パソコンウイルス | インフルエンザ脳症、風邪対策

アーカイブ : パソコンウイルス

Trojan-Ransom.Win32.Gpcode.ax

Kaspersky Lab warns users about the emergence online of a new version of the Gpcode ransomware program.

The program spreads via malicious websites and P2P networks.

Kaspersky Lab products detect the program as Trojan-Ransom.Win32.Gpcode.ax.

You can read more on our blog.

Email-Worm.Win32.VBMania

Kaspersky Lab is monitoring a new email worm which is currently spreading. Emails spreading the worm say “Here you have” in the subject line.

We detect the worm as Email-Worm.Win32.VBMania.

While the servers hosting related downloads have been taken down, we are keeping customers updated and protected against any new variants.



Net-Worm.Win32.Kido

Kaspersky Lab has detected that multiple variants of Kido, a polymorphic worm, are currently spreading widely.

Kaspersky Lab has detected that multiple variants of Kido, a polymorphic worm, are currently spreading widely.

Net-Worm.Win32.Kido exploits a critical vulnerability (MS08-067) in Microsoft Windows to spread via local networks and removable storage media.

The worm disables system restore, blocks access to security websites, and downloads additional malware to infected machines.

Users are strongly recommended to ensure their antivirus databases are up to date. A patch for the vulnerability is available from Microsoft.

Detailed descriptions of Net-Worm.Win32.Kido.bt, Net-Worm.Win32.Kido.dv and Net-Worm.Win32.Kido.fx are available in the Virus Encyclopaedia. A dedicated removal tool is available here.

Virus.Win32.Gpcode.ak

Kaspersky Lab has detected a new version of the ‘malicious blackmailer’ Gpcode - Virus.Win32.Gpcode.ak.

Kaspersky Lab has detected a new version of the ‘malicious blackmailer’ Gpcode - Virus.Win32.Gpcode.ak.

The new Gpcode variant encrypts files with extensions DOC, TXT, PDF, XLS, JPG, PNG, CPP, H etc. on hard drives using an RSA algorithm with a 1024-bit key.

After encrypting files, the virus leaves a text file in the folder next to the encrypted files with following message:

Your files are encrypted with RSA-1024 algorithm.
To recovery your files you need to buy our decryptor.
To buy decrypting tool contact us at: ********@yahoo.com

Currently, we detect the new variant, but we are unable to crack the 1024-bit key. Our analysts are continuing to work on both the key and the virus to resolve this issue.

Kaspersky Lab recommends that all Internet users enable maximum protection from malicious code and network attacks on their computers, refrain from executing suspicious programs received from untrustworthy sources and back up any important information on their computers.

Detection of Virus.Win32.Gpcode.ak was added to Kaspersky Anti-Virus signature databases yesterday, on June 4th, at 15:39 GMT. Please make sure to update if you haven’t already.

If you have fallen victim to Gpcode.ak, try to contact us using another computer connected to the Internet. DO NOT RESTART or POWER DOWN the potentially infected machine. Contact us by email stopgpcode@kaspersky.com and tell us the exact date and time of infection, as well everything you did on the computer in the 5 minutes before the machine was infected: which programs you have executed, which websites you have visited, etc. We'll try and help you recover any data that has been encrypted.

For more information about the malicious program, please read our weblog.

Email-Worm.Win32.Warezov.nf

Kaspersky Lab has detected mass mailings of a new variant of Warezov, Email-Worm.Win32.Warezov.nf.

Kaspersky Lab has detected mass mailings of a new variant of Warezov, Email-Worm.Win32.Warezov.nf. At 8.00 Moscow Standard Time, 19 April 2007, 70-85% of the malicious content in mail traffic consisted of various forms of a new modification of Warezov - the Warezov.nf worm.

A few hours before this point, there was a noticeable increase in mail traffic of an earlier modification of Warezov - Warezov.do which featured in the October 2006 Top 20.

If you are using Kaspersky Anti-Virus 6.0 or Kaspersky Internet Security 6.0 with Proactive Protection turned on, new variants will be detected without the need to update your antivirus databases.

A full description of Email-Worm.Win32.Warezov.nf is now available in the Virus Encyclopaedia.

Email-Worm.Win32.Warezov.mx

New Warezov variant mass mailed

A new version of Warezov, Email-Worm.Win32.Warezov.mx has been mass-mailed.

The worm spreads as an attachment to infected emails. Once launched, it may terminate antivirus and firewall programs and download other malware.

An urgent update to antivirus databases has been released.

If you are using Kaspersky Anti-Virus/ Kaspersky Internet Security 6.0, enable Proactive Protection, and new variants will be detected without the need to update antivirus databases.

Email-Worm.Win32.Warezov.ms

A new variant of Warezov has been mass mailed, and is spreading rapidly

Kaspersky Lab has detected mass mailings of a new variant of Warezov, Email-Worm.Win32.Warezov.ms. The mass mailing started on 3rd April 2007.

The worm spreads as an attachment to infected emails. Once launched, it may terminate antivirus and firewall programs and download other malware.

An urgent update to antivirus databases has been released.

If you are using Kaspersky Anti-Virus/ Kaspersky Internet Security 6.0, enable Proactive Protection, and new variants will be detected without the need to update antivirus databases.

A detailed description of Email-Worm.Win32.Warezov.ms will be available in the near future.

Email-Worm.Win32.Zhelatin

Multiple variants spreading

Multiple variants of Email-Worm.Win32.Zhelatin are currently spreading. The most recent variants are Zhelatin.u, Zhelatin.r and Zhelatin.t

New variants may be functionally similar to each other and to previous variants.

Users are reminded to keep their antivirus protection up to date, and to scan any suspicious emails with an antivirus solution.

If you are using Kaspersky Anti-Virus or Kaspersky Internet Security 6.0, enable Proactive Protection, and new variants will be detected without the need to update antivirus databases.

A detailed description of Email-Worm.Win32.Zhelatin.o is available in the Virus Encyclopaedia.

Email-Worm.Win32.Zhelatin.u

New variant of Zhelatin spreading rapidly

Kaspersky Lab has detected a new variant of Zhelatin, Email-Worm.Zhelatin.u.

Zhelatin.u is a repacked version of an earlier modification, and has the same functionality as previous variants.

Users are reminded to keep their antivirus protection up to date.

If you are using Kaspersky Anti-Virus 6.0, enable Proactive Protection, and new variants will be detected without the need to update antivirus databases.

Email-Worm.Win32.Zhelatin.r

Sharp increase in the volume of Email-Worm.Win32.Zhelatin.r

Kaspersky Lab has detected a sharp increase in the volume of Email-Worm.Win32.Zhelatin.r in mail traffic.

It is functionally identical to Zhelatin.o. Zhelatin.r is simply a repacked version.

If you are using Kaspersky Anti-Virus 6.0, enable Proactive Protection, and new variants will be detected without the need to update antivirus databases.

▲Page Top