JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for PHYSIO Archives


PHYSIO Archives

PHYSIO Archives


PHYSIO@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

PHYSIO Home

PHYSIO Home

PHYSIO  May 2000

PHYSIO May 2000

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: KAK WORM REMOVAL AND IMMUNIZATION

From:

"John King" <[log in to unmask]>

Reply-To:

[log in to unmask]

Date:

Thu, 4 May 2000 07:06:18 -0400

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (265 lines)

More info on KAK Worm removal..........copied and pasted from alt.comp.virus
.............
Note:  Kak spreads via Email.  Since you were infected,
you'll have been sending infected messages.  You should
check your Sent Items folder **after** applying **all**
the fixes below and Email warnings (and an apology!) to
everyone you've mailed since being infected.

Note^2:  Too many descriptions of how to deal with Kak
ignore the fact that infected users have mail folders
full of infected messages which will hit them again next
time they are read **if the security hole Kak depends on
is not closed**.  Thus, when cleaning up Kak you
**MUST** follow my advice about Outlook Express security
settings **AND** installing the MS security patch
referred to at the end of this message.

In the prescribed order -- don't ask why, just do it:

First, stop using that machine for Email and News.  In
fact, close down all applications.  In the instructions
that follow, start any mentioned application **only**
perform the stated configuration changes then exit the
application.

Second, check the Restricted Sites security has *all*
ActiveX support set to *disabled* (that prevents people
choosing the wrong option when given the choice if
"prompt" is set) and if it is not, set it that way.
You do this on the Security tab of Tools/Internet
Options in IE or the Security tab of the Internet
Options control panel (they are both routes to the same
controls).  If you do not know how to check this, just
select the Restricted Sites zone and click the "Default
Level" button to reset the defaults for that zone --
they are near enough.

Third, set Outlook Express so Email is considered to be
in the Restricted Sites zone.  This is on the Security
tab of the Tools/Options dialog.

Fourth, delete the Signature definition in Outlook
Express for each afflicted user identity (if you do not
know what that means, you *probably* only have a single
identity so only need to do it once).  These settings
are on the Signatures tab of the Tools/Options dialog.
In theory, it is now safe to use Outlook Express 5 for
reading and sending Email -- but don't...

Fifth, delete the files kak.htm from the Windows folder
and <name>.hta from the Windows system folder.  <name>
is an eight character string representing a hexadecimal
number -- i.e. it consists of some combination of
characters 0-9 and A-F.  There could be more than one
of these files -- they should be 4116 bytes in size --
delete them all.  If there is more than one, then you
should find out about Outlook Express user identities and
tidy up the siganture settings of all identities (that
is more aesthetic than necessary, as deleting the
kak.htm file effectively disables the signatures anyway).
These files have the hidden file attribute set -- to see
them you will have to change the default settings in
Explorer.  If you are unsure how to do this, select Help
from the Start menu, click on the Index tab then, under
Win95, enter "hidden files, viewing" or under Win98 enter
"hidden attribute" and view the topic that is found.

Sixth, edit AUTOEXEC.BAT and delete the two lines
involved in creating and deleting kak.hta in the Windows
Startup folder.  If AE.KAK exists in the root of C: and no
changes have been made to AUTOEXEC.BAT since Kak infested
the machine, you can delete (or rename) AUTOEXEC.BAT then
rename AE.KAK to AUTOEXEC.BAT (it is a Kak install-time
backup of AUTOEXEC.BAT).  Check the Windows Startup
folder and delete any file there named kak.hta.

Restart the machine and watch closely for a process called
Driver Memory Error that **only** appears (and briefly) as
a button on the taskbar.  If that happens, you missed
something or did it out of order.  Start over.  If you get
here a second time and still have this process starting,
please Email me for further assistance.


Assuming that all has gone well, go to:

   http://www.microsoft.com/technet/security/bulletin/ms99-032.asp

read it, download then run the offical MS patch that
closes the security hole that Kak depends on.  After doing
that, you can reset your Email security to the Internet
zone, although I certainly do not recommend that!

