New Spam Attack Attempts to Disable Security Software

By David Ringstrom

A virulent new e-mail threat is causing significant problems for large businesses and individuals. The infected e-mail messages entice recipients to click on a hyperlink to either a PDF or Windows Media (WMF) file. Doing so allows a worm to simultaneously exploit an infected user’s e-mail address book and attempt to disable the user's antivirus software.

The new virus, commonly referred to as “Here You Have,” is known by several technical names:
As an aside, the phrase “Here You Have” is a retread from the “Anna Kournikova” virus that made the rounds in 2001.
 
According to US-CERT, the subject lines typically read “Here you have” or “JustForYou” and includes a link to a PDF file or Windows Media (WMF) file. Users that click the link are directed to a malicious Web site that will prompt them to download and install a screensaver (.scr) file. In turn, installing this file infects the computer with an e-mail worm that distributes itself to every contact in the user’s e-mail address book. The virus also attempts to stop and delete the user security software.
 
 
Hello:

This is The Document I told you about,you can find it Here.
http://www.sharedocuments.com/library/PDF_Document21.025542010.pdf

Please check it and reply as soon as possible.
Cheers,
 
In other cases, the e-mail message takes this form:
 
Hello:

This is The Free Dowload Sex Movies,you can find it Here.
http://www.sharemovies.com/library/SEX21.025542010.wmv

Enjoy Your Time.
Cheers,
 
In addition to propagating through e-mail, McAfee reports that the virus also spreads through accessible remote machines, mapped drives, and removable media via Autorun replication.
 
Major antivirus firms have already provided removal tools or instructions:
 
If your computer is affected, only rely on removal tools and instructions from well-known companies. Enterprising malware authors often capitalize on outbreaks by creating and distributing free or paid “removal” tools that can do more harm than good.
 
In general, ensure that your antivirus software is up-to-date, and never click on links in unsolicited or suspicious e-mail ­- even from people that you know - no matter how enticing it may appear. No matter how legitimate a hyperlink in an e-mail appears, it’s easy for malware authors to set up instant redirects to other sites that can immediately infect your computer.
 
If you don’t already have antivirus software installed, consider the free Microsoft Security Essentials application.
 
Read more articles by David Ringstrom. 
 
About the author:

David H. Ringstrom, CPA heads up Accounting Advisors, Inc., an Atlanta-based software and database consulting firm providing training and consulting services nationwide. Contact David at david@acctadv.com or follow him on Twitter. David speaks at conferences about Microsoft Excel, and presents webcasts for several CPE providers, including AccountingWEB partner CPE Link.

 

 

You may like these other stories...

It's not a reality—yet—but accounting software is poised to eliminate accountants. We are at a tipping point for many similar professions: online education replacing professors, legal software replacing...
Whenever I speak to accountants about creating a cloud practice, the most common question is, “How do I charge my clients?” Ten years ago, maybe even five years ago, if I would’ve posed this question...
While reputational risk is the No. 1 nonfinancial concern among corporate directors, cybersecurity/IT risk is gaining steam. In fact, both private companies and organizations with more than $1 billion in revenue felt they...

Upcoming CPE Webinars

Aug 5
This webcast will focus on accounting and disclosure policies for various types of consolidations and business combinations.
Aug 20
In this session we'll review best practices for how to generate interest in your firm’s services.
Aug 21
Meet budgets and client expectations using project management skills geared toward the unique challenges faced by CPAs. Kristen Rampe will share how knowing the keys to structuring and executing a successful project can make the difference between success and repeated failures.