Win 1 of 40 iPod Minis with the Solaris 10 Competition
Home News Insight Reviews Downloads builder
Hardware Software Communications Internet Business Comment Archive
Chips Emerging Tech Mobiles Servers Storage

top search
News > Hardware > Emerging Tech

Thursday 10th March 2005

Virus dresses up as a naked Jennifer Lopez
Greg Sandoval, CNET
June 01, 2001, 08:56 GMT
By promising to display pictures of actress Jennifer Lopez naked, the destructive Chernobyl virus is again spreading across the Internet via e-mail

Antivirus-software maker Panda Software issued an alert on Thursday after receiving about eight reports of the destructive

Chernobyl virus
, masquerading as pictures of a naked Jennifer Lopez. One report came from a major aviation company, but the company discovered the problem before the virus could do any significant damage.

Panda has given the virus its highest rating of potential risk, distribution and destruction. However, Panda competitor Symantec considers the virus less of a threat, saying it received only six reports through Wednesday, indicating that it was spreading too slowly to cause any real damage.

While the distribution has been limited, the virus still poses a serious threat, said Steve Demogines, director of tech support at Panda. The Chernobyl virus can erase files and disable computers.

The other factor that makes it dangerous, Demogines said, is that it uses a "social engineering" technique that could prove effective. The term social engineering refers to the practice of coming up with intriguing e-mail subject lines to fool the unsuspecting into opening virus-infected files.

The Lopez file's subject line reads "Where are you," and the attachment is titled JenniferLopez_Naked.JPG.VBS.

"Virus writers are still successfully using the social engineering technique to trick the unwary user," Panda said in a statement Thursday.

The Jennifer Lopez file is the latest in a string of mass-mailing worm viruses -- copycat versions of the Anna Kournikova virus -- that spread across the globe in February by encouraging victims to click on a supposed picture of Russian tennis star Anna Kournikova.

The Anna virus had the ability to mail itself to a large number of Internet users but did not damage computer systems. Its main threat was that it might clog servers. The virus inside the Lopez file packs a more destructive payload.

When the W95/CIH virus is unleashed, it goes on a search-and-destroy mission, according to Panda.

The virus seeks out and overwrites code on specific files on the hard disk, stripping them of their content. The virus also infects the Windows installation folder and can disable a computer by overwriting BIOS information on the PC's motherboard, preventing a user from booting up, Demogines said.

The virus is also an example of a joke coming to life. A Lopez virus is part of a long-running gag on numerous Web sites and mailing lists devoted to tech humor. A typical entry lists numerous fictitious viruses, including: "Jennifer Lopez Virus: your computer looks nice but doesn't work very well."

Is your PC safe? Find out in ZDNet UK's Viruses and Hacking News Section.

Have your say instantly, and see what others have said. Click on the TalkBack button and go to the Security forum.

Let the editors know what you think in the Mailroom. And read other letters.

Chernobyl virus ready for a return run Anna Kournikova virus targets UK firms
Email this Print this
Post your message here
Enjoy this article? Ensure you continue to make the right strategic buying decisions for your company by keeping up to date on the latest hardware and software developments with our IT Infrastructure newsletter - spanning news, features and reviews.
 Manage my newslettersMore...
Also in News
Aruba to make legacy wireless play
Intel puts PC in the dashboard
High costs not deterring firms from BI
IM malware threat skyrockets
Sony wants to rescue your lost data
Sony targets businesses with IP video kit
Amazon patents gender stereotyping
European Parliament cries foul over patent directive
EC: We'd accept software patent defeat
Microsoft brings IM into the corporate fold
Must Read News
Apple machine on display at IDF
Sony targets businesses with IP video kit
Intel puts PC in the dashboard
Sony wants to rescue your lost data
Latest Features
Barrett: Looking back, but leaping forward
Lenovo: Where to now?
Intel steps up a gear
Intel: Linux can save you money
Latest Talkback
"Great article by the way. does anyone have an official release date of the tr..."
Read story...
"It's sad really. apple continues to lead the personal computing world with innov..."
Read story...
Latest White Papers
The Gap in Enterprise Data Protection
New Intel® Itanium® 2 processors optimized for dual processor (DP) systems
Top 10 Things to Consider Before Investing in Blade Server Technology
Jobs of the Day
Graduate Games Programmer
IT Support Engineer
£15000 - £18000
Embedded C Engineer (Power PC) Surrey
£25-35000 + Excellent Ben
Check Best Prices
Digital Cameras

Contact Us| Privacy| Terms| Permissions| ZDNet UK RSS Feeds| International| Advertise| Corrections| Site Map| Builder| About CNET Networks
Copyright © 2005 CNET Networks, Inc. All Rights Reserved.
ZDNet is a registered service mark of CNET Networks, Inc. ZDNet Logo is a service mark of CNET NETWORKS, Inc.