Close Close
Popular Financial Topics Discover relevant content from across the suite of ALM legal publications From the Industry More content from ThinkAdvisor and select sponsors Investment Advisor Issue Gallery Read digital editions of Investment Advisor Magazine Tax Facts Get clear, current, and reliable answers to pressing tax questions
Luminaries Awards
ThinkAdvisor

Life Health > Health Insurance

The Virus Hall Of Shame

X
Your article was successfully shared with the contacts you provided.

Following are some of the most frequently observed viruses for the month of July, as reported by antivirus software maker Central Command of Medina, Ohio.

Worm/Klez.E. This is the number one worm of all time in terms of proliferation, the company says. It forges the “From:” address of the sender and can be executed by simply viewing the e-mail within the preview pane of Microsoft Outlook.

Worm/Sobig.E. In addition to having mass mailing capabilities, this worm can communicate user-sensitive information back to the author of the worm once the machine has been infected. In order to avoid corporate detection at the e-mail gateway, it arrives as a ZIP file.

Worm/BugBear.B is described as a “highly vicious Internet worm.” Once executed, it installs a keylogging software program and a means to receive instructions from the virus creator. It can disable antivirus and personal firewall applications.

Worm/Sobig.A was the first version of five (so far) Sobig worms. It arrives in a users inbox as coming from [email protected].

Worm/Sobig.C. Instead of [email protected], this worm arrives as coming from Bill Gates ([email protected]). It also has the ability to appear as if it has been sent by a family member or friend.

Worm/Sircam.A. This worm has the ability to locate, retrieve and attach potentially confidential documents (from the My Documents folder) and send them to other users.

Worm/Ganda is a mass mailing program that arrives with a list of random subject lines and text messages. The e-mails are political for the most part.

Worm/Hawaii.E, also known as Worm/Holor.H, spreads via e-mail and uses the file-sharing program Kazaa, utilizing enticing filenames. The “From:” address has been seen to be from an antivirus software vendor, says Central Command.

Worm/Avril.A is a worm that exploits the well-known name of singer Avril Lavigne.

W32/Yaha.E carries an e-mail message associated with love or friendship. If the worm is executed, the desktop screen will become scrambled and shake. Windows will not be able to reboot correctly.


Reproduced from National Underwriter Life & Health/Financial Services Edition, September 8, 2003. Copyright 2003 by The National Underwriter Company in the serial publication. All rights reserved.Copyright in this article as an independent work may be held by the author.



NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.