Hello beadee,
Thank you for your question.
Whenever I have a virus problem, I search the Symantec Virus
Definitions library at www.symantec.com. Searching for [js/kak] I
found the following:
Wscript.KakWorm
http://securityresponse.symantec.com/avcenter/venc/data/wscript.kakworm.html
"Wscript.KakWorm spreads using Microsoft Outlook Express. It attaches
itself to all outgoing messages using the Signature feature of Outlook
Express and Internet Explorer newsgroup reader.
The worm utilizes a known Microsoft Outlook Express security hole so
that a viral file is created on the system without having to run any
attachment. Simply reading the received email message causes the virus
to be placed on the system.
Microsoft has patched this security hole. The patch is available at:
http://www.microsoft.com/technet/ie/tools/scrpteye.asp "
At the bottom of the page you will find that this worm also has other
names:
Also Known As: VBS.Kak.Worm, VBS.Kak.Worm.dr, Kagou-Anti-Krosoft,
VBS/Kakworm, Wscript.Kak.A, JS/Kak, JS/Kak.worm, Mid/Kakworm,
JS.Kakworm, VBS_Kakworm.A
There are a number of links on this page, and I urge you to read the
entire page to inform yourself prior to running removal tools. Then
check:
Symantec has also created an interactive tutorial to help you get rid
of this worm.
http://www.symantec.com/techsupp/virusremoval/virusremoval_info_tutorial.html
And...
If you have a patched version of Outlook Express, this worm will not
work automatically. Click here to download a tool to repair
Wscript.Kakworm damage.
http://www.sarc.com/avcenter/venc/data/wscript.kakworm.fix.html
I trust my research will help you cleanse your system of this worm. If
a link above should fail to work or my research require further
explanation, please do post a Request for Clarification.
Regards,
-=clouseau=- |