Klez

Computer Worm

Klez is a computer worm that propagates via e-mail.[1] It first appeared in October 2001 and was originated in China.[2] A number of variants of the worm exist.

The virus (Klez) itself is a Windows PE EXE file of about 65KB, and it operates on WIN32 platforms.[1][2]

Klez infects Microsoft Windows systems, exploiting a vulnerability in Internet Explorer's Trident layout engine, used by both Microsoft Outlook and Outlook Express to render HTML mail.

The e-mail through which the worm spreads always includes a text portion and one or more attachments. The text portion consists of either an HTML internal frame tag which causes buggy e-mail clients to automatically execute the worm, or a few lines of text that attempt to induce the recipient to execute the worm by opening the attachment (sometimes by claiming that the attachment is a patch from Microsoft; sometimes by claiming that the attachment is an antidote for the Klez worm). The first attachment is always the worm, whose internals vary.

Once the worm is executed, either automatically by the buggy HTML engine or manually by a user, it searches for addresses to send itself to. When it sends itself out, it may attach a file from the infected machine, leading to possible privacy breaches.

Later variants of the worm would use a false From address, picking an e-mail address at random from the infected machine's Outlook or Outlook Express address book, making it impossible for casual observers to determine which machine is infected, and making it difficult for experts to determine anything more than the infected machine's Internet Service Provider.

See also

References

  1. ^ a b "What is the KLEZ virus? – GMS". Retrieved 2024-04-30.
  2. ^ a b "Worm:W32/Klez | F-Secure Labs". www.f-secure.com. Retrieved 2024-04-30.

External links

  • Anti-virus provider F-Secure Klez information
  • Anti-virus provider Trend Micro Klez information
  • Anti-virus provider Symantec Klez information
  • AUSCERT External Security Bulletin, ESB-2001.456, "Malicious software report W32/KLEZ", 29 October 2001. Archived 2006-08-20 at the Wayback Machine


  • v
  • t
  • e
Hacking in the 2000s
← 1990s Timeline 2010s →
Incidents
2004
  • Titan Rain (2003–2006)
  • Operation Firewall
2005
2007
2008
2009
Groups
IndividualsDarknets
  • Bluehell IRC
Hacking forums
  • ryan1918
  • unkn0wn.eu
  • darksun.ws
Vulnerabilities
discoveredMalware
2000
2001
  • Anna Kournikova
  • Code Red
  • Nimda
  • Klez
2002
  • Simile
2003
2004
2005
2006
2007
  • Storm
  • ZeuS
  • Black Energy 1
2008
2009