Sober worm is hidden behind old class photos

Sober worm is hidden behind old class photos Picture 1 Sober.R variant is spreading rapidly via e-mail containing attachments, disguised as being sent from a classmate. However, if the file is opened, the victim will inadvertently turn his PC into a remote-controlled zombie machine.

Sober.R after crawling into the computer will quickly seek to steal information and send them to other addresses stored on the computer. Similar to previous versions, it can be distributed in both English and German versions via the zip file "PW_Klass.Pic.packed-bitmap.exe." with the sole purpose of stealing information from as many victims as possible. Sophos security software company (UK) said they are currently the second most appeared virus in the ranking and account for 10% of the total number of dangerous programs recorded yesterday.

However, US anti-virus vendor Symantec underestimated and ranked Sober.R at a low level of threat. Experts of the company said that although they have witnessed some cases, the virus will not be able to become a Blaster in the future. First, companies and users are more alert to the dangers lurking in attachments. Businesses also implement many measures to block files containing malicious code and users are always suspicious every time they receive spam, even when it looks like it comes from friends. Second, virus writers are concentrating their full power on purposeful attacks to make money instead of resonating. Sober "flood" will not be possible at this time.

Sober began to appear in 2003 and many variants have topped the chart this year, especially Sober.Q expressed disdain, racism, propaganda for Germany's right-wing faction, and one Other worms, Sober.S, offer tickets for the World Cup for free.

4.5 ★ | 2 Vote

May be interested

  • MITRE introduces anti-virus support websitePhoto of MITRE introduces anti-virus support website
    mitre corporation has just officially introduced the common malware enumeration (cme) initiative along with prevention website cme.mitre.org to users worldwide.
  • Important criteria for antivirus programsPhoto of Important criteria for antivirus programs
    there are many antivirus programs (ctcv), each with its own strengths and weaknesses. most ctcs are built based on some fundamental criteria, which is also the basis for helping
  • Spyware replaces virus in enterprise computersPhoto of Spyware replaces virus in enterprise computers
    spyware is becoming more dangerous and sophisticated but users still cannot take the most basic measures to protect themselves. recent statistics show that nearly 30% of us employees have become victims of programs and programs
  • The first Trojan takes advantage of SkypePhoto of The first Trojan takes advantage of Skype
    cybercriminals are attacking computer users with a new dangerous program, hiding in the form of an updated version of the popular internet phone application skype launched late september.
  • New virus attacks mobile phones using Symbian OSPhoto of New virus attacks mobile phones using Symbian OS
    security firm f-secure has warned symbian mobile phone users about the latest variant of commwarrior, commwarrior.c, which can be infected via bluetooth, mms and mmc memory cards.
  • Three 'anti-virus' drugs for freePhoto of Three 'anti-virus' drugs for free
    it's not always that 'money' is true! this series of free software and utilities introduces you to good products.