------------
Subject: VIRUS Warning
This is a real warning. Check out the link to
www.snopes.com listed below. Confirmed at:
http://www.snopes.com/computer/virus/osama.asp
http://www.snopes.com/computer/virus/osama.asp
Warning
Emails with pictures of Osama Bin-Laden hanged are being sent and the moment that you open these emails your computer will crash and you will not be able to fix it!!!
This e-mail is being distributed through countries around the globe,but mainly in the US and Israel.
Don't be inconsiderate; send this warning to whomever you know.
Osama bin Laden Captured
Origins: There are few headlines that would grab the attention of more computer users around the world than
"Osama bin Laden Captured,"
and that's exactly what whoever created this lure was counting on to snare unsuspecting victims who use Microsoft platforms.
"Osama bin Laden Captured" isn't a virus in itself; it's the text o a message that includes a link to a file called EXPLOIT.EXE.
When a message recipient clicks on this link to view what he thinks are pictures of
Osama bin Laden's capture, he can end up downloading an executable Trojan known as Backdoor-AZU, BKDR_LARSLP.A, Download.Trojan,
TrojanProxy.Win32.Small.b,or Win32.Slarp.< BR>
Clicking the embedded link in the "Osama bin Laden Captured" message
auto-executes a file called "E! XPLO IT.EXE," which exploits a known
security hole to download the Trojan. According to McAfee Security:
The Trojan opens a random port on the victim's machine. It sends the Port information to a webpage at IP address 66.139.77.145. The Trojan listens on the open port for instructions and redirects traffic to other IP addresses.
Spammers and hackers can take advantage of compromised systems by using the infected computer as a middleman, allowing them to pass information through it and remain anonymous.
Microsoft has made available updates that close the hole exploited by this Trojan.
|