Kaspersky Lab said the Win32.Warezov.at worm uses its own SMTP engine to send copies to the email addresses it exploits from the address book on infected systems.
Such emails often have quite a variety of titles but are typically typical of email types with fake header messages of server systems such as 'Mail Server Report, Mail Delivery System and test'.
Kaspersky warned about Warezov virus outbreak Picture 1 Once the user clicks on the Win32.Warezov.at worm attachment, it will be activated. It is a self-executing file with a capacity of about 117KB compressed by Upack application. Deep Warezov will copy a copy of itself to the system and edit the Registry to make it automatically start up every time the operating system starts.
David Emm, senior technology consultant with Kaspersky Lab, said: ' It has been a long time since we've seen such a powerful email worm.It can be said that these worms still gain significant success thanks to social engineering attack techniques .
' Users should be careful with unsolicited emails and regularly update anti-virus security applications installed on the system ,' Emm expert recommends.