TweetI believe it also came from RC as well...It may have no been intentionally sent.
Good heads up username!
Thanks
Aragorn
TweetSomeone sent an email using our email system that has the W32.Klez.H@mm worm. I don't know if it was intentionally sent to us or not. It is a very sneaky worm and my anti-virus deleted the damn email so fast I couldn't figure out where it came from. Everyone please run your anti-virus program. If you don't have one there is a great online virus scan you can use. Here are the links.
https://securityresponse.symantec.com...klez.h@mm.html Info on the worm
https://housecall.trendmicro.com/ Scan your computer for free!
TweetI believe it also came from RC as well...It may have no been intentionally sent.
Good heads up username!
Thanks
Aragorn
TweetThanks bro.
TweetI don't think it was sent intentionally just because of the natural of the worm. Here is one way this worm works.
Email spoofing
This worm often uses a technique known as "spoofing." When it performs its email routine. it can use a randomly chosen address that it finds on an infected computer as the "From:" address, numerous cases have been reported in which users of uninfected computers received complaints that they sent an infected message to someone else.
For example, Linda Anderson is using a computer that is infected with W32.Klez.H@mm. Linda is not using a antivirus program or does not have current virus definitions. When W32.Klez.H@mm performs its emailing routine, it finds the email address of Harold Logan. It inserts Harold's email address into the "From:" portion of an infected message that it then sends to Janet Bishop. Janet then contacts Harold and complains that he sent her an infected message, but when Harold scans his computer, Norton AntiVirus does not find anything--as would be expected--because his computer is not infected.
TweetThanks bro
Tweetgood looking out
Tweetyep!!!!!