Significant Kama Sutra infections remain in U.S, India and Peru

By
Follow google news

Significant concentrations of PCs infected with the Kama Sutra virus (also known as Blackworm, CME-24 or Nyxem.E) remain in Peru, India and the United States, a security firm warned today.

CipherTrust reports that, although there has been a "relatively fast-moving" disinfection of machines affected by the virus, five percent of PCs are still thought to host the malware. Of the machines that remain infected, 32 percent reside in Peru, 26 percent in India and 18 percent in the United States, according to CipherTrust.


"Although many machines have been disinfected, we're certainly not out of the woods yet. Many machines may still be infected without their owner's knowledge" said Dmitri Alperovitch, principal research scientist for CipherTrust.

"Thankfully, the amount of media attention regarding the destructiveness and rapid propagation of the worm are accelerating action to block and remove the virus. This is particularly significant for that five percent of infected machines that could potentially be severely impacted on the third of next month."

The Blackworm virus, also known as CME-24, Nyxem.E, Kama Sutra and MyWife, is transmitted via email, and once activated, will overwrite files on the third day of each month. At that time, approximately 30 minutes after an infected system is started, the worm overwrites files on local drives with extensions with the following text "DATA Error (47 0F 94 93 F4 K5)": DOC; XLS; MDB; MDE; PPT; PPS; ZIP; RAR; PDF; PSD; and DMP.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Euro cops take down cybercrime network with 49 million fake accounts

Euro cops take down cybercrime network with 49 million fake accounts

Tasmanian gov agencies impacted by cyber attack

Tasmanian gov agencies impacted by cyber attack

Home Affairs streamlines risk vetting for gov tech suppliers

Home Affairs streamlines risk vetting for gov tech suppliers

Windows Server Update Services bug exploited in the wild

Windows Server Update Services bug exploited in the wild

Log In

  |  Forgot your password?