The Latest Kaspersky Reports (#24)
10 Oct 2001
Kaspersky Lab announces the release of the latest "Kaspersky Reports"
Kaspersky Lab is pleased to announce the release of the latest "Kaspersky Reports," informing our readers and users of the latest viruses in our Virus Encyclopedia.
The following is a content list, and by clicking on the name of the virus, you are able to read a detailed description of each:
This is a relatively harmless, memory resident parasitic Win9x virus that remains in Win9x memory, hooks IFS API (system-file operations), and infects PE EXE files (Win32 applications) that are being opened.Win32.HLLP.Imel
This is a Win32 virus that infects Win32 PE EXE files (Win32 applications), spreading via floppy disks. The worm itself is a Win32 PE EXE application written in Visual Basic.
This is an Internet worm that targets Web sites by infecting Internet Information Servers (ISS). The worm completes the method of spreading from one Web site to other Web sites by sending and executing its code on remote machines in a similar way to the "CodeRed" IIS worm.Worm.Hai
This is local network worm that spreads under Win32 systems. The worm itself in a Win32 executable file about 60K in length, written in MS Visual C++. The known worm version is encrypted by a PELock Win32 EXE file-protection tool.I-Worm.Invalid
This is a dangerous worm that spreads via the Internet attached to e-mail messages. The worm itself is a Windows application about 12K in size. To spread, the worm uses SMTP, and connects to the "mail.bezeqint.net" e-mail server to send infected messages.I-Wrom.Potok
This is a family of Internet worms that spread via e-mail by sending infected messages from infected computers. While spreading, the worms use MS Outlook, and send themselves to addresses that are stored in the MS Outlook Address Book.I-Worm.Scorpion
This is a dangerous worm that spreads via the Internet in infected e-mails. The worm itself is a Windows application written in Delphi about 370K in size.
These types of programs are not "Trojan programs" themselves, but they are written by hackers, and are frequently used to deploy viruses, Trojan programs and backdoors to victim machines.