Linked by Thom Holwerda on Fri 3rd Feb 2006 22:41 UTC
Bugs & Viruses Security watchers say the Kama Sutra worm, which is programmed to overwrite files on infected Windows PCs today, will have a damaging but not catastrophic effect. The Kama Sutra worm (or Nyxem-E or Blackworm) poses as an email message offering a variety of salacious content. Subject lines used in the malicious emails include: The Best Videoclip Ever, Fw: SeX.mpg, Miss Lebanon 2006 and Fuckin Kama Sutra pics. The worm, which can also spread across network shares, only affects Windows PCs.
Thread beginning with comment 92536
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[3]: Too bad eh..
by Wrawrat on Sat 4th Feb 2006 00:46 UTC in reply to "RE[2]: Too bad eh.."
Wrawrat
Member since:
2005-06-30

If they can click an executable file, they can make the script executable by changing its permissions... Never overestimate the user when it comes to attachements. At first, the complexity of the commands (compared to point and click) might put them off, but if they want to see that Miss Lebanon, they will try to.

Call me a pessimist, but if some people are gullible enough to open an attachement from an unknown source...

Reply Parent Score: 1

RE[4]: Too bad eh..
by SlackerJack on Sat 4th Feb 2006 01:05 in reply to "RE[3]: Too bad eh.."
SlackerJack Member since:
2005-11-12

So which is it?, people have been ranting Linux is not ready for the desktop because it's not easy to install or run stuff. Now your saying a new computer user can make the script executable from his email?

Do I hear double standards here?, Yes I think so.

Reply Parent Score: 3

RE[5]: Too bad eh..
by Wrawrat on Sat 4th Feb 2006 01:28 in reply to "RE[4]: Too bad eh.."
Wrawrat Member since:
2005-06-30

Eh? Did I ever mentionned "Linux is not ready for desktop" or "new computer users"? You might hear things, but your sight must be failing...

But since you're asking, instructions could be attached to the malicious mail. The user might ask a friend. Or anything else: just be imaginative. The fact is, if the user wants to run the attachement, he will.

Don't take this as an attack against Linux or Unix-based system. That's what I use. My point was that the weakest link in security is often the user. I'm paranoid enough for keeping my systems secure (or at least I think), but some just don't care.

Edited 2006-02-04 01:29

Reply Parent Score: 2