Jump to content
IndiaDivine.org

OT Virus alert.. confirmed by snopes.

Rate this topic


Guest guest

Recommended Posts

This notice is for those of you that have unlimited internet access and

for your home computer use.

 

There is a new PC threat being sent that will disable your PC

 

If you receive any email about Osama Bin Laudin delete it do not open it

or click on nay link in it.

 

 

 

 

Emails with pictures of Osama Bin-Laden hanged are being sent and the

moment that you open these emails your computer will crash and you will

not be able to fix it!

 

This e-mail is being distributed through countries around the globe, but

mainly in the US and Israel.

 

Don't be inconsiderate; send this warning to whomever you know.

 

If you get an email along the lines of " Osama bin Laden Captured " or

" Osama Hanged " don't open the attachment.

 

Confirmed at: http://www.snopes.com/computer/virus/osamahanged.asp

 

Origins: There are few headlines that would grab the attention of

more

computer users around the world than " Osama bin Laden Captured, " and

that's

 

exactly what whoever created this lure was counting on to snare

unsuspecting victims who use Microsoft platforms.

 

" Osama bin Laden Captured " isn't a virus in itself; it's the text of a

message that includes a link to a file called EXPLOIT.EXE. When a

message recipient clicks on this link to view what he thinks are

pictures of Osama bin Laden's capture, he can end up downloading an

executable Trojan known as Backdoor-AZU, BKDR_LARSLP.A, Download.Trojan,

TrojanProxy.Win32.Small.b,or Win32.Slarp. Clicking the embedded link in

the

 

" Osama bin Laden Captured " message auto-executes a file called

" EXPLOIT.EXE, " which exploits a known security hole to download the

Trojan.

 

According to McAfee Security:

 

The Trojan opens a random port on the victim's machine. It sends the

Port information to a webpage at IP address 66.139.77.145. The Trojan

listens on the open port for instructions and redirects traffic to other

IP addresses.

 

Spammers and hackers can take advantage of compromised systems by using

the infected computer as a middleman, allowing them to pass information

through it and remain anonymous

Link to comment
Share on other sites

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...