After all this, you will almost surely have one or more
messages carrying the Kak code in your Email folders.
Unless MS re-introduces the security hole Kak depends on
in a future IE update, those message won't cause you any
grief though forwarding them to others would be unwelcome.
Note also, that any copies to self you've kept will also
have active Kak code in them.  Short of getting a virus
scanner that can parse OE mail files, the only vaguely
satisfactory workaround to the "problem" of possibly
forwarding one of these "infected", saved messages is to
configure all your user identities to send text-only Email
rather than that HTML rubbish that is the OE default.
Thus, setting text-only Email sending is a *very good
idea*.  Note that to set this configuration fully, you
must not only set Tools/Options/Send to "Plain text" for
the "Mail sending format", but also disable the "Reply to
messages in the format in which they were sent" option
(which is also on the Tools/Options/Send dialog).

Hope this was helpful........
JOhn King



----- Original Message -----
From: Anna Lee, Principal <[log in to unmask]>
To: Anastasia Zafeirakopoulos <[log in to unmask]>; Amal Helou
<[log in to unmask]>; Julie Harrison - Hydrotherapy
<[log in to unmask]>; Cathy Nall - PIMS <[log in to unmask]>; Anne
Moseley - Neuro <[log in to unmask]>; Cherie Hearn - CardioThoracic
<[log in to unmask]>; Genevieve Dwyer - Paediatrics
<[log in to unmask]>; Sue Jones - Women's Health
<[log in to unmask]>; Susan Hillier - Neuro <[log in to unmask]>;
Annette Brown Gerontology <[log in to unmask]>; AFRM MM-Line
<[log in to unmask]>; Anna Sheppheard -MH <[log in to unmask]>; Anne
Paeds McCoy <[log in to unmask]>; APA Asha - membership
<[log in to unmask]>; NSW Branch <[log in to unmask]>;
QLD Branch <[log in to unmask]>; SA Branch
<mailto:[log in to unmask];;;;; TAS Branch
<[log in to unmask]>; VIC Branch <vic.
Sent: Wednesday, May 03, 2000 9:56 PM
Subject: Fw: KAK WORM REMOVAL AND IMMUNIZATION


