Kama Sutra Email Virus Puts Users in Tough Position
A malicious backdoor Trojan using illicit images is currently making its way through email inboxes around the world. Sophos is reporting that the computer worm lurks within an attachment offering a Kama Sutra PowerPoint presentation.
Beyond the PowerPoint
After activating the link (which is in fact an .EXE executable file) inquisitive individuals are shown a legitimate-looking presentation with more than a half dozen 'techniques' taken from the ancient Indian text. While the provocative pictures do appear as promised, the virus (called Troj/Bckdr-RFM) also makes its way onto the computer system unbeknownst to the victim. (Source: yahoo.com)
Once infected, hackers can gain remote access to the system, relay spam around the world, steal personal information, install profitable adware and launch denial-of-service attacks.
2006 Kama Sutra Virus Infects 1+ Million PCs
This is not the first time the Kama Sutra virus has targeted Windows users. It was first launched back in 2006 with an infection toll of more than a million computers.
Back then, the virus was known as a "fast-spreading email worm" that was not designed to steal passwords or other personal information at all. Rather, its sole purpose was to destroy Microsoft Office documents (Word, Excel, PowerPoint) in addition to Adobe Acrobat and Photoshop files. (Source: snopes.com)
2011 Virus Steals Bank Information
The first incarnation of the Kama Sutra virus also stuck to a scheduled system of attack, whereby important work files would be erased on the third day of every month. The 2011 version of the virus does not wait that long in orchestrating its assault and looks to wipe bank accounts more than it does Office files.
Users are reminded to remain vigilant and to keep their operating system and virus scanners up to date. Always avoid opening email attachments, even if it's from someone you know (unless of course you specifically asked for and are expecting an attachment).
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.