The Klez Virus and its dirty tricks
Infopackets Reader Lou G. write s:
" Dear Dennis,
Last week I was flooded with Klez virus containing emails which didn't effect my PC as I avoided opening them until I had tested the sources by replying. One source which constrained an obvious virus attachment was sent by someone who has denied knowing anything about the virus. It has become obvious from my communication with this person that another web site where both of us are listed was the source of information that the hacker used. The hacker used this source to gain both a "From: and a "To:" for their dirty trick(s). Have you got any suggestions as to what course of action I might take in an effort to track down this criminal? "
My response:
The Klez virus is very deceitful. As far as I understand it, the virus works like this:
- The Klez Virus is received via email and Outlook Express;
- The Klez Virus then looks through address book of the infected computer, consisting of email addresses and names (Outlook Express keeps track of who you email and they are automatically added into your address book).
- The Klez Virus then chooses an email address / name at random and uses it in the FROM: field for purpose of propagation;
- The rest of the people listed in the address book are then sent a message, FROM: the random email address in Step #3, along with the Klez Virus itself sent as the attachment.
The entire process is repeated.
There is really no way of knowing where the virus came from, or who sent it, since all information is generated erroneously. The best you can do is get a decent (free) virus scanner and hope for the best.
Side note: In the recent past, I used Mcafee Virus Scan version 6.02 unsuccessfully to combat the Klez Virus. Unfortunately, my experience was not good -- Mcafee 6.02 choked on the Klez virus every time, causing my system to freeze temporarily, while reporting that it could not "find" the virus (Win2k SP2 / IE 5.5 / Outlook 5.5). So, be aware!
PS: There is a * free * KLEZ fix from Symantec (the Norton Anti Virus people) available at from this link.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.