Google accidentally sent out e-mail containing a mass mailing worm to about 50,000 members of an e-mail discussion list focused on its Google Video Blog, the company said Tuesday.“On Tuesday evening, three posts were made to the Google Video Blog-group that should not have been posted,” Google said in a statement, posted late Tuesday night.“Some of these posts may have contained a virus called W32/Kapser.A@mm—a mass mailing worm. If you think you have downloaded this virus from the group or an e-mail message, we recommend you run your antivirus program to remove it,” said the statement, which was attributed to the Google Video Team.W32/Kasper.A@mm is better known as the Kama Sutra worm. Discovered in January, it deletes files and registry keys on affected systems. It is blocked by most antivirus software. Google uses its Video Blog group to let subscribers know when “interesting and fun” videos have been highlighted on the Google Video Blog. E-mails to the group’s mailing list are posted by a handful of Google employees, called Google Video Team.This team was responsible for sending out the malicious e-mail Tuesday night, said Gabriel Stricker, a Google spokesman. Stricker did not have any more details on how Google ended up distributing the worm code, but he said that internal protocols are now in place to prevent this from happening again.Google has seen a growing number of technical glitches lately, something observers are attributing to the company’s breakneck growth over the past few years. One month ago, hackers found a way to publish a fake post on Google’s official blog. The company also experienced service disruptions with its Blogger service recently that have left some users fuming.Still, Google isn’t the only company to accidentally distribute malware on a mailing list, according to Graham Cluley, a senior technology consultant with security vendor Sophos. “Even mailing lists run by security firms have sometimes accidentally had malware posted to them, ” he said in an e-mail interview. “But everyone can learn a lesson.”By Robert McMillan, IDG News Service (San Francisco Bureau)Keep checking in at our Security Feed for updated news coverage. Related content news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe