Kama Sutra Email Virus Puts Users in Tough Position

Dennis Faas's picture

A malicious backdoor Trojan using illicit images is currently making its way through email inboxes around the world. Sophos is reporting that the computer worm lurks within an attachment offering a Kama Sutra PowerPoint presentation.

Beyond the PowerPoint

After activating the link (which is in fact an .EXE executable file) inquisitive individuals are shown a legitimate-looking presentation with more than a half dozen 'techniques' taken from the ancient Indian text. While the provocative pictures do appear as promised, the virus (called Troj/Bckdr-RFM) also makes its way onto the computer system unbeknownst to the victim. (Source: yahoo.com)

Once infected, hackers can gain remote access to the system, relay spam around the world, steal personal information, install profitable adware and launch denial-of-service attacks.

2006 Kama Sutra Virus Infects 1+ Million PCs

This is not the first time the Kama Sutra virus has targeted Windows users. It was first launched back in 2006 with an infection toll of more than a million computers.

Back then, the virus was known as a "fast-spreading email worm" that was not designed to steal passwords or other personal information at all. Rather, its sole purpose was to destroy Microsoft Office documents (Word, Excel, PowerPoint) in addition to Adobe Acrobat and Photoshop files. (Source: snopes.com)

2011 Virus Steals Bank Information

The first incarnation of the Kama Sutra virus also stuck to a scheduled system of attack, whereby important work files would be erased on the third day of every month. The 2011 version of the virus does not wait that long in orchestrating its assault and looks to wipe bank accounts more than it does Office files.

Users are reminded to remain vigilant and to keep their operating system and virus scanners up to date. Always avoid opening email attachments, even if it's from someone you know (unless of course you specifically asked for and are expecting an attachment).

| Tags:
Rate this article: 
No votes yet