>
> Hello Folks,
>
> I was sent a kak worm virus through the physio mailbase. I received the
> attached information from my (trustworthy) virus detector company, AVP. He
> said that it is impossible to get rid of it just by deleting even with
virus
> detectors. He advises this message be sent to all in your address book.
See
> below
>
>
> Cheers,
>
> Anna.
>
>
>
>
>
> Anna Lee
> Principal,
> Work Ready -  Industrial Athlete Centre
> Physiotherapist and Occupational Health Consultant
>
> Write to me at [log in to unmask]
> Visit me at www.workready.com.au
>
> Snail mail:
> Suite 3, 82 Enmore Road,
> Newtown  NSW 2042
> Australia
>
> Tel: (02) 9519 7436
> Mob: 0412 33 43 98
> Fax: (02) 9519 7439
> ----- Original Message -----
> From: "AVP Australia" <[log in to unmask]>
> To: <[log in to unmask]>
> Sent: Wednesday, 3 May 2000 19:43
> Subject: KAK WORM REMOVAL AND IMMUNIZATION
>
>
> >
> >            KAK WORM REMOVAL AND IMMUNIZATION
> >
> > The Kak worm exploits a security hole in Microsoft Outlook Express.
> > While this hole is open, Kak will keep on re-infecting your PC faster
> > than you can disinfect it.  Follow the steps below to eradicate Kak.
> > (Note that these steps MUST be taken in the correct order!)
> >
> > 1. Close down all applications, including any in the system tray. Start
> >     the applications below ONLY to perform the appropriate configuration
> >     changes, then exit the application.
> >
> > 2. Make sure the Restricted Sites security has ALL ActiveX support
> >     disabled.  Do this on the Tools/Internet Options Security tab in
> >     Internet Explorer, or the Security tab of the Internet Options
control
> >     panel.  (If you don't know how to do this, just select the
Restricted
> >     Sites Zone and click the "Default Level" button to reset the
defaults
> >     for that Zone.)
> >
> > 3. Set Outlook Express so that Email is in the Restricted Sites Zone.
> >     This is on the Security tab under Tools/Options.
> >
> > 4. Delete the Signature definition in Outlook Express for each user
> >     identity.  (If you don't know what this means, you probably have
> >     only a single identity, so you will only need to do it once).  The
> >     settings are on the Signatures tab under Tools/Options.
> >
> > 5. Delete the files kak.htm from the Windows folder and <file>.hta
> >     from the Windows system folder.  <file> is an eight character
> >     hexadecimal number ... i.e. it consists of a combination of the
> >     characters 0-9 and A-F. Note that these files have the hidden file
> >     attribute set.  You will have to change the default settings in
> >     Explorer to see them.  If you are unsure how to do this, select
> >     Help from the Start menu, click on the Index tab, then under
> >     Windows95, enter "hidden files, viewing" or under Windows98
> >     enter "hidden attribute", and read the topic.  There could be
> >     more than one <file>.hta.  They are usually 4116 bytes in size.
> >     Delete them all.
> >
> > 6. Edit autoexec.bat and delete the two lines which create and delete
> >     kak.hta in the Windows Startup folder.  If the file "ae.kak"exists
in
> >     Drive C:\ then delete it.
> >
> > 7. Go to the Windows Startup folder and delete the file kak.hta, if it
> >     exists.
> >
> > 8. Restart your PC and watch closely for a process called Drive
> >     Memory Error which may appear very briefly as a button on the
> >     taskbar.  If this happens then you missed something or did the
> >     steps out of order.  You will have to start again from scratch.
> >
> > 9. Go to:
> >     http://www.microsoft.com/technet/security/bulletin/ms99-032.asp
> >     Read the elert notice and download the official Microsoft patch to
> >     close the security hole which allowed Kak to infect your PC in the
> >     first place.  After doing this you can reset your Email security to
> >     the Internet Zone if you wish, although I recommend against it.
> >
> > You will almost certainly have one or more messages carrying the
> > Kak worm in your Email folders.  Locate these with AVP scanner
> > and delete them ... they cannot be disinfected.
> >
> > Finally, I highly recommend that you configure all your identities to
> > send TEXT ONLY Email, rather than HTML default.  To set this
> > configuration you must set Tools/Options/Send to "Plain text" for
> > the "Mail sending format" and also disable the "Reply to messages
> > in the format in which they were sent" option.
> >
> > It is a good idea to inform anyone you've emailed recently that
> > you may have sent them the Kak worm.  (Send them a copy of
> > this message if you wish.)
> >
> >
> >
>
>



%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

March 2024
February 2024
December 2023
October 2023
August 2023
July 2023
June 2023
May 2023
April 2023
December 2022
October 2022
September 2022
May 2022
December 2021
November 2021
August 2021
June 2021
May 2021
April 2021
March 2021
February 2021
September 2020
July 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
October 2010
September 2010
August 2010
July 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006
April 2006
March 2006
February 2006
January 2006
December 2005
November 2005
October 2005
September 2005
August 2005
July 2005
June 2005
May 2005
April 2005
March 2005
February 2005
January 2005
December 2004
November 2004
October 2004
September 2004
August 2004
July 2004
June 2004
May 2004
April 2004
March 2004
February 2004
January 2004
December 2003
November 2003
October 2003
September 2003
August 2003
July 2003
June 2003
May 2003
April 2003
March 2003
February 2003
January 2003
December 2002
November 2002
October 2002
September 2002
August 2002
July 2002
June 2002
May 2002
April 2002
March 2002
February 2002
January 2002
December 2001
November 2001
October 2001
September 2001
August 2001
July 2001
June 2001
May 2001
April 2001
March 2001
February 2001
January 2001
December 2000
November 2000
October 2000
September 2000
August 2000
July 2000
June 2000
May 2000
April 2000
March 2000
February 2000
January 2000
December 1999
November 1999
October 1999
September 1999
August 1999
July 1999
June 1999
May 1999
April 1999
March 1999
February 1999
January 1999
December 1998
November 1998
October 1998
September 1998
August 1998
July 1998
June 1998
May 1998
April 1998
March 1998


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager