Microsoft Corp. has published a security advisory warning Windows users of a file-trashing worm that has been circulating via e-mail for several weeks. The worm, which is programmed to destroy a wide variety of files on the third day of every month, has been circulating since mid-January, and is estimated to have infected between 250,000 and 300,000 systems worldwide.Security researchers have given the worm a variety of names. Microsoft calls it Win32/Mywife.E@mm, but it is also known as Nyxem, Blackdoom, W32.Blackmal.E@mm, Tearec and “Kama Sutra.” And while there have been reports that the malicious software has infected millions of computers, Microsoft believes that the attack is “much more limited and is not in the range of millions at this time,” according to the Microsoft security advisory, released Monday.In fact, several security researchers believe that the Nyxem threat has been overstated. “There’s been way more attention given it in the media than it deserves,” said Russ Cooper, a senior information security analyst at Cybertrust Inc. in Herndon, Virginia. The dramatic nature of this worm’s behavior, with its file-destroying instructions, and inflated reports of infections have helped fuel media interest, he said.For a PC to become infected by Nyxem, a user must first click on a PIF (Program Information File) file attached to an e-mail, which is typically blocked by corporate antivirus software, according to Cooper. “If you’re letting it through and you’re a company, then you probably don’t have antivirus. So you’ve already got a problem.” PIFs are data files used to help programs written for Microsoft’s pre-Windows DOS run in a Windows environment. Nyxem does not rely on a Windows vulnerability, but instead uses “social engineering” techniques to spread, tricking users to click on files that promise racy content like “Miss Lebanon 2006” or “School girl fantasies gone bad,” according to security researchers.Johannes Ullrich, chief research officer for the SANS Institute, agreed that the majority of users do not need to worry about Nyxem. “The story here is if you are hit, you do have other vulnerabilities than this problem.” Between 250,000 and 300,000 PCs have been infected, Ullrich estimated.That number represents a very small number of total Internet users, Cooper said. “How many people do you think had their hard disks fail yesterday?” he asked. “Probably a number as significant as one eighth of 1 percent … It had nothing to do with a worm or a virus. I’m not saying [300,000] is not large number, but it’s not like it is everybody in the city of Columbus, Ohio.”For those who are infected, however, Feb. 3 will be a long day. On that day the worm will overwrite a wide range of files, including Word documents, Excel spreadsheets, PowerPoint presentations and .pdf files, replacing their contents with the phrase: “DATA Error [47 0F 94 93 F4 K5],” Microsoft said.Microsoft’s advisory tells customers to use up-to-date antivirus software, most of which can detect the Nyxem infection, and to use caution before opening unknown e-mail attachments.By Robert McMillan – IDG News Service (San Francisco Bureau) Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe