New Microsoft support worm very unhelpful

A new mass mailing e-mail worm is spreading on the Internet, masking itself as a message from Microsoft Corp.’s support organization.

The new worm is known both as W32/Palyh and W32.HLLW.Mankx@mm and arrives as an executable attachment to e-mail messages with a variety of subjects and messages. All messages containing the new virus purport to come from the same address: [email protected], according to alerts posted by a number of leading antivirus software vendors.

Subject lines for messages delivering the virus include messages such as “Re: My application,” “Your password,” and “Approved (Ref: 38446-263).” Attachment files containing the new virus have a .PIF file extension and use names such as “password.pif,” “doc_details.pif” and “ref-394755.pif,” according to F-Secure Corp. of Helsinki, Finland.

The virus can only be released when a user clicks on the attachment file, F-Secure said.

Once released, however, the virus code modifies the Windows registry so that the worm program is launched whenever Windows is run. It also searches an infected computer for files containing e-mail addresses that it can mail itself to.

The Microsoft Windows address book as well as a variety of other files are searched for e-mail addresses, according to an alert by McAfee Security, part of Network Associates Inc.

A file called “hnks.ini” is created to hold all the e-mail messages that the worm locates and those addresses are targeted with e-mail messages from the infected machine that contain the worm, according to F-Secure.

The virus also looks for computers that are accessible through shared directories on a network and copies itself to those machines, F-Secure said.

Although the new worm preys upon machines running the Windows operating system, users do not need to have Microsoft’s popular Outlook or Outlook Express e-mail programs installed for the worm to spread itself. Code in the new virus enables it to send out its own e-mail messages, according to an alert from Sophos PLC.

Leading antivirus vendors advised their customers to update their antivirus software to detect the new worm. Vendors also posted directions for stopping the virus and removing it from infected machines.

In addition, infected users might consider contacting the addresses listed in the virus’ hnks.ini file, warning them about the infection, F-Secure said.

Microsoft is a frequent target of virus writers, who often disguise viruses and other attacks as messages or bulletins from Microsoft’s technical support organization.

The Redmond, Wash., company’s official policy is that it does not distribute any software using e-mail, preferring to use CDs or its Web site to dispense new software and software updates.

While the company does e-mail customers, it does not send attachments and authenticates all messages with a digital signature.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now